{"id":1746,"date":"2019-10-15T14:10:00","date_gmt":"2019-10-15T20:10:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=1746"},"modified":"2026-03-09T15:15:47","modified_gmt":"2026-03-09T21:15:47","slug":"datos-del-dispositivo-movil","status":"publish","type":"post","link":"https:\/\/idsinc.com\/es\/mobile-device-data\/","title":{"rendered":"Datos del dispositivo m\u00f3vil: \u00bfPodr\u00eda sincronizarse en otro lugar?"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Si es un usuario experto en tecnolog\u00eda, probablemente comprenda que cada vez que usa su dispositivo m\u00f3vil, deja un rastro digital. Estas huellas de datos pueden rastrear cada correo electr\u00f3nico, mensaje de texto, llamada, geolocalizaci\u00f3n, sitio web y b\u00fasqueda ejecutada en su dispositivo, y gran parte de esta informaci\u00f3n en el dispositivo es recuperable por un <a href=\"https:\/\/idsinc.com\/es\/services\/#digital-forensics\" target=\"_blank\" rel=\"noreferrer noopener\">experto en forense digital<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Sin embargo, es posible que un usuario promedio no entienda que los rastros de datos del dispositivo m\u00f3vil pueden estar al acecho en ubicaciones separadas del propio dispositivo. Las huellas de datos que crea en su tel\u00e9fono pueden estar disponibles en computadoras o servidores, a veces mucho despu\u00e9s de que su dispositivo se haya ido.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Para los abogados y los profesionales del derecho, los dispositivos m\u00f3viles est\u00e1n llenos de pruebas potenciales. Comprender las innumerables ubicaciones donde pueden vivir los datos m\u00f3viles es fundamental. Al recopilar datos en una investigaci\u00f3n o un asunto legal, sepa que se puede acceder a la informaci\u00f3n del dispositivo m\u00f3vil desde ubicaciones alternativas, incluso si el dispositivo no est\u00e1 disponible o ya no existe.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Miner\u00eda de fuentes de datos de copia de seguridad m\u00f3viles<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Los tel\u00e9fonos celulares ya no son solo para hacer llamadas telef\u00f3nicas. En cambio, los dispositivos m\u00f3viles inteligentes son minicomputadoras, lo que hace que muchos de los mismos datos importantes que se almacenan en una computadora de escritorio o port\u00e1til tambi\u00e9n sean accesibles en un dispositivo m\u00f3vil.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Como tal, es cada vez m\u00e1s importante que los usuarios realicen una copia de seguridad o sincronicen sus dispositivos m\u00f3viles, para asegurarse de que nada se pierda si el dispositivo se da\u00f1a o se extrav\u00eda. Casi todo lo que sucede en el tel\u00e9fono est\u00e1 disponible para respaldo, incluidos: mensajes de texto, registros telef\u00f3nicos, listas de contactos, im\u00e1genes, videos e informaci\u00f3n de mapas GPS. Sin embargo, es importante comprender que para los mensajes de correo electr\u00f3nico, incluso si el usuario accedi\u00f3 al correo electr\u00f3nico en un dispositivo m\u00f3vil, generalmente es m\u00e1s efectivo acceder al correo electr\u00f3nico desde un servidor de correo electr\u00f3nico.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Los datos del dispositivo m\u00f3vil se pueden respaldar en una computadora o en la nube, y se deben considerar ambas ubicaciones al buscar fuentes alternativas de datos m\u00f3viles. Por ejemplo, cuando se conecta un dispositivo m\u00f3vil a una computadora, es posible que se realice una sincronizaci\u00f3n autom\u00e1tica, junto con la actualizaci\u00f3n de los datos o los programas de software almacenados en el tel\u00e9fono. Adem\u00e1s, una sincronizaci\u00f3n inal\u00e1mbrica elimina la necesidad de que el dispositivo est\u00e9 conectado f\u00edsicamente a la computadora para hacer una copia de seguridad de los datos.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Una copia de seguridad del dispositivo m\u00f3vil es de vital importancia cuando el dispositivo ya no est\u00e1 disponible. Por ejemplo, est\u00e1 utilizando un iPhone 6, respaldado en iCloud. Decide actualizarse a un iPhone X, intercambiando el iPhone 6. Si los datos de su tel\u00e9fono anterior fueron objeto de una investigaci\u00f3n, los datos del iPhone 6 a\u00fan podr\u00edan respaldarse en iCloud. Lo mismo es cierto para un Android, donde puede hacer una copia de seguridad en Google u otras aplicaciones de terceros.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-consider-the-carriers-data-stores\"><strong>Considere los almacenes de datos de los transportistas<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">El proveedor de servicios inal\u00e1mbricos es otra ubicaci\u00f3n a tener en cuenta al realizar una investigaci\u00f3n de dispositivos m\u00f3viles. Cada operador de telefon\u00eda celular tiene sus propios per\u00edodos y pol\u00edticas de retenci\u00f3n de datos. Como tal, la informaci\u00f3n disponible de un operador variar\u00e1 de un proveedor a otro.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Como profesional legal o investigador, aprenda la pol\u00edtica de cada operador para saber si vale la pena obtener datos de un operador en un caso espec\u00edfico. Si necesita obtener datos de usuario de un operador, trabaje directamente con el usuario para solicitar los datos retenidos u obtener el consentimiento del usuario para poder solicitar los datos del operador. Si el usuario no est\u00e1 cooperando y un activo <a href=\"https:\/\/idsinc.com\/es\/areas-of-service\/#litigation\">litigio<\/a> est\u00e1 pendiente, considere entregar al transportista una citaci\u00f3n para las fuentes de datos.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Es importante tener en cuenta que en la mayor\u00eda de las situaciones de litigio civil, se investiga un dispositivo m\u00f3vil con el consentimiento del usuario. Para comenzar la mayor\u00eda de las recopilaciones de datos de dispositivos m\u00f3viles, el examinador necesitar\u00e1 que el usuario proporcione el c\u00f3digo de bloqueo de pantalla y cualquier contrase\u00f1a de nivel secundario para otras aplicaciones en el dispositivo, como una contrase\u00f1a de respaldo cifrada de iTunes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Obtener acceso a la informaci\u00f3n de la contrase\u00f1a es m\u00e1s f\u00e1cil si la organizaci\u00f3n cuenta con un s\u00f3lido sistema de administraci\u00f3n de dispositivos m\u00f3viles que controle las credenciales emitidas a un usuario de dispositivo m\u00f3vil. Tome precauciones adicionales en situaciones en las que un empleado ya abandon\u00f3 la organizaci\u00f3n y entreg\u00f3 su dispositivo sin la contrase\u00f1a. Si el usuario controla la contrase\u00f1a o la contrase\u00f1a no est\u00e1 disponible para la organizaci\u00f3n, el <a href=\"https:\/\/idsinc.com\/es\/services\/#digital-forensics\" target=\"_blank\" rel=\"noreferrer noopener\">experto en forense digital<\/a> es posible que no pueda acceder al dispositivo sin pasos y costos adicionales.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDiscovery Solutions es una firma de consultor\u00eda estrat\u00e9gica, tecnolog\u00eda y servicios expertos que ofrece soluciones personalizadas de eDiscovery, desde an\u00e1lisis forense digital hasta testimonios de expertos para bufetes de abogados y corporaciones en los Estados Unidos y Europa.<\/em><\/strong><\/p>\n\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-1746\" data-postid=\"1746\" class=\"themify_builder_content themify_builder_content-1746 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>If you are a savvy technology user, you probably understand that every time you use your mobile device, you leave a digital trail. These data footprints may track every email, text, call, geolocation, website, and search executed on your device, and much of this data on the device is recoverable by a digital forensic expert. [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":1741,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,33],"tags":[],"class_list":["post-1746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-data-sources","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mobile Device Data Footprints - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Mobile device data trails might be lurking in places separate from the device itself. Learn about data footprints created on such devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/datos-del-dispositivo-movil\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Device Data: Could It Be Synchronized Elsewhere\" \/>\n<meta property=\"og:description\" content=\"Mobile device data trails might be lurking in places separate from the device itself. Learn about data footprints created on such devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/datos-del-dispositivo-movil\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-15T20:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T21:15:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Mobile-Device-Data.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jim Vaughn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Vaughn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/\"},\"author\":{\"name\":\"Jim Vaughn\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d5856b1e9c82af5e2fe3df3d7c5234fc\"},\"headline\":\"Mobile Device Data: Could It Be Synchronized Elsewhere\",\"datePublished\":\"2019-10-15T20:10:00+00:00\",\"dateModified\":\"2026-03-09T21:15:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/\"},\"wordCount\":752,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Mobile-Device-Data.jpg\",\"articleSection\":[\"Blog\",\"Data Sources (Mobile, IoT, Non-Traditional)\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/\",\"name\":\"Mobile Device Data Footprints - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Mobile-Device-Data.jpg\",\"datePublished\":\"2019-10-15T20:10:00+00:00\",\"dateModified\":\"2026-03-09T21:15:47+00:00\",\"description\":\"Mobile device data trails might be lurking in places separate from the device itself. Learn about data footprints created on such devices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Mobile-Device-Data.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Mobile-Device-Data.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Mobile device data trails might be lurking in locations separate from the device itself. Learn more about the data footprints created on such devices.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/mobile-device-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mobile Device Data Footprints\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d5856b1e9c82af5e2fe3df3d7c5234fc\",\"name\":\"Jim Vaughn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"caption\":\"Jim Vaughn\"},\"sameAs\":[\"https:\\\/\\\/idsinc.com\\\/team\\\/james-vaughn\\\/\"],\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/author\\\/jim-vaughn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Huellas de datos de dispositivos m\u00f3viles - iDiscovery Solutions","description":"Es posible que haya rastros de datos de dispositivos m\u00f3viles al acecho en lugares separados del propio dispositivo. Obtenga informaci\u00f3n sobre las huellas de datos creadas en dichos dispositivos.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/datos-del-dispositivo-movil\/","og_locale":"es_ES","og_type":"article","og_title":"Mobile Device Data: Could It Be Synchronized Elsewhere","og_description":"Mobile device data trails might be lurking in places separate from the device itself. Learn about data footprints created on such devices.","og_url":"https:\/\/idsinc.com\/es\/datos-del-dispositivo-movil\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-10-15T20:10:00+00:00","article_modified_time":"2026-03-09T21:15:47+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Mobile-Device-Data.jpg","type":"image\/jpeg"}],"author":"Jim Vaughn","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Jim Vaughn","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/idsinc.com\/mobile-device-data\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/mobile-device-data\/"},"author":{"name":"Jim Vaughn","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d5856b1e9c82af5e2fe3df3d7c5234fc"},"headline":"Mobile Device Data: Could It Be Synchronized Elsewhere","datePublished":"2019-10-15T20:10:00+00:00","dateModified":"2026-03-09T21:15:47+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/mobile-device-data\/"},"wordCount":752,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/mobile-device-data\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Mobile-Device-Data.jpg","articleSection":["Blog","Data Sources (Mobile, IoT, Non-Traditional)"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/mobile-device-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/mobile-device-data\/","url":"https:\/\/idsinc.com\/mobile-device-data\/","name":"Huellas de datos de dispositivos m\u00f3viles - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/mobile-device-data\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/mobile-device-data\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Mobile-Device-Data.jpg","datePublished":"2019-10-15T20:10:00+00:00","dateModified":"2026-03-09T21:15:47+00:00","description":"Es posible que haya rastros de datos de dispositivos m\u00f3viles al acecho en lugares separados del propio dispositivo. Obtenga informaci\u00f3n sobre las huellas de datos creadas en dichos dispositivos.","breadcrumb":{"@id":"https:\/\/idsinc.com\/mobile-device-data\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/mobile-device-data\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/mobile-device-data\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Mobile-Device-Data.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Mobile-Device-Data.jpg","width":2500,"height":1250,"caption":"Mobile device data trails might be lurking in locations separate from the device itself. Learn more about the data footprints created on such devices."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/mobile-device-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Mobile Device Data Footprints"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d5856b1e9c82af5e2fe3df3d7c5234fc","name":"jim vaughn","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","caption":"Jim Vaughn"},"sameAs":["https:\/\/idsinc.com\/team\/james-vaughn\/"],"url":"https:\/\/idsinc.com\/es\/author\/jim-vaughn\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/1746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=1746"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/1746\/revisions"}],"predecessor-version":[{"id":9499,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/1746\/revisions\/9499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/1741"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=1746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=1746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=1746"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}