Return to Article Details Strategy for responding to computer incidents of insecurity set in Ecuadorian law Download Download PDF