{"id":292,"date":"2021-01-27T15:38:19","date_gmt":"2021-01-27T21:38:19","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=292"},"modified":"2023-11-08T16:55:05","modified_gmt":"2023-11-08T22:55:05","slug":"vigilancia-forense","status":"publish","type":"page","link":"https:\/\/idsinc.com\/es\/case-studies\/surveillance-forensics\/","title":{"rendered":"An\u00e1lisis forense de videovigilancia"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-292\" data-postid=\"292\" class=\"themify_builder_content themify_builder_content-292 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_sxix889 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_dvve891 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_1zqw507 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-1024x512.jpg\" class=\"wp-post-image wp-image-293\" title=\"Video Surveillance Forensics | iDS Case Study\" alt=\"Video Surveillance Forensics, iDS Case Study\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_z67o610 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_cajx611 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_aw59458\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    DESAF\u00cdO            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_vvfw5\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"P\u00e1gina 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Se hab\u00eda demandado a un cliente que ten\u00eda instalado un sistema de videovigilancia, alegando que a la clase de empleados se les deber\u00eda pagar horas extras por la cantidad de tiempo que se tarda en pasar por el punto de control de seguridad requerido antes de que realmente comenzara su turno.<\/h5>\n<p>El cliente necesitaba experiencia para lo siguiente:<\/p>\n<ul>\n<li>\n<p>Dise\u00f1ar, planificar, coordinar y ejecutar una metodolog\u00eda de recolecci\u00f3n forense de un sistema de videovigilancia.<\/p>\n<\/li>\n<li>\n<p>Para localizar y analizar fuentes de video para varios puntos en el tiempo y en varios d\u00edas.<\/p>\n<\/li>\n<li>\n<p>Para recrear el entorno de hardware y software para permitir que el abogado contrario vea las secuencias de video necesarias para<\/p>\n<p>ellos mismos.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_fjro869\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Soluci\u00f3n            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_olr8818\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"P\u00e1gina 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Nuestros expertos en an\u00e1lisis forense digital de iDS dise\u00f1aron un flujo de trabajo que acomodar\u00eda la recopilaci\u00f3n, el an\u00e1lisis y la producci\u00f3n de datos del servidor y el sistema de videovigilancia basado en software que utiliza el cliente.<\/h5>\n<p>El equipo de iDS recopil\u00f3, analiz\u00f3 e inform\u00f3 sobre lo siguiente:<\/p>\n<ul>\n<li>\n<p>La imagen defendible del sistema de video y el sistema de almacenamiento de archivos de video asociado.<\/p>\n<\/li>\n<li>\n<p>El an\u00e1lisis y extracci\u00f3n de secuencias de video deseadas.<\/p>\n<\/li>\n<li>\n<p>La replicaci\u00f3n del hardware y software necesario que permitir\u00eda a todas las partes revisar las secuencias de video en un<\/p>\n<p>entorno en vivo simulado.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_h5vm641\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Resultado            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_17by0\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"P\u00e1gina 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Al aprovechar la experiencia de iDS, el cliente pudo dejar su sistema de video en funcionamiento, mientras permit\u00eda una recopilaci\u00f3n forense defendible, y pudo crear un entorno virtual replicado que era un espejo del sistema del cliente para que lo usaran otras partes.<\/h5>\n<p>El cliente ahorr\u00f3 de miles a cientos de miles de d\u00f3lares al contratar a iDS para crear un flujo de trabajo innovador para realizar esta tarea.<\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>A client who had a video surveillance system in place had been sued, alleging the class of employees should be paid overtime for the amount of time it takes to get through the required security checkpoint before their shift actually started. The client needed expertise for the following: To design, plan, coordinate, and execute a [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":293,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-292","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Video Surveillance Forensics - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/estudios-de-caso\/vigilancia-forense\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Video Surveillance Forensics\" \/>\n<meta property=\"og:description\" content=\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/estudios-de-caso\/vigilancia-forense\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-08T22:55:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\",\"name\":\"Video Surveillance Forensics - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"datePublished\":\"2021-01-27T21:38:19+00:00\",\"dateModified\":\"2023-11-08T22:55:05+00:00\",\"description\":\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"width\":1200,\"height\":600,\"caption\":\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Video Surveillance Forensics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"An\u00e1lisis forense de videovigilancia - iDiscovery Solutions","description":"Video Surveillance Forensics permiti\u00f3 a iDS crear un entorno virtual replicado, reflejando el sistema del cliente para que lo utilicen otras partes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/estudios-de-caso\/vigilancia-forense\/","og_locale":"es_ES","og_type":"article","og_title":"Video Surveillance Forensics","og_description":"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.","og_url":"https:\/\/idsinc.com\/es\/estudios-de-caso\/vigilancia-forense\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2023-11-08T22:55:05+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/","url":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/","name":"An\u00e1lisis forense de videovigilancia - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","datePublished":"2021-01-27T21:38:19+00:00","dateModified":"2023-11-08T22:55:05+00:00","description":"Video Surveillance Forensics permiti\u00f3 a iDS crear un entorno virtual replicado, reflejando el sistema del cliente para que lo utilicen otras partes.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","width":1200,"height":600,"caption":"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Video Surveillance Forensics"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>CHALLENGE<br\/><\/h1>\n<h5>A client who had a video surveillance system in place had been sued, alleging the class of employees should be paid overtime for the amount of time it takes to get through the required security checkpoint before their shift actually started.<\/h5> <p>The client needed expertise for the following:<\/p> <ul> <li> <p>To design, plan, coordinate, and execute a methodology for forensic collection of a video surveillance system.<\/p> <\/li> <li> <p>To locate and analyze video feeds for various points in time, and on various days.<\/p> <\/li> <li> <p>To recreate the hardware and software environment to allow opposing counsel to see the necessary video footage for<\/p> <p>themselves.<\/p> <\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<h5>Our iDS Digital Forensics Experts designed a workflow that would accommodate the collection, analysis, and production of data from the server and software-based video surveillance system used by the client.<\/h5> <p>The iDS team collected, analyzed, and reported on the following:<\/p> <ul> <li> <p>The defensible imaging of the video system and associated video file storage system.<\/p> <\/li> <li> <p>The analysis and extraction of desired video footage.<\/p> <\/li> <li> <p>The replication of the necessary hardware and software that would allow all parties to review the video footage in a<\/p> <p>simulated live environment.<\/p> <\/li> <\/ul>\n<h1>Result<br\/><\/h1>\n<h5>By leveraging the expertise of iDS, the client was able to leave their video system up and running, while allowing a defensible forensic collection, and was able to create a replicated virtual environment that was a mirror of the client\u2019s system for use by other parties.<\/h5> <p>The client saved thousands, to hundreds of thousands, of dollars by engaging iDS to create an innovative workflow to accomplish this assignment.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages\/292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages\/292\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/293"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/team?post=292"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}