{"id":12053,"date":"2025-12-15T22:54:05","date_gmt":"2025-12-15T21:54:05","guid":{"rendered":"https:\/\/www.in-diem.com\/abogados\/uncategorized\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp"},"modified":"2026-03-14T13:49:59","modified_gmt":"2026-03-14T12:49:59","slug":"computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp","status":"publish","type":"post","link":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp","title":{"rendered":"Computer Sabotage in Public Administrations and Emergency Contracts under the LCSP"},"content":{"rendered":"\n<p>Cyberattacks against Spanish public bodies have intensified in recent years, jeopardizing the continuity of essential services and exposing critical vulnerabilities in the State&#8217;s digital infrastructure. From denial-of-service attacks to sophisticated ransomware programs, <strong>massive hacks and actions by organized hackers<\/strong> that encrypt entire databases, <strong>Public Administrations face a permanent threat that requires agile and effective legal responses.<\/strong> <\/p>\n\n<p>When computer sabotage, a <strong>hack<\/strong>, or a <strong>hacking<\/strong> attack paralyzes critical systems\u2014such as municipal tax management, the census, local health services, or electronic administrative processing\u2014especially in <strong>city councils and local entities<\/strong>, public officials must act immediately. In this context, the <strong>emergency contract<\/strong> regulated in Article 120 of <a href=\"https:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-2017-12902\">Law 9\/2017, of November 8, on Public Sector Contracts (LCSP)<\/a> emerges as a fundamental legal tool that allows for contracting without following ordinary bidding procedures. <\/p>\n\n<p>At <strong>IN DIEM Abogados<\/strong>, we regularly advise <strong>city councils and Public Administrations<\/strong> on the legal management of <strong>cybersecurity incidents, hacks, and computer attacks<\/strong>, analyzing when a cyberattack can legally justify an emergency contract, what requirements must be met, what risks its improper use entails, and how to correctly document the file to pass subsequent auditing.<\/p>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong>What is considered computer sabotage in the Public Administration?<\/strong><\/h2>\n\n<p>The <strong><em>computer sabotage<\/em><\/strong> constitutes a specific form of cyberattack aimed at <strong>deliberately damaging, altering, or disabling computer systems<\/strong>. Unlike other digital threats, sabotage seeks to cause direct harm to the operability of systems, causing service interruptions, data destruction, or blocking access to critical resources. <\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>In administrative practice, these scenarios usually materialize through <strong>hacks<\/strong> executed by individual <strong>hackers<\/strong> or organized groups, who exploit technical vulnerabilities to gain illicit access to public systems. Although terms like hack or hacking are used in common language, from a legal point of view, only those attacks that cause serious and deliberate damage to systems can be classified as computer sabotage. <\/p>\n<\/blockquote>\n\n<p>Legally, the <a href=\"https:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-1995-25444\">Spanish Penal Code<\/a> criminalizes these acts in Articles 264 and following, punishing anyone who <em>&#8220;by any means, without authorization and in a serious manner, deletes, damages, deteriorates, alters, suppresses, or makes inaccessible data, computer programs, or electronic documents belonging to others&#8221;<\/em>. When these attacks affect critical infrastructures or essential services of Public Administrations, the penalties are considerably increased. <\/p>\n\n<p>It is important to distinguish between concepts that, although related, are not identical.<\/p>\n\n<ul class=\"wp-block-list\">\n<li>A <strong>cyberattack<\/strong> is any malicious action against computer systems (phishing, malware, unauthorized intrusions).<\/li>\n\n\n\n<li><strong>Computer sabotage<\/strong> implies a specific intent to cause serious harm and destabilize operations.<\/li>\n\n\n\n<li>On the other hand, a <strong>security incident<\/strong> may include technical failures, human errors, or lower-impact attacks that do not necessarily constitute sabotage.<\/li>\n<\/ul>\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-bfa34f8cbf7542d9e42f6a315fde97ac\"><strong>Not every cyberattack is sabotage.<\/strong><\/p>\n\n<p>The <a href=\"https:\/\/www.incibe.es\/\">National Institute of Cybersecurity<\/a> (INCIBE) and the <a href=\"https:\/\/www.ccn-cert.cni.es\/es\/\">National Cryptologic Center<\/a> &#8211; Government CERT (CCN-CERT) are the official bodies that coordinate the response to these incidents in the Spanish public sector, providing alerts, forensic analysis, and action protocols for critical threats.<\/p>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong><strong>Most frequent types of computer sabotage, hacks, and hacking attacks<\/strong><\/strong><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><strong>Ransomware<\/strong>: Encryption of critical data with a demand for a financial ransom for its recovery.<\/li>\n\n\n\n<li><strong>Denial-of-service (DDoS) attacks:<\/strong> Server saturation that prevents access to electronic headquarters and public services.<\/li>\n\n\n\n<li><strong>Database destruction:<\/strong> Deletion or corruption of administrative information and essential records.<\/li>\n\n\n\n<li><strong>Manipulation of sensitive data:<\/strong> Alteration of tax, health, or administrative information with a direct impact on citizens.<\/li>\n\n\n\n<li><strong>Unauthorized access to internal systems:<\/strong> Intrusions into public networks for the theft of confidential information or operational sabotage.<\/li>\n\n\n\n<li><strong>Blocking of critical digital infrastructures:<\/strong> Paralysis of key systems such as tax management, justice, healthcare, or municipal census.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong>Impact of computer sabotage on public services<\/strong><\/h2>\n\n<p>The consequences of computer sabotage in a Public Administration go far beyond the technical sphere. The interruption of systems can <strong>prevent the provision of essential services to citizens<\/strong>, affecting fundamental rights and generating serious <strong>social and economic harm<\/strong>. <\/p>\n\n<p>An attack that blocks a hospital&#8217;s systems <strong>compromises the safety<\/strong> of patients. Sabotage in a tax administration <strong>can paralyze collection and file management<\/strong>. The failure of judicial platforms delays proceedings and violates the right to effective judicial protection.  <\/p>\n\n<p>The <strong>risks to personal data<\/strong> are equally critical. Administrations safeguard sensitive information of millions of citizens\u2014health data, tax information, criminal records, data on minors\u2014whose exposure or destruction constitutes a violation of the <a href=\"https:\/\/www.boe.es\/doue\/2016\/119\/L00001-00088.pdf\">General Data Protection Regulation<\/a> and <a href=\"https:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-2018-16673\">Organic Law 3\/2018 on Data Protection and Guarantee of Digital Rights<\/a>. The <strong><a href=\"https:\/\/www.aepd.es\/\">Spanish Data Protection Agency<\/a><\/strong> can impose million-euro fines for non-compliance resulting from inadequate management of security breaches.  <\/p>\n\n<p>Given this scenario, <strong>the Administration has the obligation to act quickly to restore services<\/strong>, which justifies the use of exceptional procurement mechanisms when legal requirements are met.<\/p>\n\n<p>And it is <strong><em>important<\/em><\/strong> to understand that, from an administrative perspective, the officials of the affected body assume <strong>direct responsibility<\/strong> for the crisis management. Inaction or an inadequate response can generate <strong><em>financial liability<\/em><\/strong> toward injured third parties and, in serious cases, <strong><em>personal liability<\/em><\/strong> for public managers. <\/p>\n\n<p>In the local sphere, <strong>city councils<\/strong> are especially vulnerable to this type of <strong>hacking<\/strong>, as they manage multiple essential services with limited technical resources. The paralysis of municipal electronic headquarters, administrative registries, or economic management systems can directly affect thousands of citizens, reinforcing the need for a correctly articulated immediate legal and technical response. <\/p>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong>The emergency contract in the Public Sector Contracts Law<\/strong><\/h2>\n\n<p>The <strong>Article 120 of the LCSP<\/strong> regulates the emergency contract as an exceptional procedure that allows for contracting without following ordinary procedures when it is necessary to act immediately in the face of catastrophic events, situations of grave danger, or needs that do not allow for delay.<\/p>\n\n<p>This type of contract allows for the direct awarding of works, services, or supplies without prior bidding, without publicity, and without the usual deadlines. Its purpose is to guarantee an immediate response when the urgency is incompatible with ordinary procurement procedures. <\/p>\n\n<p>However, its use is subject to very clear limits. <strong>The emergency contract can only cover what is strictly necessary to address the critical situation and for the essential duration. <\/strong>Furthermore, even if there is no prior bidding, the expenditure is subject to subsequent auditing by the control bodies.<\/p>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong>When can a cyberattack justify an emergency contract?<\/strong><\/h2>\n\n<p>Nevertheless, this extraordinary power is subject to <strong>strict limits.<\/strong> Emergency procurement can only be used for what is strictly necessary during the essential time to resolve the urgent situation. The <strong>LCSP<\/strong> establishes that these contracts cannot exceed four months, although they may be extended for another four in duly justified exceptional cases. Additionally, the price must be reasonable and in line with the market, avoiding the unjustified enrichment of the contractor due to the situation of necessity.  <\/p>\n\n<p>Transparency and accountability are safeguarded by the obligation to immediately communicate the processing of the file to the competent fiscal control body, which will subsequently audit the fulfillment of legal requirements and the adequacy of the expenditure. This subsequent auditing constitutes an essential control over the use of exceptional mechanisms that involve a temporary breach of the ordinary principles of competition and publicity. <\/p>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong>Can a cyberattack justify an emergency contract?<\/strong><\/h2>\n\n<p>A <strong>computer sabotage can legally justify an emergency contract<\/strong> provided that <strong>three essential requirements are met simultaneously.<\/strong><\/p>\n\n<ol class=\"wp-block-list\">\n<li>Firstly, there must be <strong><em>an objective emergency situation<\/em><\/strong>, characterized by its severity, unpredictability, and capacity to paralyze essential public services.<\/li>\n\n\n\n<li>Secondly, <strong><em>it must be proven that it is impossible to use an ordinary procedure<\/em><\/strong> or even an urgent one without aggravating the damage or unacceptably delaying the recovery of the service. Not all security incidents allow for emergency procedures; only those that require immediate action. <\/li>\n\n\n\n<li>Finally, <strong><em>there must be a direct relationship between the attack suffered and the services contracted<\/em><\/strong>. The services must be aimed at containing the incident, recovering systems, forensic analysis, or restoring operability, not at structural improvements that can be put out to tender later. <\/li>\n<\/ol>\n\n<p>The <strong>Administration must exhaustively document these circumstances<\/strong>, as the burden of proof lies with the contracting body.<\/p>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong>Fundamental difference between urgency and emergency<\/strong><\/h2>\n\n<p>It is essential to distinguish between urgency and emergency. <strong><em>Urgency<\/em><\/strong>, regulated in Article 119 of the LCSP, allows for the acceleration of deadlines but maintains the basic guarantees of the procurement procedure. <strong><em>Emergency<\/em><\/strong>, on the other hand, enables the bypassing of those procedures in exceptional situations. A security incident that requires rapid action but can be managed through an ordinary urgent procedure does not justify resorting to an emergency contract.   <\/p>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong>Legal risks of improper use of the emergency contract<\/strong><\/h2>\n\n<p>The incorrect use of the emergency procedure entails <strong>serious legal consequences<\/strong> for both the Administration and the officials who make the decision. Fiscal control bodies, especially the <a href=\"https:\/\/www.tcu.es\/es\/\">Court of Auditors<\/a> and regional and local audit departments, examine these files with particular rigor precisely because of their exceptional nature. <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Declaration of nullity of the contract<\/strong><\/li>\n<\/ul>\n\n<p>If the subsequent audit determines that the legal requirements to use the emergency procedure were not met, the contract may be declared null and void for violating mandatory rules.<\/p>\n\n<p>Although this nullity does not prevent the contractor from receiving the amount corresponding to the services already executed\u2014to avoid unjust enrichment\u2014it does cause significant administrative, legal, and reputational problems for the Administration.<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Responsibility of the contracting body<\/strong><\/li>\n<\/ul>\n\n<p>Public officials who irregularly process an emergency contract may incur accounting liability when their actions cause financial harm to the public treasury.<\/p>\n\n<p>The Court of Auditors may demand the reimbursement of the amounts improperly paid, along with the corresponding interest.<\/p>\n\n<p>In cases of gross negligence or bad faith, criminal liabilities may even arise, such as crimes of embezzlement or malfeasance.<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Disqualifications and professional consequences<\/strong><\/li>\n<\/ul>\n\n<p>Irregular procurement can lead to disqualifications from holding public office, as well as disciplinary sanctions for the officials involved. These consequences directly affect the professional careers of public managers. <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Obligation to indemnify injured third parties<\/strong><\/li>\n<\/ul>\n\n<p>If it is proven that the improper use of the emergency procedure unjustifiably prevented competition, the Administration may be forced to indemnify third parties who were harmed.<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Challenges by excluded companies<\/strong><\/li>\n<\/ul>\n\n<p>Companies that did not participate in the emergency contract cannot challenge it if the emergency was correctly justified.<\/p>\n\n<p>However, they can do so when they manage to demonstrate that a real emergency situation did not exist, opening the door to appeals and claims with significant legal consequences.<\/p>\n\n<p>The <em><strong>importance of correctly documenting<\/strong><\/em> every step of the file is crucial. The file must contain a detailed technical report on the incident and its severity, a legal opinion on the appropriateness of the emergency procedure, proof of the impossibility of using other channels, justification for the choice of contractor, and complete documentation of all actions taken. This documentation not only fulfills formal requirements but also constitutes essential evidence in the event of a subsequent audit.  <\/p>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong>Opportunities for technology companies and public sector providers<\/strong><\/h2>\n\n<p><strong>Emergency contracts resulting from cyberattacks represent a significant opportunity for companies specialized in cybersecurity, system recovery, and digital forensic analysis. <\/strong>However, these opportunities are only sustainable if one acts with rigor, transparency, and market-adjusted prices.<\/p>\n\n<p>In critical situations, Administrations usually turn to providers with proven experience and immediate response capacity. Therefore, prior preparation, certifications, and knowledge of the legal framework of public procurement are decisive. <\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Most demanded services in cyberattack emergencies<\/h3>\n\n<ul class=\"wp-block-list\">\n<li>Digital forensic analysis to determine the origin, scope, and authorship of the attack<\/li>\n\n\n\n<li>Immediate recovery of compromised systems through backup restoration or infrastructure reconstruction<\/li>\n\n\n\n<li>Urgent implementation of security patches and critical updates<\/li>\n\n\n\n<li>Temporary reinforcement of infrastructure through cloud services or backup servers<\/li>\n\n\n\n<li>Intensive monitoring of systems during the critical period<\/li>\n\n\n\n<li>Specialized technical advice for decision-making during crisis management<\/li>\n<\/ul>\n\n<p>For provider companies, it is essential to understand that the <strong>absence of bidding does not imply an absence of controls.<\/strong> Although the emergency procedure bypasses publicity and competition, the contractor must scrupulously fulfill all contractual obligations, exhaustively document their actions, and adjust their fees to market criteria. Abusive prices or deficient services can lead to financial claims and future disqualifications from contracting with the public sector. <\/p>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong>Importance of specialized legal advice<\/strong><\/h2>\n\n<p>Prior <strong>legal advice<\/strong> constitutes a strategic investment for both companies and Administrations. Technology providers must have specialized advice in public procurement to properly structure their offers, know their rights and obligations, and correctly manage contractual documentation. This advice also allows for the identification of legitimate opportunities for collaboration with the public sector beyond emergencies, through framework agreements, dynamic acquisition systems, or ordinary procedures that guarantee a stable and predictable contractual relationship.  <\/p>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong>How Can IN DIEM Help You?<\/strong><\/h2>\n\n<p><strong>IN DIEM Abogados<\/strong> provides specialized legal advice to <strong>city councils and public sector entities<\/strong> in the management of <strong>cybersecurity incidents, hacks, and computer sabotage<\/strong>, accompanying contracting bodies from the initial phase of the crisis to the correct processing and defense of the emergency procurement file.<\/p>\n\n<p>The technical and legal complexity of emergency contracts due to cyberattacks requires <strong>highly specialized advice<\/strong> that integrates deep knowledge of public procurement, digital law, and cybersecurity. Firms with experience in this field can provide value to both contracting Administrations and provider companies. <\/p>\n\n<h3 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color has-medium-font-size wp-elements-3732658e7ee22ef2d9bb5072b7ce061d\"><strong>Legal services for Public Administrations<\/strong><\/h3>\n\n<p>For Public Administrations, preventive legal advice is fundamental for designing action protocols for critical incidents that allow for an agile response without incurring irregularities. This includes the preparation of contingency plans that identify in advance which services would be critical in the event of a cyberattack, which providers could act quickly, and what documentation must be prepared to justify the emergency. <\/p>\n\n<p>During crisis management, legal support allows for the <strong>correct processing of the emergency file<\/strong>, ensuring that all legal requirements are met, that the supporting documentation is solid and complete, and that the decisions made are defensible before control bodies. This assistance includes drafting legal reports, reviewing technical proposals, negotiating contractual conditions, and supervising the fulfillment of formal obligations. <\/p>\n\n<h3 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color has-medium-font-size wp-elements-f54255fe1c91b26ec05b53a3b8ca4ba4\"><strong>Legal services for provider companies<\/strong><\/h3>\n\n<p>The <strong>subsequent review<\/strong> of the file constitutes another high-value service. An independent legal analysis before the official audit allows for the identification of documentary weaknesses, the correction of formal deficiencies, and the preparation of defensive arguments against possible objections. This preventive review significantly reduces the risks of subsequent questioning and facilitates passing fiscal controls.  <\/p>\n\n<p>For <strong>technology and consulting companies<\/strong>, specialized advice allows for an understanding of the specific demands of the public sector, adapting their business models to the particularities of administrative contracting and properly managing contractual relationships with public bodies. This includes designing commercial strategies compatible with procurement regulations, preparing solid technical-legal offers, and managing contractual incidents. <\/p>\n\n<p>The <strong><em>experience accumulated in real cases<\/em><\/strong> allows these firms to offer a practical approach based on precedents, resolutions from advisory bodies, and consolidated administrative doctrine. This applied knowledge is especially valuable in a field where case studies are decisive and where small nuances in documentation or procedure can make the difference between an impeccable file and a questionable one. <\/p>\n\n\n\n\n    <meta charset=\"UTF-8\"\/><meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\"\/><title>Infograf\u00eda Sabotaje Inform\u00e1tico<\/title><style>@import url('https:\/\/fonts.googleapis.com\/css2?family=Inter:wght@400;600;700&display=swap');\n        \n        * {\n            margin: 0;\n            padding: 0;\n            box-sizing: border-box;\n        }\n        \n        body {\n            font-family: 'Inter', -apple-system, BlinkMacSystemFont, sans-serif;\n            background: #f5f5f5;\n            padding: 20px;\n            display: flex;\n            justify-content: center;\n            align-items: center;\n            min-height: 100vh;\n        }\n        \n        .infografia {\n            width: 800px;\n            background: white;\n            box-shadow: 0 4px 20px rgba(0,0,0,0.1);\n        }\n        \n        .header {\n            background: linear-gradient(135deg, #0A3151 0%, #164365 100%);\n            color: white;\n            padding: 40px 30px;\n            text-align: center;\n        }\n        \n        .header h1 {\n            font-size: 26px;\n            font-weight: 700;\n            line-height: 1.3;\n            margin-bottom: 15px;\n        }\n        \n        .header .subtitulo {\n            font-size: 14px;\n            opacity: 0.9;\n            font-weight: 400;\n        }\n        \n        .contenido {\n            padding: 35px 30px;\n        }\n        \n        .seccion {\n            margin-bottom: 30px;\n        }\n        \n        .seccion-titulo {\n            background: #33B4D6;\n            color: white;\n            padding: 12px 20px;\n            font-size: 16px;\n            font-weight: 700;\n            margin-bottom: 15px;\n            border-radius: 4px;\n            display: flex;\n            align-items: center;\n            gap: 10px;\n        }\n        \n        .numero {\n            background: white;\n            color: #33B4D6;\n            width: 28px;\n            height: 28px;\n            border-radius: 50%;\n            display: flex;\n            align-items: center;\n            justify-content: center;\n            font-weight: 700;\n            font-size: 14px;\n        }\n        \n        .contenido-seccion {\n            padding-left: 20px;\n        }\n        \n        .item {\n            margin-bottom: 12px;\n            padding-left: 20px;\n            position: relative;\n            font-size: 14px;\n            line-height: 1.6;\n            color: #333;\n        }\n        \n        .item:before {\n            content: \"\u25b8\";\n            position: absolute;\n            left: 0;\n            color: #33B4D6;\n            font-weight: 700;\n        }\n        \n        .destacado {\n            background: #E6E6E6;\n            padding: 20px;\n            border-radius: 4px;\n            border-left: 4px solid #0A3151;\n            margin-top: 15px;\n        }\n        \n        .destacado-titulo {\n            font-weight: 700;\n            color: #0A3151;\n            margin-bottom: 8px;\n            font-size: 15px;\n        }\n        \n        .destacado-texto {\n            font-size: 13px;\n            line-height: 1.5;\n            color: #444;\n        }\n        \n        .requisitos {\n            display: grid;\n            grid-template-columns: 1fr 1fr 1fr;\n            gap: 15px;\n            margin-top: 15px;\n        }\n        \n        .requisito-box {\n            background: white;\n            border: 2px solid #33B4D6;\n            padding: 15px;\n            border-radius: 4px;\n            text-align: center;\n        }\n        \n        .requisito-numero {\n            background: #33B4D6;\n            color: white;\n            width: 32px;\n            height: 32px;\n            border-radius: 50%;\n            display: flex;\n            align-items: center;\n            justify-content: center;\n            font-weight: 700;\n            margin: 0 auto 10px;\n            font-size: 16px;\n        }\n        \n        .requisito-texto {\n            font-size: 12px;\n            font-weight: 600;\n            color: #0A3151;\n            line-height: 1.4;\n        }\n        \n        .alerta {\n            background: #0A3151;\n            color: white;\n            padding: 20px;\n            border-radius: 4px;\n            margin: 25px 0;\n        }\n        \n        .alerta-titulo {\n            font-weight: 700;\n            font-size: 15px;\n            margin-bottom: 10px;\n            display: flex;\n            align-items: center;\n            gap: 8px;\n        }\n        \n        .alerta-contenido {\n            font-size: 13px;\n            line-height: 1.5;\n        }\n        \n        .footer {\n            background: #E6E6E6;\n            padding: 25px 30px;\n            text-align: center;\n            border-top: 3px solid #33B4D6;\n        }\n        \n        .footer-titulo {\n            font-weight: 700;\n            color: #0A3151;\n            font-size: 16px;\n            margin-bottom: 10px;\n        }\n        \n        .footer-texto {\n            font-size: 13px;\n            color: #555;\n            line-height: 1.5;\n        }\n        \n        @media print {\n            body {\n                padding: 0;\n                background: white;\n            }\n            .infografia {\n                box-shadow: none;\n            }\n        }\n    <\/style><div class=\"infografia\"><div class=\"header\"><h1>Sabotaje Inform\u00e1tico en las Administraciones P\u00fablicas y el Contrato de Emergencia<\/h1><div class=\"subtitulo\">Gu\u00eda r\u00e1pida sobre la respuesta jur\u00eddica ante ciberataques | LCSP Art. 120<\/div><\/div><div class=\"contenido\"><div class=\"seccion\"><div class=\"seccion-titulo\"><span class=\"numero\">1<\/span><span>\u00bfQu\u00e9 es el sabotaje inform\u00e1tico?<\/span><\/div><div class=\"contenido-seccion\"><div class=\"item\">Acci\u00f3n deliberada para da\u00f1ar o inutilizar sistemas inform\u00e1ticos<\/div><div class=\"item\">Paralizaci\u00f3n de servicios p\u00fablicos esenciales<\/div><div class=\"item\">Destrucci\u00f3n o cifrado de datos (ransomware)<\/div><div class=\"item\">Tipificado en el C\u00f3digo Penal (arts. 264 y ss.)<\/div><\/div><\/div><div class=\"seccion\"><div class=\"seccion-titulo\"><span class=\"numero\">2<\/span><span>\u00bfQu\u00e9 es el contrato de emergencia?<\/span><\/div><div class=\"contenido-seccion\"><div class=\"item\">Procedimiento excepcional regulado en el art. 120 LCSP<\/div><div class=\"item\">Permite contratar sin licitaci\u00f3n previa<\/div><div class=\"item\">Solo ante acontecimientos catastr\u00f3ficos o grave peligro<\/div><div class=\"item\">Duraci\u00f3n m\u00e1xima: 4 meses (prorrogable a 8)<\/div><\/div><\/div><div class=\"seccion\"><div class=\"seccion-titulo\"><span class=\"numero\">3<\/span><span>Requisitos para justificar la emergencia<\/span><\/div><div class=\"requisitos\"><div class=\"requisito-box\"><div class=\"requisito-numero\">1<\/div><div class=\"requisito-texto\">Situaci\u00f3n extraordinaria e imprevisible<\/div><\/div><div class=\"requisito-box\"><div class=\"requisito-numero\">2<\/div><div class=\"requisito-texto\">Necesidad de actuaci\u00f3n inmediata<\/div><\/div><div class=\"requisito-box\"><div class=\"requisito-numero\">3<\/div><div class=\"requisito-texto\">Relaci\u00f3n directa con la crisis<\/div><\/div><\/div><div class=\"destacado\"><div class=\"destacado-titulo\">\u26a0\ufe0f Urgencia \u2260 Emergencia<\/div><div class=\"destacado-texto\">La urgencia acelera plazos. La emergencia permite prescindir de licitaci\u00f3n. No confundirlas evita riesgos legales.<\/div><\/div><\/div><div class=\"alerta\"><div class=\"alerta-titulo\"><span>\ud83d\udee1\ufe0f<\/span><span>Riesgos del uso indebido<\/span><\/div><div class=\"alerta-contenido\"><strong>\u2022 Nulidad del contrato<\/strong> si no concurren los requisitos<br\/><strong>\u2022 Responsabilidad contable<\/strong> del \u00f3rgano de contrataci\u00f3n<br\/><strong>\u2022 Fiscalizaci\u00f3n posterior<\/strong> obligatoria por el Tribunal de Cuentas<br\/><strong>\u2022 Inhabilitaciones<\/strong> y sanciones por uso irregular\n                <\/div><\/div><div class=\"seccion\"><div class=\"seccion-titulo\"><span class=\"numero\">4<\/span><span>Servicios contratables en emergencia<\/span><\/div><div class=\"contenido-seccion\"><div class=\"item\">An\u00e1lisis forense digital del ciberataque<\/div><div class=\"item\">Recuperaci\u00f3n inmediata de sistemas cr\u00edticos<\/div><div class=\"item\">Implementaci\u00f3n urgente de parches de seguridad<\/div><div class=\"item\">Infraestructura temporal de respaldo (cloud)<\/div><div class=\"item\">Monitorizaci\u00f3n intensiva durante la crisis<\/div><\/div><\/div><\/div><div class=\"footer\"><div class=\"footer-titulo\">\ud83d\udccb Clave: Documentaci\u00f3n exhaustiva<\/div><div class=\"footer-texto\">Informe t\u00e9cnico + dictamen jur\u00eddico + justificaci\u00f3n de imposibilidad de otros cauces.<br\/>La correcta documentaci\u00f3n es esencial para superar la fiscalizaci\u00f3n posterior.\n            <\/div><\/div><\/div>\n\n<p><\/p>\n\n<h3 class=\"wp-block-heading has-luminous-vivid-orange-color has-text-color has-link-color has-medium-font-size wp-elements-bdb5915a4bf8a42181d703ad65293e8c\"><strong>Contact us. Contact us for specialized advice.  <\/strong><\/h3>\n\n<p>If a <strong>Public Administration<\/strong>, especially a <strong>city council<\/strong>, faces a <strong>cyberattack, hack, or serious computer security incident<\/strong>, or needs <strong>specialized legal advice on public procurement, emergency contracts, and digital law<\/strong>, having expert legal support is decisive for acting with speed, legal certainty, and full coverage before control bodies.<\/p>\n\n<p>At <strong>IN DIEM Abogados<\/strong>, we advise <strong>local entities and public bodies<\/strong> on the legal management of technological crises, the correct processing of emergency contracts in accordance with the LCSP, and the prevention of administrative, accounting, or criminal liabilities.<br\/>Contact our firm to <strong>analyze your specific situation<\/strong> and receive advice tailored to the needs and particularities of your Administration.<\/p>\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-luminous-vivid-orange-color has-text-color has-link-color wp-elements-000e6537e9bfc85750c3b4963b063fcb\"><strong>We are here to help you.<\/strong><\/p>\n<\/div><\/div>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0029a4;font-size:22px;font-style:normal;font-weight:400\"><strong>Frequently Asked Questions (FAQs)<\/strong><\/h2>\n<p><div class=\"gdlr-shortcode-wrapper\"><div class=\"gdlr-item gdlr-accordion-item style-1\"  ><div class=\"accordion-tab active pre-active\" ><h4 class=\"accordion-title\" ><i class=\"icon-minus\" ><\/i><span>\u00bfQu\u00e9 diferencia hay entre un ciberataque y un sabotaje inform\u00e1tico?<\/span><\/h4><div class=\"accordion-content\"><p>Un ciberataque es cualquier acci\u00f3n maliciosa dirigida contra sistemas inform\u00e1ticos, incluyendo phishing, malware o intrusiones no autorizadas. El sabotaje inform\u00e1tico es un tipo espec\u00edfico de ciberataque con intencionalidad de causar da\u00f1o grave, destruir datos o paralizar operaciones de manera deliberada. El sabotaje implica mayor gravedad y consecuencias m\u00e1s severas.<\/p>\n<\/div><\/div><div class=\"accordion-tab\" ><h4 class=\"accordion-title\" ><i class=\"icon-plus\" ><\/i><span>\u00bfCualquier incidente de seguridad justifica un contrato de emergencia?<\/span><\/h4><div class=\"accordion-content\"><p>No. Solo los incidentes que cumplan simult\u00e1neamente tres requisitos: situaci\u00f3n extraordinaria e imprevisible, necesidad de actuaci\u00f3n inmediata sin posibilidad de esperar procedimientos ordinarios, y relaci\u00f3n directa entre la emergencia y los servicios a contratar. Un simple fallo t\u00e9cnico o un incidente menor no justifican este procedimiento excepcional.<\/p>\n<\/div><\/div><div class=\"accordion-tab\" ><h4 class=\"accordion-title\" ><i class=\"icon-plus\" ><\/i><span>\u00bfCu\u00e1nto tiempo puede durar un contrato de emergencia por ciberataque?<\/span><\/h4><div class=\"accordion-content\"><p>La LCSP establece una duraci\u00f3n m\u00e1xima de cuatro meses, prorrogable excepcionalmente por otros cuatro meses adicionales si persiste la situaci\u00f3n de emergencia. El contrato debe limitarse al tiempo estrictamente necesario para superar la crisis y restablecer los servicios afectados.<\/p>\n<\/div><\/div><div class=\"accordion-tab\" ><h4 class=\"accordion-title\" ><i class=\"icon-plus\" ><\/i><span>\u00bfPuede una Administraci\u00f3n contratar a cualquier empresa en emergencia?<\/span><\/h4><div class=\"accordion-content\"><p>Formalmente s\u00ed, puede adjudicar directamente sin licitaci\u00f3n. Sin embargo, debe elegir empresas con capacidad t\u00e9cnica acreditada, experiencia demostrable y precios razonables de mercado. La elecci\u00f3n debe ser justificada y documentada, ya que ser\u00e1 objeto de fiscalizaci\u00f3n posterior por los \u00f3rganos de control.<\/p>\n<\/div><\/div><div class=\"accordion-tab\" ><h4 class=\"accordion-title\" ><i class=\"icon-plus\" ><\/i><span>\u00bfQu\u00e9 organismos fiscalizan los contratos de emergencia?<\/span><\/h4><div class=\"accordion-content\"><p>El Tribunal de Cuentas a nivel estatal, los \u00f3rganos de control externo auton\u00f3micos, las intervenciones generales correspondientes y, en algunos casos, el Tribunal Administrativo Central de Recursos Contractuales. Todos estos \u00f3rganos pueden revisar la legalidad y adecuaci\u00f3n del procedimiento de emergencia utilizado.<\/p>\n<\/div><\/div><div class=\"accordion-tab\" ><h4 class=\"accordion-title\" ><i class=\"icon-plus\" ><\/i><span>\u00bfPuede declararse nulo un contrato de emergencia ya ejecutado?<\/span><\/h4><div class=\"accordion-content\"><p>S\u00ed. Si la fiscalizaci\u00f3n posterior determina que no concurr\u00edan los requisitos legales, el contrato puede declararse nulo de pleno derecho. Aunque el contratista cobrar\u00e1 por las prestaciones ejecutadas para evitar enriquecimiento injusto, la Administraci\u00f3n y sus responsables pueden incurrir en responsabilidades contables y administrativas.<\/p>\n<\/div><\/div><div class=\"accordion-tab\" ><h4 class=\"accordion-title\" ><i class=\"icon-plus\" ><\/i><span>\u00bfQu\u00e9 responsabilidades asume el \u00f3rgano de contrataci\u00f3n?<\/span><\/h4><div class=\"accordion-content\"><p>Puede incurrir en responsabilidad contable si el uso indebido del procedimiento caus\u00f3 perjuicio econ\u00f3mico, responsabilidad disciplinaria por incumplimiento de normas administrativas, e incluso responsabilidad penal en casos de negligencia grave o prevaricaci\u00f3n. La documentaci\u00f3n exhaustiva resulta crucial para evitar estos riesgos.<\/p>\n<\/div><\/div><div class=\"accordion-tab\" ><h4 class=\"accordion-title\" ><i class=\"icon-plus\" ><\/i><span>\u00bfLas empresas IT necesitan certificaciones especiales para estos contratos?<\/span><\/h4><div class=\"accordion-content\"><p>Aunque no existe obligaci\u00f3n legal espec\u00edfica en emergencias, contar con certificaciones reconocidas (ISO 27001, Esquema Nacional de Seguridad, certificaciones CCN-CERT) aumenta significativamente la confianza de las Administraciones y facilita la justificaci\u00f3n de la elecci\u00f3n del contratista ante \u00f3rganos de control.<\/p>\n<\/div><\/div><div class=\"accordion-tab\" ><h4 class=\"accordion-title\" ><i class=\"icon-plus\" ><\/i><span>\u00bfSe puede contratar mejoras de ciberseguridad preventivas en emergencia?<\/span><\/h4><div class=\"accordion-content\"><p>No. El contrato de emergencia solo cubre actuaciones directamente necesarias para superar la crisis inmediata. Las mejoras estructurales, actualizaciones preventivas o inversiones en ciberseguridad a largo plazo deben contratarse posteriormente mediante procedimientos ordinarios de licitaci\u00f3n.<\/p>\n<\/div><\/div><div class=\"accordion-tab\" ><h4 class=\"accordion-title\" ><i class=\"icon-plus\" ><\/i><span>\u00bfC\u00f3mo deben documentar las empresas sus actuaciones en emergencia?<\/span><\/h4><div class=\"accordion-content\"><p>Deben llevar registro detallado de todas las actuaciones realizadas, horas empleadas, recursos utilizados, resultados obtenidos y comunicaciones con la Administraci\u00f3n. Esta documentaci\u00f3n ser\u00e1 esencial tanto para justificar la facturaci\u00f3n como para defender la adecuaci\u00f3n del contrato en caso de fiscalizaci\u00f3n.<\/p>\n<\/div><\/div><div class=\"accordion-tab\" ><h4 class=\"accordion-title\" ><i class=\"icon-plus\" ><\/i><span>\u00bfQu\u00e9 hacer si mi Administraci\u00f3n sufre un ciberataque grave?<\/span><\/h4><div class=\"accordion-content\"><p>Activar inmediatamente el protocolo de seguridad, notificar a INCIBE y CCN-CERT, documentar el alcance del incidente, evaluar si concurren requisitos para emergencia, contactar con asesoramiento jur\u00eddico especializado, y preparar toda la documentaci\u00f3n justificativa antes de tramitar cualquier contrataci\u00f3n.<\/p>\n<\/div><\/div><div class=\"accordion-tab\" ><h4 class=\"accordion-title\" ><i class=\"icon-plus\" ><\/i><span>\u00bfLas empresas pueden ofrecer servicios sin esperar la contrataci\u00f3n formal?<\/span><\/h4><div class=\"accordion-content\"><p>En situaciones de extrema urgencia, pueden iniciarse actuaciones imprescindibles con el compromiso de formalizaci\u00f3n posterior inmediata. Sin embargo, esto entra\u00f1a riesgos contractuales significativos. Lo recomendable es formalizar r\u00e1pidamente aunque sea mediante documento b\u00e1sico que recoja el objeto, precio estimado y compromiso de ambas partes.<\/p>\n<\/div><\/div><\/div><\/div><\/p>\n<p><div class=\"gdlr-shortcode-wrapper\"><div class=\"clear\"><\/div><div class=\"gdlr-item gdlr-divider-item\"  ><div class=\"gdlr-divider double-dotted\" ><\/div><\/div><\/div><\/p>\n\n<h2 class=\"wp-block-heading has-text-color has-medium-font-size\" style=\"color:#0029a4;font-style:normal;font-weight:400\"><strong>Cryptoveritas 360: Our Technology Partner<\/strong><\/h2>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cryptoveritas360.com\/investigacion-y-recuperacion-cripto\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"518\" src=\"https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/11\/Inteligencia-tecnologica-financiera-Critpo-Cryptoveritas-360-1024x518.webp\" alt=\"Crypto Financial Technological Intelligence. Cryptoveritas 360. \" class=\"wp-image-8951\" srcset=\"https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/11\/Inteligencia-tecnologica-financiera-Critpo-Cryptoveritas-360-1024x518.webp 1024w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/11\/Inteligencia-tecnologica-financiera-Critpo-Cryptoveritas-360-300x152.webp 300w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/11\/Inteligencia-tecnologica-financiera-Critpo-Cryptoveritas-360-768x388.webp 768w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/11\/Inteligencia-tecnologica-financiera-Critpo-Cryptoveritas-360-1536x777.webp 1536w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/11\/Inteligencia-tecnologica-financiera-Critpo-Cryptoveritas-360-100x51.webp 100w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/11\/Inteligencia-tecnologica-financiera-Critpo-Cryptoveritas-360-750x380.webp 750w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/11\/Inteligencia-tecnologica-financiera-Critpo-Cryptoveritas-360-600x303.webp 600w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/11\/Inteligencia-tecnologica-financiera-Critpo-Cryptoveritas-360.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<p><div class=\"gdlr-shortcode-wrapper\"><div class=\"clear\"><\/div><div class=\"gdlr-item gdlr-divider-item\"  ><div class=\"gdlr-divider solid\" ><\/div><\/div><\/div><\/p>\n\n<h2 class=\"wp-block-heading has-text-color has-medium-font-size\" style=\"color:#0029a4;font-style:normal;font-weight:400\"><strong>Publications on Crypto on Our Blog <\/strong><\/h2>\n<p><div class=\"gdlr-shortcode-wrapper\"><div class=\"clear\"><\/div><div class=\"gdlr-item gdlr-divider-item\"  ><div class=\"gdlr-divider solid\" ><\/div><\/div><\/div><\/p>\n\n<h2 class=\"wp-block-heading has-text-color has-medium-font-size\" style=\"color:#0029a4\"><strong><strong><strong>Expert Cryptocurrency Lawyers: M\u00e1laga, Seville, Madrid, Las Palmas de Gran Canaria, Almer\u00eda, Huelva, <strong><strong>Marbella, Estepona,<\/strong><\/strong>\u2026<\/strong><\/strong><\/strong><\/h2>\n\n<p>At <strong>IN DIEM Abogados<\/strong> and <strong>Cryptoveritas 360<\/strong> we provide our services at all our <strong>offices and locations in Spain<\/strong>, offering direct and personalized coverage in <strong>Madrid, Seville, M\u00e1laga, Marbella, Las Palmas de Gran Canaria<\/strong>, as well as continuous service through our digital channels for clients throughout the country.<\/p>\n\n<p>Our multidisciplinary team also advises <strong>international companies<\/strong>\u2014including <strong>Europe, Latin America and Asia<\/strong>\u2014that wish to <strong>establish or expand in Spain under the MiCA regulatory framework<\/strong>, whether through obtaining the <strong>CASP license from the CNMV<\/strong> or the <strong>incorporation of companies and compliance structures<\/strong> adapted to the European market.<\/p>\n\n<p>Thanks to a hybrid working methodology (in-person and online), we guarantee the same level of quality, confidentiality and efficiency for both local and foreign clients, supporting each project from initial planning to effective regulatory authorization.<\/p>\n\n<p>We are at your disposal for anything you need. You can reach us via IN DIEM Lawyers Phone (+34) <strong>916 353 892.<\/strong> For urgent cases, you can contact us on IN DIEM 24-Hour Emergency Lawyers Phone: (+34) <strong>610 667 452.<\/strong> <\/p>\n\n<h2 class=\"wp-block-heading has-text-color has-medium-font-size\" style=\"color:#0029a4\"><strong>Did you know that IN DIEM Abogados offers an online service and an urgent service?<\/strong><\/h2>\n\n<p>We offer our clients the option of being assisted via video call or videoconference, as well as by telephone, according to our clients\u2019 preference, so that the assistance is as personal as possible, with absolute immediacy, without the need to travel. This service is complemented by communication via email, which facilitates the analysis and delivery of documentation. <\/p>\n\n<p>Likewise, we offer urgent and 24-hour services for our companies, handling national and international contracting operations.<\/p>\n\n<p class=\"has-text-color\" style=\"color:#0029a4\">For more information on the Online Legal Advisory Service<strong> <a href=\"https:\/\/www.in-diem.com\/en\/online-lawyers-in-diem\">HERE<\/a><\/strong>, the 24-hour and Urgent Service,<strong> <a href=\"https:\/\/www.in-diem.com\/en\/urgent-24-hour-lawyers-tel-610-667-452\">HERE<\/a><\/strong>, and some recognitions, we leave you this <a href=\"https:\/\/www.proveedores.com\/proveedores\/abogados-in-diem-asesoramiento-personal-y-online-especializado\/\"><strong>link<\/strong><\/a>.<\/p>\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.in-diem.com\/en\/online-lawyers-in-diem\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-id=\"5475\" src=\"https:\/\/www.in-diem.com\/wp-content\/uploads\/2020\/03\/Asesoramiento-ON-LINE-Abogados-IN-DIEM-Videoconferencia-Telefono-916353892-1024x576.jpg\" alt=\"\" class=\"wp-image-5475\" srcset=\"https:\/\/www.in-diem.com\/wp-content\/uploads\/2020\/03\/Asesoramiento-ON-LINE-Abogados-IN-DIEM-Videoconferencia-Telefono-916353892-1024x576.jpg 1024w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2020\/03\/Asesoramiento-ON-LINE-Abogados-IN-DIEM-Videoconferencia-Telefono-916353892-600x338.jpg 600w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2020\/03\/Asesoramiento-ON-LINE-Abogados-IN-DIEM-Videoconferencia-Telefono-916353892-300x169.jpg 300w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2020\/03\/Asesoramiento-ON-LINE-Abogados-IN-DIEM-Videoconferencia-Telefono-916353892-768x432.jpg 768w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2020\/03\/Asesoramiento-ON-LINE-Abogados-IN-DIEM-Videoconferencia-Telefono-916353892-1536x864.jpg 1536w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2020\/03\/Asesoramiento-ON-LINE-Abogados-IN-DIEM-Videoconferencia-Telefono-916353892-100x56.jpg 100w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2020\/03\/Asesoramiento-ON-LINE-Abogados-IN-DIEM-Videoconferencia-Telefono-916353892.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Online Legal Advice<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.in-diem.com\/en\/urgent-24-hour-lawyers-tel-610-667-452\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"465\" data-id=\"4350\" src=\"https:\/\/www.in-diem.com\/wp-content\/uploads\/2018\/09\/Abogado-24-horas-Urgente-IN-DIEM-Sevilla-Malaga-Huelva-Madrid-Las-Palmas-Dos-Hermanas-Mairena-Coria-de-Rio-2b-1024x465.jpg\" alt=\"24-hour Emergency Lawyer IN DIEM - Seville Malaga Huelva Madrid Las Palmas Dos Hermanas Mairena Coria de Rio\" class=\"wp-image-4350\" srcset=\"https:\/\/www.in-diem.com\/wp-content\/uploads\/2018\/09\/Abogado-24-horas-Urgente-IN-DIEM-Sevilla-Malaga-Huelva-Madrid-Las-Palmas-Dos-Hermanas-Mairena-Coria-de-Rio-2b-1024x465.jpg 1024w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2018\/09\/Abogado-24-horas-Urgente-IN-DIEM-Sevilla-Malaga-Huelva-Madrid-Las-Palmas-Dos-Hermanas-Mairena-Coria-de-Rio-2b-600x273.jpg 600w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2018\/09\/Abogado-24-horas-Urgente-IN-DIEM-Sevilla-Malaga-Huelva-Madrid-Las-Palmas-Dos-Hermanas-Mairena-Coria-de-Rio-2b-300x136.jpg 300w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2018\/09\/Abogado-24-horas-Urgente-IN-DIEM-Sevilla-Malaga-Huelva-Madrid-Las-Palmas-Dos-Hermanas-Mairena-Coria-de-Rio-2b-768x349.jpg 768w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2018\/09\/Abogado-24-horas-Urgente-IN-DIEM-Sevilla-Malaga-Huelva-Madrid-Las-Palmas-Dos-Hermanas-Mairena-Coria-de-Rio-2b-100x45.jpg 100w, https:\/\/www.in-diem.com\/wp-content\/uploads\/2018\/09\/Abogado-24-horas-Urgente-IN-DIEM-Sevilla-Malaga-Huelva-Madrid-Las-Palmas-Dos-Hermanas-Mairena-Coria-de-Rio-2b.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">24-hour and Urgent Legal Service <\/figcaption><\/figure>\n<\/figure>\n<\/div><\/div>\n\n<p><\/p>\n\n<h2 class=\"wp-block-heading has-text-color has-medium-font-size\" style=\"color:#0029a4\">Anything else about IN DIEM Lawyers? Here&#8217;s a short presentation video&#8230; <\/h2>\n<p><iframe loading=\"lazy\" src=\"\/\/www.youtube.com\/embed\/wQFpoA1gOfQ?wmode=transparent\" width=\"620\" height=\"348\" ><\/iframe><\/p>\n<p><div class=\"gdlr-shortcode-wrapper\"><div class=\"clear\"><\/div><div class=\"gdlr-item gdlr-divider-item\"  ><div class=\"gdlr-divider solid\" ><\/div><\/div><\/div><\/p>\n\n<p>You will find us in Seville, Madrid, Las Palmas de Gran Canaria, M\u00e1laga, Huelva, Punta Umbr\u00eda, Tomares, Coria del R\u00edo, Dos Hermanas, Mairena del Alcor, Estepona, Marbella, Mairena del Aljarafe&#8230; it will be a pleasure to serve you&#8230;!!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks and hacking cases against Public Administrations and, specifically, against city councils, have intensified in recent years, affecting essential services and the security of sensitive data. Hacking, ransomware, or computer sabotage attacks force municipal officials to make immediate legal decisions. <\/p>\n<p>In this context, the emergency contract provided for in the Public Sector Contracts Law (LCSP) becomes a key tool for reacting quickly to serious cybersecurity incidents. In this article, we analyze when a hack can legally justify an emergency contract, the requirements demanded by the LCSP, the risks of its improper use, and how city councils and local entities can rely on specialized legal advice to act with legal certainty. <\/p>\n","protected":false},"author":3,"featured_media":12054,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[1869],"tags":[1873,1883,1877,1876,1874,1880,1879,1870,1875,1871,1881,1872,1878,1882],"class_list":["post-12053","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-public-procurement","tag-article-120-lcsp","tag-blocking-of-critical-digital-infrastructures","tag-city-council","tag-computer-sabotage","tag-contract-auditing","tag-database-destruction","tag-denial-of-service-ddos-attacks","tag-emergency-contract","tag-emergency-procurement","tag-lcsp","tag-manipulation-of-sensitive-data","tag-public-procurement","tag-ransomware","tag-unauthorized-access-to-internal-systems"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Computer Sabotage in Public Administrations and Emergency Contracts under the LCSP<\/title>\n<meta name=\"description\" content=\"Legal analysis of computer sabotage in Public Administrations and the use of emergency contracts under the LCSP: legal requirements, risks, and responsibilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Sabotage in Public Administrations and Emergency Contracts under the LCSP\" \/>\n<meta property=\"og:description\" content=\"Legal analysis of computer sabotage in Public Administrations and the use of emergency contracts under the LCSP: legal requirements, risks, and responsibilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp\" \/>\n<meta property=\"og:site_name\" content=\"In-Diem Abogados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/es-es.facebook.com\/indiemabogados\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-15T21:54:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-14T12:49:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/12\/Imagenes-Blog-13.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"971\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Administrador\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@indiemabogados\" \/>\n<meta name=\"twitter:site\" content=\"@indiemabogados\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Administrador\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp\"},\"author\":{\"name\":\"Administrador\",\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en#\\\/schema\\\/person\\\/3521ffc9872b4f465cff441ffb9ca6ee\"},\"headline\":\"Computer Sabotage in Public Administrations and Emergency Contracts under the LCSP\",\"datePublished\":\"2025-12-15T21:54:05+00:00\",\"dateModified\":\"2026-03-14T12:49:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp\"},\"wordCount\":3899,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.in-diem.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Imagenes-Blog-13.jpg\",\"keywords\":[\"Article 120 LCSP\",\"Blocking of critical digital infrastructures\",\"city council\",\"computer sabotage\",\"contract auditing\",\"Database destruction\",\"Denial-of-service (DDoS) attacks\",\"emergency contract\",\"emergency procurement\",\"LCSP\",\"Manipulation of sensitive data\",\"public procurement\",\"Ransomware\",\"Unauthorized access to internal systems\"],\"articleSection\":[\"public procurement\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp\",\"url\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp\",\"name\":\"Computer Sabotage in Public Administrations and Emergency Contracts under the LCSP\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.in-diem.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Imagenes-Blog-13.jpg\",\"datePublished\":\"2025-12-15T21:54:05+00:00\",\"dateModified\":\"2026-03-14T12:49:59+00:00\",\"description\":\"Legal analysis of computer sabotage in Public Administrations and the use of emergency contracts under the LCSP: legal requirements, risks, and responsibilities.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#primaryimage\",\"url\":\"https:\\\/\\\/www.in-diem.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Imagenes-Blog-13.jpg\",\"contentUrl\":\"https:\\\/\\\/www.in-diem.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Imagenes-Blog-13.jpg\",\"width\":1920,\"height\":971},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/public-procurement\\\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.in-diem.com\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Sabotage in Public Administrations and Emergency Contracts under the LCSP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en#website\",\"url\":\"https:\\\/\\\/www.in-diem.com\\\/en\",\"name\":\"In-Diem Abogados\",\"description\":\"Experiencia +\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.in-diem.com\\\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en#organization\",\"name\":\"In Diem Abogados\",\"url\":\"https:\\\/\\\/www.in-diem.com\\\/en\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.in-diem.com\\\/wp-content\\\/uploads\\\/2014\\\/03\\\/copy-logo-in-diem-header.jpg\",\"contentUrl\":\"https:\\\/\\\/www.in-diem.com\\\/wp-content\\\/uploads\\\/2014\\\/03\\\/copy-logo-in-diem-header.jpg\",\"width\":154,\"height\":50,\"caption\":\"In Diem Abogados\"},\"image\":{\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/es-es.facebook.com\\\/indiemabogados\\\/\",\"https:\\\/\\\/x.com\\\/indiemabogados\",\"https:\\\/\\\/es.linkedin.com\\\/company\\\/in-diem-abogados\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.in-diem.com\\\/en#\\\/schema\\\/person\\\/3521ffc9872b4f465cff441ffb9ca6ee\",\"name\":\"Administrador\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/24c5a72b6ee79e0656718c8a369708b642c570551acb89e3e3f5362fe9b763a1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/24c5a72b6ee79e0656718c8a369708b642c570551acb89e3e3f5362fe9b763a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/24c5a72b6ee79e0656718c8a369708b642c570551acb89e3e3f5362fe9b763a1?s=96&d=mm&r=g\",\"caption\":\"Administrador\"},\"url\":\"https:\\\/\\\/www.in-diem.com\\\/en\\\/abogados\\\/author\\\/agustin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Sabotage in Public Administrations and Emergency Contracts under the LCSP","description":"Legal analysis of computer sabotage in Public Administrations and the use of emergency contracts under the LCSP: legal requirements, risks, and responsibilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp","og_locale":"en_US","og_type":"article","og_title":"Computer Sabotage in Public Administrations and Emergency Contracts under the LCSP","og_description":"Legal analysis of computer sabotage in Public Administrations and the use of emergency contracts under the LCSP: legal requirements, risks, and responsibilities.","og_url":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp","og_site_name":"In-Diem Abogados","article_publisher":"https:\/\/es-es.facebook.com\/indiemabogados\/","article_published_time":"2025-12-15T21:54:05+00:00","article_modified_time":"2026-03-14T12:49:59+00:00","og_image":[{"width":1920,"height":971,"url":"https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/12\/Imagenes-Blog-13.jpg","type":"image\/jpeg"}],"author":"Administrador","twitter_card":"summary_large_image","twitter_creator":"@indiemabogados","twitter_site":"@indiemabogados","twitter_misc":{"Written by":"Administrador","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#article","isPartOf":{"@id":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp"},"author":{"name":"Administrador","@id":"https:\/\/www.in-diem.com\/en#\/schema\/person\/3521ffc9872b4f465cff441ffb9ca6ee"},"headline":"Computer Sabotage in Public Administrations and Emergency Contracts under the LCSP","datePublished":"2025-12-15T21:54:05+00:00","dateModified":"2026-03-14T12:49:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp"},"wordCount":3899,"commentCount":0,"publisher":{"@id":"https:\/\/www.in-diem.com\/en#organization"},"image":{"@id":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#primaryimage"},"thumbnailUrl":"https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/12\/Imagenes-Blog-13.jpg","keywords":["Article 120 LCSP","Blocking of critical digital infrastructures","city council","computer sabotage","contract auditing","Database destruction","Denial-of-service (DDoS) attacks","emergency contract","emergency procurement","LCSP","Manipulation of sensitive data","public procurement","Ransomware","Unauthorized access to internal systems"],"articleSection":["public procurement"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp","url":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp","name":"Computer Sabotage in Public Administrations and Emergency Contracts under the LCSP","isPartOf":{"@id":"https:\/\/www.in-diem.com\/en#website"},"primaryImageOfPage":{"@id":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#primaryimage"},"image":{"@id":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#primaryimage"},"thumbnailUrl":"https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/12\/Imagenes-Blog-13.jpg","datePublished":"2025-12-15T21:54:05+00:00","dateModified":"2026-03-14T12:49:59+00:00","description":"Legal analysis of computer sabotage in Public Administrations and the use of emergency contracts under the LCSP: legal requirements, risks, and responsibilities.","breadcrumb":{"@id":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#primaryimage","url":"https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/12\/Imagenes-Blog-13.jpg","contentUrl":"https:\/\/www.in-diem.com\/wp-content\/uploads\/2025\/12\/Imagenes-Blog-13.jpg","width":1920,"height":971},{"@type":"BreadcrumbList","@id":"https:\/\/www.in-diem.com\/en\/abogados\/public-procurement\/computer-sabotage-in-public-administrations-and-emergency-contracts-under-the-lcsp#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.in-diem.com\/en"},{"@type":"ListItem","position":2,"name":"Computer Sabotage in Public Administrations and Emergency Contracts under the LCSP"}]},{"@type":"WebSite","@id":"https:\/\/www.in-diem.com\/en#website","url":"https:\/\/www.in-diem.com\/en","name":"In-Diem Abogados","description":"Experiencia +","publisher":{"@id":"https:\/\/www.in-diem.com\/en#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.in-diem.com\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.in-diem.com\/en#organization","name":"In Diem Abogados","url":"https:\/\/www.in-diem.com\/en","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.in-diem.com\/en#\/schema\/logo\/image\/","url":"https:\/\/www.in-diem.com\/wp-content\/uploads\/2014\/03\/copy-logo-in-diem-header.jpg","contentUrl":"https:\/\/www.in-diem.com\/wp-content\/uploads\/2014\/03\/copy-logo-in-diem-header.jpg","width":154,"height":50,"caption":"In Diem Abogados"},"image":{"@id":"https:\/\/www.in-diem.com\/en#\/schema\/logo\/image\/"},"sameAs":["https:\/\/es-es.facebook.com\/indiemabogados\/","https:\/\/x.com\/indiemabogados","https:\/\/es.linkedin.com\/company\/in-diem-abogados"]},{"@type":"Person","@id":"https:\/\/www.in-diem.com\/en#\/schema\/person\/3521ffc9872b4f465cff441ffb9ca6ee","name":"Administrador","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/24c5a72b6ee79e0656718c8a369708b642c570551acb89e3e3f5362fe9b763a1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/24c5a72b6ee79e0656718c8a369708b642c570551acb89e3e3f5362fe9b763a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/24c5a72b6ee79e0656718c8a369708b642c570551acb89e3e3f5362fe9b763a1?s=96&d=mm&r=g","caption":"Administrador"},"url":"https:\/\/www.in-diem.com\/en\/abogados\/author\/agustin"}]}},"_links":{"self":[{"href":"https:\/\/www.in-diem.com\/en\/wp-json\/wp\/v2\/posts\/12053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.in-diem.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.in-diem.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.in-diem.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.in-diem.com\/en\/wp-json\/wp\/v2\/comments?post=12053"}],"version-history":[{"count":1,"href":"https:\/\/www.in-diem.com\/en\/wp-json\/wp\/v2\/posts\/12053\/revisions"}],"predecessor-version":[{"id":12055,"href":"https:\/\/www.in-diem.com\/en\/wp-json\/wp\/v2\/posts\/12053\/revisions\/12055"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.in-diem.com\/en\/wp-json\/wp\/v2\/media\/12054"}],"wp:attachment":[{"href":"https:\/\/www.in-diem.com\/en\/wp-json\/wp\/v2\/media?parent=12053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.in-diem.com\/en\/wp-json\/wp\/v2\/categories?post=12053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.in-diem.com\/en\/wp-json\/wp\/v2\/tags?post=12053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}