{"id":14531,"date":"2025-07-23T14:28:41","date_gmt":"2025-07-23T20:28:41","guid":{"rendered":"https:\/\/redporlaciberseguridad.org\/?p=14531"},"modified":"2025-07-23T14:38:21","modified_gmt":"2025-07-23T20:38:21","slug":"red-por-la-ciberseguridad-participa-en-el-congreso-nacional-sobre-derechos-de-infancias-y-adolescencias-en-zacatecas","status":"publish","type":"post","link":"https:\/\/redporlaciberseguridad.org\/en\/red-por-la-ciberseguridad-participa-en-el-congreso-nacional-sobre-derechos-de-infancias-y-adolescencias-en-zacatecas\/","title":{"rendered":"Red por la Ciberseguridad participa en el Congreso Nacional sobre Derechos de Infancias y Adolescencias en Zacatecas"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"14531\" class=\"elementor elementor-14531\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9dc3fd e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"e9dc3fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa98429 elementor-widget elementor-widget-text-editor\" data-id=\"fa98429\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"228\" data-end=\"608\">Recientemente, en Zacatecas se celebr\u00f3 el <strong data-start=\"270\" data-end=\"335\">Congreso Nacional sobre Derechos de Infancias y Adolescencias<\/strong>, que reuni\u00f3 a las y los Presidentes de las Comisiones de Derechos Humanos de las 32 entidades federativas de M\u00e9xico. En este importante espacio, <strong data-start=\"481\" data-end=\"607\">Red por la Ciberseguridad particip\u00f3 con una presentaci\u00f3n enfocada en los derechos digitales de ni\u00f1as, ni\u00f1os y adolescentes<\/strong>.<\/p><p data-start=\"610\" data-end=\"1063\">Durante la intervenci\u00f3n, se reflexion\u00f3 sobre las brechas y oportunidades que existen en el acceso y uso de tecnolog\u00edas, poniendo especial atenci\u00f3n en la necesidad de garantizar que las nuevas generaciones puedan ejercer plenamente sus derechos tambi\u00e9n en el mundo digital. Se enfatiz\u00f3 la importancia de impulsar espacios seguros y accesibles donde la tecnolog\u00eda funcione como una herramienta de inclusi\u00f3n, protecci\u00f3n y empoderamiento para las infancias.<\/p><p data-start=\"1065\" data-end=\"1399\">Entre los puntos destacados, surgi\u00f3 un compromiso firme por continuar promoviendo iniciativas que aseguren el uso responsable y \u00e9tico de la tecnolog\u00eda, as\u00ed como cuestionamientos clave sobre el impacto que la inteligencia artificial y otras tecnolog\u00edas tienen en la formaci\u00f3n y ejercicio de los derechos de ni\u00f1as, ni\u00f1os y adolescentes.<\/p><p data-start=\"1401\" data-end=\"1667\">Este congreso reafirma la importancia de construir alianzas entre autoridades, especialistas y sociedad civil para avanzar hacia un futuro donde los derechos de las infancias sean respetados y ampliados en todos los \u00e1mbitos, con especial atenci\u00f3n al entorno digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-896254b e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"896254b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-163beef e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"163beef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b5e794 elementor-widget elementor-widget-image\" data-id=\"8b5e794\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/07\/shared-image-3.jpg\" class=\"attachment-large size-large wp-image-14533\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70d1131 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"70d1131\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-95d0c8e elementor-widget elementor-widget-image\" data-id=\"95d0c8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/07\/shared-image-2.jpg\" class=\"attachment-large size-large wp-image-14534\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Se reflexion\u00f3 sobre las brechas y oportunidades que existen en el acceso y uso de tecnolog\u00edas, poniendo especial atenci\u00f3n en la necesidad de garantizar que las nuevas generaciones puedan ejercer plenamente sus derechos tambi\u00e9n en el mundo digital.<\/p>","protected":false},"author":3,"featured_media":14533,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[88,22],"tags":[],"class_list":["post-14531","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-noticias"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/14531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=14531"}],"version-history":[{"count":6,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/14531\/revisions"}],"predecessor-version":[{"id":14540,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/14531\/revisions\/14540"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media\/14533"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=14531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/categories?post=14531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/tags?post=14531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}