{"id":1732,"date":"2019-07-08T13:40:00","date_gmt":"2019-07-08T19:40:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=1732"},"modified":"2026-03-05T16:59:33","modified_gmt":"2026-03-05T22:59:33","slug":"capturas-de-pantalla-de-mensajes-de-texto","status":"publish","type":"post","link":"https:\/\/idsinc.com\/es\/text-message-screenshots\/","title":{"rendered":"Capturas de pantalla de mensajes de texto: \u00bfreales o falsas?"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Noticias falsas, identidades falsas y correos electr\u00f3nicos falsos: en el mundo digital actual, cada vez es m\u00e1s dif\u00edcil distinguir los hechos de la ficci\u00f3n.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Los textos falsos son f\u00e1ciles de crear, dif\u00edciles de detectar<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Para abogados e investigadores, discernir qu\u00e9 es real cuando se trata de evidencia digital es m\u00e1s dif\u00edcil que nunca. Esto se debe, en parte, a lo f\u00e1cil que es crear pruebas falsas. Espec\u00edficamente, un aumento en las aplicaciones de mensajes de texto falsos hace que sea casi f\u00e1cil falsificar todo tipo de comunicaciones m\u00f3viles instant\u00e1neas: iMessage, SMS, MMS y chat. Casi todos los aspectos del mensaje de texto se pueden fabricar, incluidos el remitente y el destinatario, la marca de tiempo y el estado de entrega.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Con solo hacer clic en un bot\u00f3n, el impostor puede descargar una imagen que parece un mensaje de texto genuino, lo que hace que sea casi imposible para un ojo inexperto notar la diferencia entre un chat real y uno falso.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Descubrimiento de pruebas falsas en litigios e investigaciones<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">En litigios e investigaciones, los textos falsos pueden causar estragos. Esto no quiere decir que deba asumir que las capturas de pantalla de los mensajes de texto son falsas, pero se recomienda diligencia. Considere estos escenarios:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Ambiente de trabajo hostil<\/strong> \u2013 Un empleado afirma que un compa\u00f1ero de trabajo hizo comentarios no deseados, y \u00e9l o ella le proporciona a Recursos Humanos capturas de pantalla de mensajes de texto que supuestamente prueban las acusaciones. El miembro del equipo de recursos humanos nota que en la captura de pantalla, el proveedor de servicios inal\u00e1mbricos no est\u00e1 en may\u00fasculas (&quot;verizon&quot; en lugar de &quot;Verizon&quot;).<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Robo de secreto comercial<\/strong> \u2013 Dos miembros del equipo de ventas dan su renuncia. Uno de sus excompa\u00f1eros revela una serie de mensajes de texto que implican que los exvendedores robaron secretos comerciales e informaci\u00f3n confidencial d\u00edas antes de dejar la empresa. El gerente del equipo de ventas observa que las burbujas de los mensajes de texto son grises y negras (a pesar de que se revelaron como copias impresas en color), lo que parece estar fuera de lugar en los esquemas de colores de los mensajes tradicionales.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Custodia del ni\u00f1o<\/strong> \u2013 Uno de los padres produce mensajes de texto que prueban la falta de participaci\u00f3n del otro padre en la vida del ni\u00f1o, incluida la falta de recoger al ni\u00f1o a la hora acordada o de proporcionar apoyo financiero para el ni\u00f1o. El oficial del tribunal de familia que recibe las capturas de pantalla detecta que la marca de fecha y hora en los mensajes de texto est\u00e1 en el futuro, en lugar del pasado.<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">En cada una de estas situaciones, la veracidad de los mensajes de texto es fundamental para la legitimidad de los reclamos. Los profesionales de recursos humanos, abogados y funcionarios judiciales involucrados en estas circunstancias, y otros asuntos con escenarios similares, no deben aceptar las comunicaciones al pie de la letra. M\u00e1s bien, se debe consultar a un examinador forense debidamente capacitado para confirmar la autenticidad de los mensajes de texto.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-seek-help-from-a-digital-forensics-expert\"><strong>Busque ayuda de un experto en an\u00e1lisis forense digital<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Los profesionales modernos deben ser conscientes de la facilidad de falsificaci\u00f3n de pruebas de mensajes de texto. Si hay se\u00f1ales de alerta, profundice m\u00e1s para verificar la autenticidad de las capturas de pantalla o las im\u00e1genes proporcionadas.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Trabaje para determinar si los mensajes de texto fueron realmente escritos, enviados o recibidos por las partes y si contienen la conversaci\u00f3n completa. Esto puede ser tan f\u00e1cil como ponerse en contacto con las otras partes involucradas en las supuestas comunicaciones y pedirles que confirmen el env\u00edo o recepci\u00f3n de comunicaciones sospechosas.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Adem\u00e1s, consulte a un <a href=\"https:\/\/idsinc.com\/es\/services\/#digital-forensics\" target=\"_blank\" rel=\"noreferrer noopener\">experto en forense digital<\/a> para examinar los dispositivos que originaron y recibieron los mensajes. Utilizando herramientas especializadas, los expertos forenses pueden analizar los metadatos asociados con los mensajes en cuesti\u00f3n para corroborar su validez. Los expertos forenses emiten informes y crean una declaraci\u00f3n jurada, si es necesario, para revelar la autenticidad (o la falta de ella) de los mensajes de texto.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDiscovery Solutions es una firma de consultor\u00eda estrat\u00e9gica, tecnolog\u00eda y servicios expertos que ofrece soluciones personalizadas de eDiscovery, desde an\u00e1lisis forense digital hasta testimonios de expertos para bufetes de abogados y corporaciones en los Estados Unidos y Europa.<\/em><\/strong><\/p>\n\n\n<!-- wp:themify-builder\/canvas \/-->","protected":false},"excerpt":{"rendered":"<p>Fake news, false identities, and phony emails \u2013 in today\u2019s digital world, it is becoming increasingly more difficult to detect fact from fiction. Fake Texts Are Easy To Create, Difficult To Detect For lawyers and investigators, discerning what\u2019s real when dealing with digital evidence is more difficult than ever. This is due, in part, to [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":1740,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,30],"tags":[],"class_list":["post-1732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-digital-evidence","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Text Message Screenshots: Real Or Fake? - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/capturas-de-pantalla-de-mensajes-de-texto\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Text Message Screenshots: Real Or Fake?\" \/>\n<meta property=\"og:description\" content=\"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/capturas-de-pantalla-de-mensajes-de-texto\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-08T19:40:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T22:59:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jim Vaughn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Vaughn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/\"},\"author\":{\"name\":\"Jim Vaughn\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d5856b1e9c82af5e2fe3df3d7c5234fc\"},\"headline\":\"Text Message Screenshots: Real Or Fake?\",\"datePublished\":\"2019-07-08T19:40:00+00:00\",\"dateModified\":\"2026-03-05T22:59:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/\"},\"wordCount\":622,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Text-Message-Screenshots.jpg\",\"articleSection\":[\"Blog\",\"Digital Evidence + Data Authenticity\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/\",\"name\":\"Text Message Screenshots: Real Or Fake? - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Text-Message-Screenshots.jpg\",\"datePublished\":\"2019-07-08T19:40:00+00:00\",\"dateModified\":\"2026-03-05T22:59:33+00:00\",\"description\":\"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Text-Message-Screenshots.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Text-Message-Screenshots.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Text Message Screenshots: Real or Fake?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d5856b1e9c82af5e2fe3df3d7c5234fc\",\"name\":\"Jim Vaughn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"caption\":\"Jim Vaughn\"},\"sameAs\":[\"https:\\\/\\\/idsinc.com\\\/team\\\/james-vaughn\\\/\"],\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/author\\\/jim-vaughn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Capturas de pantalla de mensajes de texto: \u00bfreales o falsas? - Soluciones iDiscovery","description":"Es m\u00e1s dif\u00edcil detectar pruebas falsas en nuestro mundo digital. Las capturas de pantalla de mensajes de texto falsos pueden ser identificadas por expertos en forense digital.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/capturas-de-pantalla-de-mensajes-de-texto\/","og_locale":"es_ES","og_type":"article","og_title":"Text Message Screenshots: Real Or Fake?","og_description":"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.","og_url":"https:\/\/idsinc.com\/es\/capturas-de-pantalla-de-mensajes-de-texto\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-07-08T19:40:00+00:00","article_modified_time":"2026-03-05T22:59:33+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg","type":"image\/jpeg"}],"author":"Jim Vaughn","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Jim Vaughn","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/idsinc.com\/text-message-screenshots\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/"},"author":{"name":"Jim Vaughn","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d5856b1e9c82af5e2fe3df3d7c5234fc"},"headline":"Text Message Screenshots: Real Or Fake?","datePublished":"2019-07-08T19:40:00+00:00","dateModified":"2026-03-05T22:59:33+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/"},"wordCount":622,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg","articleSection":["Blog","Digital Evidence + Data Authenticity"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/text-message-screenshots\/","url":"https:\/\/idsinc.com\/text-message-screenshots\/","name":"Capturas de pantalla de mensajes de texto: \u00bfreales o falsas? - Soluciones iDiscovery","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg","datePublished":"2019-07-08T19:40:00+00:00","dateModified":"2026-03-05T22:59:33+00:00","description":"Es m\u00e1s dif\u00edcil detectar pruebas falsas en nuestro mundo digital. Las capturas de pantalla de mensajes de texto falsos pueden ser identificadas por expertos en forense digital.","breadcrumb":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/text-message-screenshots\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/text-message-screenshots\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg","width":2500,"height":1250,"caption":"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/text-message-screenshots\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Text Message Screenshots: Real or Fake?"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d5856b1e9c82af5e2fe3df3d7c5234fc","name":"jim vaughn","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","caption":"Jim Vaughn"},"sameAs":["https:\/\/idsinc.com\/team\/james-vaughn\/"],"url":"https:\/\/idsinc.com\/es\/author\/jim-vaughn\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/1732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=1732"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/1732\/revisions"}],"predecessor-version":[{"id":9432,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/1732\/revisions\/9432"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/1740"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=1732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=1732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=1732"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}