{"id":3547,"date":"2019-04-04T09:00:00","date_gmt":"2019-04-04T15:00:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=3547"},"modified":"2022-04-12T14:22:19","modified_gmt":"2022-04-12T20:22:19","slug":"evidencia-electronica","status":"publish","type":"post","link":"https:\/\/idsinc.com\/es\/electronic-evidence\/","title":{"rendered":"Conf\u00ede pero verifique: c\u00f3mo abordar la evidencia electr\u00f3nica"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-3547\" data-postid=\"3547\" class=\"themify_builder_content themify_builder_content-3547 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<p class=\"wp-block-paragraph\">Cuando el procesamiento de textos y el dise\u00f1o gr\u00e1fico se convirtieron en herramientas de escritorio, exist\u00eda la preocupaci\u00f3n de que los malos actores ahora tuvieran la capacidad de crear documentos falsos. Y algunos lo hicieron.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Pero hoy, incluso cuando el mundo se ha digitalizado cada vez m\u00e1s, una de las consecuencias no deseadas de esa digitalizaci\u00f3n entrelazada es la mayor dificultad para crear evidencia falsa. Esto se debe a varios factores contribuyentes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4 razones por las que es m\u00e1s dif\u00edcil crear pruebas falsas<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Primero, nuestros documentos individuales se han vuelto cada vez m\u00e1s complejos. Tomemos como ejemplo el correo electr\u00f3nico. Originalmente, los correos electr\u00f3nicos eran comunicaciones de texto simples con funciones limitadas. Hoy en d\u00eda, pueden ser coloridos, animados, llenos de archivos adjuntos, transmitidos a muchos destinatarios, priorizados, controlados por reglas, automatizados y configurados para respuestas autom\u00e1ticas.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Todos estos aspectos se basan en una variedad de caracter\u00edsticas que, en s\u00ed mismas, llevan una variedad de metadatos o caracter\u00edsticas reveladoras, que el falsificador promedio puede pasar por alto f\u00e1cilmente o replicar incorrectamente. En un caso reciente, recientemente, un demandante fabric\u00f3 un PDF de una supuesta cadena de correo electr\u00f3nico. En una de las l\u00edneas de asunto, utiliz\u00f3 fuentes mixtas Serif y Sans Serif. Esto no puede suceder en un correo electr\u00f3nico v\u00e1lido. Este fue un defecto fatal.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">En segundo lugar, trabajamos con pilas de software. Una &quot;pila&quot; es una colecci\u00f3n de herramientas de software que se combinan para proporcionar una capacidad colectiva. Cuando usa m\u00faltiples herramientas en combinaci\u00f3n entre s\u00ed, cada una est\u00e1 ayudando y registrando los eventos. Eventualmente, estas historias grabadas tienen que estar de acuerdo. Cuando la evidencia es falsa, no lo hacen.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">En tercer lugar, nuestros sistemas operativos se han vuelto cada vez m\u00e1s f\u00e1ciles de usar, lo que a su vez requiere mucho m\u00e1s trabajo entre bastidores. Este trabajo se facilita con los protocolos de enlace del sistema, los registros de actividad, las comprobaciones de seguridad y otros sistemas que, una vez m\u00e1s, registran y documentan lo que el sistema est\u00e1 haciendo con un gran volumen y una alta frecuencia.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Finalmente, gracias a la conectividad y la movilidad, los sistemas que usamos pasan por una variedad de proveedores de servicios para llevar datos del punto A al punto B. Esto no solo crea un rastro de datos, ese rastro a menudo est\u00e1 en manos de m\u00faltiples sistemas, pertenecientes a m\u00faltiples proveedores de servicios. Incluso si conoc\u00eda todos los lugares para crear datos falsos o cambiar datos existentes de forma falsa, es imposible obtener acceso de modificaci\u00f3n a todos ellos.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Por todas estas razones, junto con la necesidad de recuperaci\u00f3n ante desastres, seguridad de datos y privacidad de datos, todo lo cual da como resultado m\u00e1s seguimiento, m\u00e1s registros y m\u00e1s copias de nuestras actividades, se ha vuelto cada vez m\u00e1s imposible falsificar pruebas por completo.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-should-you-accept-or-dig-look-for-these-red-flags\"><strong>\u00bfDeber\u00edas aceptar o cavar? Busque estas banderas rojas<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">En cambio, los falsificadores solo pueden esperar que no profundices lo suficiente. El desaf\u00edo entonces se convierte en saber cu\u00e1ndo aceptar y cu\u00e1ndo cavar. Aqu\u00ed hay algunas se\u00f1ales f\u00e1ciles de buscar para determinar si debe aceptar o cuestionar los datos:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u00bfEs demasiado bueno para ser verdad? Si es as\u00ed, entonces podr\u00eda valer la pena investigarlo.<\/li><li>\u00bfFalta la copia electr\u00f3nica? Cuando vemos evidencia clave producida solo en papel, donde el original ya no est\u00e1 disponible, eso levanta una bandera roja.<\/li><li>\u00bfNo hay otros testigos? Cuando tenemos casos en los que otras personas involucradas en un documento, o una comunicaci\u00f3n por correo electr\u00f3nico, no est\u00e1n disponibles y solo la persona que ofrece la evidencia est\u00e1 disponible para discutirla, o peor a\u00fan, hay otras personas que no recuerdan el documento o lo refutan. eso, eso es una bandera roja.<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Recientemente, tuvimos un caso en el que surgieron las tres banderas rojas. Eso justific\u00f3 una inmersi\u00f3n m\u00e1s profunda en la evidencia (en este caso, un correo electr\u00f3nico, un recibo de lectura y una imagen de la bandeja de salida del demandante). Esa inmersi\u00f3n m\u00e1s profunda revel\u00f3 m\u00e1s de 100 problemas en la evidencia. No solo era falso, era muy, muy falso.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">El sistema legal de los EE. UU. se basa en la integridad de las partes para permitir que funcione nuestro sistema de procedimiento civil y descubrimiento. Pero, en palabras de Ronald Reagan durante las negociaciones de su administraci\u00f3n con nuestros adversarios y nuestros aliados, a veces es necesario tomar una posici\u00f3n de \u201cconfiar pero verificar\u201d. Promovemos el mismo enfoque con respecto a la evidencia electr\u00f3nica. Especialmente donde comienzan a mostrarse las banderas rojas.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background is-style-wide\" style=\"background-color:#e1e1e1;color:#e1e1e1\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDS proporciona soluciones de datos de consulta a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de la sala del tribunal. Nuestros expertos en la materia y estrategas de datos se especializan en encontrar soluciones a problemas de datos complejos, lo que garantiza que los datos se puedan aprovechar como un activo y no como un pasivo.<\/em><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>When word processing and graphic design became desktop tools, there was a concern that bad actors now had the ability to create fake documents. And some did. But today, even as the world has become more and more digitized, one of the unintended consequences of that interwoven digitalization is the increased difficulty to create fake [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3548,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-3547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Trust But Verify: How To Approach Electronic Evidence - iDS<\/title>\n<meta name=\"description\" content=\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/evidencia-electronica\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trust But Verify: How To Approach Electronic Evidence\" \/>\n<meta property=\"og:description\" content=\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/evidencia-electronica\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-04T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-12T20:22:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Regard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Regard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\"},\"author\":{\"name\":\"Dan Regard\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/803ad31781146823f476911393d83156\"},\"headline\":\"Trust But Verify: How To Approach Electronic Evidence\",\"datePublished\":\"2019-04-04T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:22:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\"},\"wordCount\":749,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\",\"name\":\"Trust But Verify: How To Approach Electronic Evidence - iDS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"datePublished\":\"2019-04-04T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:22:19+00:00\",\"description\":\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trust But Verify: How To Approach Electronic Evidence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/803ad31781146823f476911393d83156\",\"name\":\"Dan Regard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g\",\"caption\":\"Dan Regard\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/author\\\/dan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Conf\u00eda pero verifica: c\u00f3mo abordar la evidencia electr\u00f3nica - iDS","description":"\u00bfCu\u00e1ndo deber\u00eda profundizar en la evidencia? Conozca algunas se\u00f1ales f\u00e1ciles de buscar para determinar si debe aceptar o cuestionar los datos.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/evidencia-electronica\/","og_locale":"es_ES","og_type":"article","og_title":"Trust But Verify: How To Approach Electronic Evidence","og_description":"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.","og_url":"https:\/\/idsinc.com\/es\/evidencia-electronica\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-04-04T15:00:00+00:00","article_modified_time":"2022-04-12T20:22:19+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","type":"image\/jpeg"}],"author":"Dan Regard","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Dan Regard","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/electronic-evidence\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/"},"author":{"name":"Dan Regard","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/803ad31781146823f476911393d83156"},"headline":"Trust But Verify: How To Approach Electronic Evidence","datePublished":"2019-04-04T15:00:00+00:00","dateModified":"2022-04-12T20:22:19+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/"},"wordCount":749,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","articleSection":["Blog"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/electronic-evidence\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/electronic-evidence\/","url":"https:\/\/idsinc.com\/electronic-evidence\/","name":"Conf\u00eda pero verifica: c\u00f3mo abordar la evidencia electr\u00f3nica - iDS","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","datePublished":"2019-04-04T15:00:00+00:00","dateModified":"2022-04-12T20:22:19+00:00","description":"\u00bfCu\u00e1ndo deber\u00eda profundizar en la evidencia? Conozca algunas se\u00f1ales f\u00e1ciles de buscar para determinar si debe aceptar o cuestionar los datos.","breadcrumb":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/electronic-evidence\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","width":2500,"height":1250,"caption":"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/electronic-evidence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Trust But Verify: How To Approach Electronic Evidence"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/803ad31781146823f476911393d83156","name":"dan respeto","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g","caption":"Dan Regard"},"url":"https:\/\/idsinc.com\/es\/author\/dan\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/3547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=3547"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/3547\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/3548"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=3547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=3547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=3547"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}