Chile has two sources of regulation and public policies that guide the country’s cybersecurity strategy.
The National Cybersecurity Policy 2023–2028
The National Cybersecurity Policy 2023–2028 has five main objectives.
The transversal dimensions of this policy include:
The Cybersecurity Framework Law
For its part, the Cybersecurity Framework Law No 21.663, which entered into force together with the creation of the National Cybersecurity Agency (ANCI) in January 2025, aims to establish the institutional framework, principles and general regulations that allow structuring, regulating and co-ordinating cybersecurity actions of state agencies and between them and private parties. It also establishes the minimum requirements for the prevention, containment, resolution and response to cybersecurity incidents.
The guiding principles for this law are the following.
Cybersecurity Framework Law
The Cybersecurity Framework Law establishes the institutional framework, principles and general regulations to co-ordinate cybersecurity actions between state agencies and between them and private entities. It also sets out the minimum requirements for the prevention, containment and response to cybersecurity incidents. This law defines essential services and the procedure for qualifying among these essential service providers the operators of vital importance, who will be subject to stricter obligations.
The law also creates the ANCI, a decentralised public service responsible for advising the President on cybersecurity issues, co-ordinating competent institutions, and ensuring the protection of the right to computer security. The ANCI has the power to issue mandatory protocols and standards for public and private institutions.
In addition, the Cybersecurity Framework Law creates the National Computer Security Incident Response Team (CSIRT Nacional) within ANCI. This team is responsible for responding to significant cyber-attacks and co-ordinating other CSIRTs.
As of 1 January 2025, the Law and the ANCI came into force. Thus, the Agency can start exercising its regulatory powers, for example by issuing general instructions. In addition, it will have to set up and manage the National Incident Register and will also be able to set the standards to be met by institutions providing goods or services to the state, as well as cybersecurity standards and duties to inform the public about the security risks of digital devices available to end consumers. The Regulation on Notification of Cybersecurity Incidents with Significant Effects is already in force, and the Agency has enabled a web portal and APIs for both essential service providers and operators of vital importance to make reports to the National CSIRT.
The first qualification process for Operators of Vital Importance is expected to be finalised during Q3 2025. This regulatory framework also includes other relevant regulations, such as the rules on the (i) Functioning of the Secure Connectivity State Network and Special Obligations of State Administration Bodies; (ii) Registry of Cybersecurity Standards Certification Entities; (iii) Functioning of the Interministerial Cybersecurity Committee; and (iv) one that establishes rules for the functioning of the Multisectoral Cybersecurity Council.
The Computer Crimes Law
The Computer Crimes Law No 21,459 establishes rules on computer crimes and their penalties. This law seeks to adapt Chilean legislation to the Budapest Convention. Some of the crimes it typifies are:
Regarding the crime of illegal access – ie, accessing a computer system without authorisation, the penalties are increased if the access is made with the intention of seizing or using information, or if the illegally obtained information is disclosed. However, there is an exemption from criminal sanctions for those who access a computer system in a responsible manner (ethical hacking), fulfilling certain requirements such as registration with the ANCI, prior notification of the access to the Agency and communication of the vulnerabilities to the system operator and the Agency.
The National Cybersecurity Agency (ANCI)
The ANCI is a functionally decentralised public service, endowed with its own legal personality and assets, and of a technical and specialised nature. Its primary goal is to advise the President of the Republic on cybersecurity matters, to collaborate in the protection of national interests in cyberspace, to co-ordinate the relevant institutions, and to ensure the protection of the right to computer security. The Agency reports to the President through the Ministry in charge of public security.
The functions and powers of ANCI are varied and aim to cover all relevant aspects of cybersecurity in the country.
ANCI, through its National Director, has the power to issue resolutions and administrative acts necessary for its operation, as well as to delegate powers to its officials. It also has the power to impose sanctions for breaches of the law.
Sectoral Authorities
ANCI is required to co-ordinate its actions with other sectoral authorities, and there are specific rules that govern this co-ordination. When ANCI issues protocols, technical standards or general instructions that affect the areas of competence of another sectoral entity, it must follow a particular procedure.
With regard to this duty of co-ordination, the following stands out.
Among the main sectoral authorities with competences in cybersecurity, and which have to co-ordinate with the ANCI, are the Undersecretariat of Telecommunications; the Ministry of Health; the future Personal Data Protection Agency (when it takes office in December 2026), and the Financial Market Commission (CMF). See 3. Financial Sector Operational Resilience Regulation.
General Scope of Application
The Cybersecurity Framework Law applies to state agencies, including ministries, presidential delegations, regional governments, municipalities, armed forces, law enforcement agencies, public enterprises and other public bodies and services.
It also applies to state enterprises and companies in which the state has a shareholding of more than 50% or a majority on the board of directors.
In addition, the law applies to institutions that provide services qualified as essential and to those that are qualified as operators of vital importance.
Essential Services
The list of essential services outlined in the Framework Law is as follows:
The ANCI can issue a resolution through which it will identify which specific activities and functions will be considered as essential services (eg, the ANCI could eventually identify the provision of domain name systems as a specific activity within the category “digital infrastructure”).
Operators of Vital Importance
The ANCI must, at least every three years, through an administrative procedure in which sectoral authorities must also participate, identify those essential service providers that will be classified as operators of vital importance. The procedure includes a public consultation process and in addition, the ANCI’s decision could be claimed through administrative appeals and a judicial claim, if applicable.
The ANCI may classify as operators of vital importance those essential service providers which meet the following requirements:
In addition, the ANCI may classify as operators of vital importance private institutions that, although they do not have the quality of providers of essential services, meet the requirements indicated previously and whose qualification is essential because they have acquired a critical role in the supply of the population, the distribution of goods or the production of a good/service that is indispensable or strategic for the country; or by the degree of exposure of the entity to risks and the likelihood of cybersecurity incidents, including their severity and the associated social and economic consequences.
General Cybersecurity Obligations
Both essential service providers and operators of vital importance will need to permanently apply the measures to prevent, report and resolve cybersecurity incidents. These measures may be technological, organisational, physical or informational in nature, as the case may be.
Compliance with these obligations requires the proper implementation of the protocols and standards that will be established by the ANCI, as well as the particular cybersecurity standards issued in accordance with the respective sectoral regulation. The purpose of these protocols and standards will be the prevention and management of risks associated with cybersecurity, as well as the containment and mitigation of the impact that incidents may have on the operational continuity of the service provided or the confidentiality and integrity of information or computer networks or systems in accordance with the provisions of the Framework Law.
Specific Cybersecurity Obligations of Operators of Vital Importance
Public or private entities that are classified by the ANCI as operators of vital importance, must comply with a series of obligations that will be complemented and detailed in the Regulations of the Framework Law.
Infringements
General infringements
Infringements for operators of vital importance
These operators have additional responsibilities, and the infringements are also classified as minor, serious and very serious depending on the breach of their specific obligations.
Sanctions
Penalties vary according to the seriousness of the infringements.
Cybersecurity Incident
The Framework Law defines a cybersecurity incident as any event that impairs or compromises the confidentiality or integrity of information, the availability or resilience of computer networks and systems, or the authentication of processes executed or implemented in computer networks and systems.
The Framework Law establishes the duty for providers of essential services and operators of vital importance to report cybersecurity incidents with significant effects to the National CSIRT.
The Regulation on Reporting of Incidents of Significant Effects in force from 1 March 2025 states that a cybersecurity incident shall be considered to have a significant impact if it is capable of producing any of the following effects:
In determining the significance of the effects of an incident, the following criteria shall be taken into account:
The Framework Law establishes a procedure for reporting cybersecurity incidents with significant effects as soon as possible and in accordance with a scheme which considers a series of different stages:
Notwithstanding the foregoing, both the National CSIRT and the competent sectoral authority may request relevant updates on the situation.
The Regulation on Reporting of Incidents with Significant Effects in force since 1 March 2025 sets out the specific content that each report and early warning must contain. In addition, it should be noted that an incident will be considered as managed when the background information provided by the affected institutions allows the Agency to declare it as closed.
In the Cybersecurity Framework Law
The heads of service of the state administration agencies shall require information technology service providers to share information on vulnerabilities and incidents that may affect the computer networks and systems of state agencies, and provided that doing so is intended to prevent, detect, respond to, recover from or reduce incidents; or strengthen the level of cybersecurity, while ensuring that the potentially sensitive nature of the information shared is respected.
In order to comply with the above, the contracts for the provision of services may not contain any clause that could restrict or hinder in any way the communication of information about threats by the service provider, as long as this does not compromise the security and protection of data, including confidentiality and protection of intellectual property.
In the State Digital Transformation Law No 21,180
The “Technical Standard for Information Security and Cybersecurity” of the State Digital Transformation Law establishes guidelines and responsibilities for Chilean government bodies regarding information security and cybersecurity.
Responsibilities are structured around key functions:
Additionally, each body must:
In banking and financial matters, Chapter 20-10 of the Updated Compilation of Standards (RAN) establishes the obligation for financial institutions (mainly banks) to define an organisational structure with specialised and dedicated personnel, with the necessary powers and competencies to manage IT security and cybersecurity. In addition, the function of an information security and cybersecurity officer in charge of these matters must be part of this organisational structure.
The board of directors of banking and financial institutions subject to Chapter 20-10 of the Updated Compilation of Standards (RAN) shall establish the above and other matters in relation to their information security and cybersecurity management systems, such as:
There are a large number of other specific operational risk and cybersecurity regulations applicable to other entities participating in the banking and financial system – eg, mutual fund administrators; entities providing fintech services, including investment advisers or alternative transaction platforms; and even entities that will participate in the Open Finance System, which is being implemented gradually until 2027.
Thus, Chapter 20-10 is of general application to certain financial entities (banks, payment card operators and issuers) but shares several provisions with the specific regulations mentioned above.
The contractual requirements for Information and Communication Technology (ICT) service providers are detailed in Chapters 20-7 and 20-10 of the Updated Compilation of Standards (RAN). The most relevant aspects are described below.
Definition of ICT Service Providers
According to the regulations, a service provider is any entity, related or not to the contracting institution, that provides services or supplies goods and facilities. This includes ICT service providers. ICT services can range from data processing to the provision of cloud infrastructure.
General Contractual Requirements
Critical ICT Services
Significant or strategic (critical) activities are considered to be those in which a failure in the provision of the service has a significant impact on regulatory compliance, business continuity, information security, or the quality of the entity’s services.
Also considered critical are activities that involve the processing of data subject to secrecy or banking secrecy, activities with a significant impact on risk management, and those with high systemic interaction in the market.
Cloud Service Providers
Not all cloud service providers are automatically classified as critical. The classification depends on the criticality of the service being outsourced to the cloud.
According to Chapter 20-10, the implementation of an adequate risk management process should include as a minimum:
Moreover, Chapter 20-10 contains a robust set of cybersecurity defensive measures. Within the measures, it is important to highlight the following:
Incident Reporting
The CMF in Chile has established a regulatory framework for the management of operational and cybersecurity incidents in the financial sector, with the aim of protecting users and the stability of the system. This framework applies to various entities, including banks, card issuers, insurers and fintechs, with specific regulations for each type of entity.
With the entry into force of the Cybersecurity Framework Law, it is expected that there will be co-ordination between the CMF and the ANCI.
The CMF requires entities to guarantee access to the information and records of suppliers, both on-site and remotely, even if the supplier is abroad. The CMF reviews the audit reports carried out by the suppliers.
Entities must report to the CMF any operational incident that affects an outsourced service, allowing the CMF to supervise the incident response capacity and recovery plans.
In the event of non-compliance with the regulations, the CMF may require that the services be carried out in the country or that the entity execute them internally, ensuring that the entity maintains a plan that allows it to comply with these requirements.
According to Chapters 20-7 and 20-10 of the RAN, entities must have defined specific data processing sites. In the case of processing abroad, the jurisdiction must be defined and known. The city where the data centres operate must be known.
Moreover, if an entity outsources data processing services outside the country, it must have a contingency data processing centre located in Chile and demonstrate a recovery time compatible with the criticality of the outsourced service. There is the possibility of exemption from this requirement if the entity maintains adequate operational risk management and can ensure preventive measures such as a recovery time objective (RTO) approved by the board of directors, sites with adequate availability time, and sites in different locations that mitigate both geographical and political risks.
In addition, if the outsourced service includes the transmission of data outside the country that is subject to secrecy or banking secrecy (according to Article 154 of the General Banking Law), prior authorisation from each client is required.
Regarding country risk, services can only be outsourced in jurisdictions that have an investment grade country risk rating. If the country does not have this rating, the board of directors may make an exception to this requirement as long as the country has adequate personal data protection and security laws.
Finally, it stands out that communication connections between the entity and the provider must have a level of encryption that ensures the confidentiality and integrity of data from end to end. The processed information must be stored and transported in encrypted form, with the decryption keys held by the entity.
Threat-led penetration testing has not arisen in this jurisdiction.
The Cybersecurity Framework Law refers to the concept of resilience, defining it as the ability of networks and computer systems to maintain their availability and operation, as well as to recover quickly from cybersecurity incidents.
For its part, the National Cybersecurity Policy 2023–2028 establishes as one of its five fundamental objectives the development of a “resilient infrastructure” in the country. This implies that the country must have a robust information infrastructure prepared to withstand and recover from cybersecurity incidents and socio-environmental disasters. To advance this objective, the need to strengthen essential services and improve the response capacity to incidents, both in the public and private sectors, is established.
However, neither the National Cybersecurity Policy nor the Cybersecurity Framework Law specifically establish detailed obligations related to cyber-resilience. It is expected that in the future, the National Cybersecurity Agency will issue general and specific instructions to promote cyber-resilience in the country, especially taking into account the advancement of this type of regulation in the world and the fact that the Cybersecurity Framework Law is especially inspired by the Network and Information Security Directives 1 and 2 of the European Union.
For more information, see 4.1. Cyber-Resilience Legislation.
The Cybersecurity Framework Law establishes a cybersecurity standards certification scheme, mainly focused on operators of vital importance, although it also affects state bodies.
It is expected that there will be greater clarity on the specific certifications that operators of vital importance must have during the first semester of 2025, after the ANCI issues the respective secondary regulations.
In matters of personal data protection, Law No 19,628 on the Protection of Private Life from 1999 is currently in force. This law does not specifically establish cybersecurity obligations. At most, it contains a provision stating that the party responsible for records or databases where personal data is stored after collection must take due care, making them liable for any damages.
Currently, there isn't a single supervisory authority for personal data protection. The Undersecretariat of Telecommunications, the Financial Market Commission, and the Council for Transparency in the public sector have issued regulations or recommendations that, in some sense, also consider the adoption of cybersecurity measures.
One of the most relevant of these authorities is the National Consumer Service (SERNAC), which, thanks to the Pro-Consumer Law, is – temporarily – the supervisory authority for personal data protection within consumer relations. This is until the new Personal Data Protection Law and the new Data Protection Agency come into effect in December 2026.
SERNAC has issued interpretative circulars on the law, which, while not binding for providers, are binding for SERNAC officials in charge of oversight. This could lead to infringement complaints before the courts (SERNAC does not have direct sanctioning powers). Among the most important circulars are the following.
In the field of consumption, SERNAC has interpreted that providers responsible for processing consumers’ personal data must compensate for damage caused by collection, processing, use, disclosure or other processing operations when they have not met the security and professionalism standards of Law No 19,496 on the protection of consumer rights and 19,628 on the protection of privacy.
New Personal Data Protection Law
After extensive legislative discussion that took over seven years, Law No 21,719 was enacted, reforming Law No 19,628. This new law will come into force in December 2026, along with the creation of the National Personal Data Protection Agency. From that moment on, SERNAC will cease to be the controlling authority in this matter.
The new law establishes a Security Principle, according to which the processing of personal data must guarantee adequate security standards, protecting it against unauthorised or illicit processing, loss, leakage, accidental damage or destruction. In addition, security measures must be appropriate and consistent with the type of processing and the nature of the data.
Furthermore, the new law recognises the principle of data protection by design and by default, according to which the data controller must implement technical and organisational measures from the design of the processing of personal data and during its execution, taking into account the state of the art, the costs of implementation, the nature of the data, the context and purposes of the processing, as well as the associated risks. Likewise, by default, only the specific personal data strictly necessary for the activity should be processed.
The new law also includes various obligations related to information security and cybersecurity. Thus, the data controller must adopt the necessary measures to guarantee compliance with the security principle, ensuring the confidentiality, integrity, availability and resilience of data processing systems. They must also prevent the alteration, destruction, loss, processing or unauthorised access to data.
Security measures may include:
In addition, the data controller must report to the Agency any security breach that results in the destruction, leakage, loss or unlawful alteration of data, or unauthorised access to it, especially if there is a risk to the rights of data subjects.
Finally, the data controller must prove the existence and functioning of the implemented security measures in case of dispute.
On the subject of cybersecurity and AI, there are no specific regulations in Chile. Therefore, general rules apply, including the Cybersecurity Framework Law and any specific or general instructions that the National Cybersecurity Agency may issue in this regard.
However, the National Consumer Service (SERNAC), the – temporary – controlling authority for personal data protection in the context of consumer relations, issued an interpretative circular regarding AI systems and consumer safety. It is important to remember that these circulars are not generally binding but only apply to SERNAC officials in the context of supervisory activities, which could result in a complaint being filed with the courts (SERNAC does not have direct sanctioning powers).
In the Interpretative Circular on consumer protection against the use of AI systems – consumer safety, SERNAC has interpreted that, in view of the general obligation incumbent on suppliers to provide security to consumers, AI systems in the context of a consumer relationship must present adequate standards of precision, reliability and technical effectiveness to obtain well-founded results and to avoid causing harm to consumers of a material or immaterial nature.
Thus, suppliers must act responsibly and with due diligence, which implies the need for a prior and continuous assessment of the risks that may arise for consumers from the use of AI systems. In the context of the protection of personal data, SERNAC interprets that in accordance with the regulations on protection of personal data, the data controller responsible for the processing must undertake this processing with “due diligence” (Article 11, Law No 19,628), assuming responsibility for the damages caused.
Specifically, SERNAC interprets this duty as translating into the need to apply appropriate technical and organisational security measures, which guarantee the confidentiality, integrity and availability of the personal data in question, considering especially the risks involved in the processing activities and the nature of the data stored (including, among other elements, their level of sensitivity).
In matters of health services, the Decree No 6/2022 of the Ministry of Health established the “Regulation on actions related to health care carried out remotely”, which is applicable to both public and private health providers. Thus, health providers who provide their services remotely must:
Avda Andrés Bello 2687
Piso 24
Las Condes
Santiago de Chile
Santiago
Chile
+56 232 100 030
+56 2377 9451
contacto@magliona.cl www.magliona.cl