{"id":9572,"date":"2026-03-26T08:43:24","date_gmt":"2026-03-26T14:43:24","guid":{"rendered":"https:\/\/idsinc.com\/?p=9572"},"modified":"2026-03-26T08:43:28","modified_gmt":"2026-03-26T14:43:28","slug":"datos-de-propiedad-intelectual","status":"publish","type":"post","link":"https:\/\/idsinc.com\/es\/intellectual-property-data\/","title":{"rendered":"Cuando la propiedad intelectual se va por la puerta, los datos se quedan atr\u00e1s."},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<h6 class=\"wp-block-heading\" id=\"h-the-most-damaging-corporate-heists-today-don-t-involve-broken-locks-or-midnight-alarms-they-involve-a-departing-employee-a-personal-cloud-account-and-a-few-seconds-of-silence-intellectual-property-ai-proprietary-code-pricing-strategies-client-lists-strategic-roadmaps-ai-can-walk-out-the-door-without-a-sound\"><strong>Los robos corporativos m\u00e1s da\u00f1inos de hoy en d\u00eda no implican cerraduras rotas ni alarmas nocturnas. Implican a un empleado que se marcha, una cuenta personal en la nube y unos segundos de silencio. Propiedad intelectual, c\u00f3digo propietario de IA, estrategias de precios, listas de clientes, planes estrat\u00e9gicos: la IA puede desaparecer sin dejar rastro.<\/strong><\/h6>\n\n\n\n<p>Pero lo que muchas amenazas internas no se dan cuenta es esto: el mundo digital no olvida. En un art\u00edculo publicado recientemente sobre <a href=\"https:\/\/www.lexology.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lexolog\u00eda<\/a>, miembro del equipo iDS <a href=\"https:\/\/idsinc.com\/es\/timothy-latulippe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Timoteo LaTulippe<\/a> Examina lo que \u00e9l describe como una &quot;epidemia invisible&quot; de robo de propiedad intelectual y, lo que es crucial, por qu\u00e9 quienes lo intentan casi siempre dejan rastro.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-every-digital-action-triggers-a-forensic-reaction\"><strong>Cada acci\u00f3n digital desencadena una reacci\u00f3n forense.<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>LaTulippe introduce el concepto de \u201chuella digital\u201d: el residuo forense que queda tras cada interacci\u00f3n con un dispositivo o archivo. La monitorizaci\u00f3n inform\u00e1tica tradicional podr\u00eda pasar por alto una sola carga a una cuenta personal de Dropbox. Sin embargo, el an\u00e1lisis forense va mucho m\u00e1s all\u00e1.<strong><\/strong><\/p>\n\n\n\n<p>Mediante artefactos como archivos LNK, listas de salto, shellbags y claves de registro, los investigadores pueden reconstruir una cronolog\u00eda precisa de qu\u00e9 se accedi\u00f3, cu\u00e1ndo y desde d\u00f3nde, incluso si el dispositivo utilizado para transferir los datos ya no existe.<strong><\/strong><\/p>\n\n\n\n<p>La implicaci\u00f3n estrat\u00e9gica para el asesoramiento legal es significativa. La cuesti\u00f3n ya no es solo <em>qu\u00e9<\/em> fue tomada, pero <em>c\u00f3mo<\/em> \u2014 establecer un registro claro de conocimiento e intenci\u00f3n. Como ilustra LaTulippe, si un empleado busca &quot;c\u00f3mo borrar el historial del navegador&quot; poco despu\u00e9s de una descarga masiva de datos de clientes, la defensa del &quot;error inocente&quot; se vuelve muy dif\u00edcil de sostener.<\/p>\n\n\n\n<p>En sus propias palabras, estos artefactos del sistema Windows son solo una gota en el oc\u00e9ano. Pero al combinarlos con el contexto proporcionado por los equipos de recursos humanos y legales, pueden ofrecer una visi\u00f3n muy completa y fortalecer considerablemente el proceso de reclamaciones.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-s-coming-in-the-series\"><strong>\u00bfQu\u00e9 novedades habr\u00e1 en la serie?<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>Este art\u00edculo es el primero de una serie de varias partes. Las pr\u00f3ximas entregas explorar\u00e1n c\u00f3mo los artefactos forenses adicionales ayudan a los investigadores a descubrir violaciones de las restricciones posteriores a la rescisi\u00f3n del contrato (PTR, por sus siglas en ingl\u00e9s), la creaci\u00f3n de negocios competidores &quot;en la sombra&quot; y c\u00f3mo estos hallazgos pasan de la investigaci\u00f3n a convertirse en pruebas admisibles en los tribunales.<strong><\/strong><\/p>\n\n\n\n<p>En iDS, este es el trabajo que hacemos a diario: ayudar a equipos legales, asesores jur\u00eddicos corporativos e investigadores a aprovechar los datos como una ventaja estrat\u00e9gica, tanto dentro como fuera de los tribunales.<br><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=f5558a87-bf55-4840-afc7-169b12a74f52\" style=\"background-color:#ee5d20\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Lee el art\u00edculo completo en Lexology.<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p>Si su organizaci\u00f3n tiene preguntas sobre amenazas internas o apropiaci\u00f3n indebida de propiedad intelectual, visite <a href=\"https:\/\/idsinc.com\/es\/\" target=\"_blank\" rel=\"noreferrer noopener\">idsinc.com<\/a> Para programar una conversaci\u00f3n con uno de nuestros expertos.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em><strong>iDS ofrece soluciones de datos de consulta a corporaciones y bufetes de abogados de todo el mundo, brind\u00e1ndoles una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo. Para obtener m\u00e1s informaci\u00f3n, visite <a href=\"https:\/\/idsinc.com\/es\/\" type=\"link\" id=\"https:\/\/idsinc.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">idsinc.com<\/a>.<\/strong><\/em><\/p>\n\n\n\n<p><em>\u00bfTienes problemas con alg\u00fan t\u00e9rmino t\u00e9cnico utilizado en esta publicaci\u00f3n? Consulta nuestra&nbsp;<\/em><a href=\"https:\/\/idsinc.com\/es\/glosario\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Glosario de Data Investigators<\/em><\/a><em>&nbsp;para descifrar el c\u00f3digo.&nbsp;<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>The most damaging corporate heists today don&#8217;t involve broken locks or midnight alarms. They involve a departing employee, a personal cloud account, and a few seconds of silence. Intellectual property \u201a AI proprietary code, pricing strategies, client lists, strategic roadmaps \u201a AI can walk out the door without a sound. But what many insider threats [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,35],"tags":[],"class_list":["post-9572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ip","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>When Intellectual Property Walks Out the Door, Data Stays Behind<\/title>\n<meta name=\"description\" content=\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/datos-de-propiedad-intelectual\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Intellectual Property Walks Out the Door, the Data Stays Behind\" \/>\n<meta property=\"og:description\" content=\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/datos-de-propiedad-intelectual\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-26T14:43:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T14:43:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"When Intellectual Property Walks Out the Door, the Data Stays Behind\",\"datePublished\":\"2026-03-26T14:43:24+00:00\",\"dateModified\":\"2026-03-26T14:43:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"},\"wordCount\":471,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"articleSection\":[\"Blog\",\"IP + Trade Secrets + Employee Risk\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\",\"name\":\"When Intellectual Property Walks Out the Door, Data Stays Behind\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"datePublished\":\"2026-03-26T14:43:24+00:00\",\"dateModified\":\"2026-03-26T14:43:28+00:00\",\"description\":\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"width\":1920,\"height\":960,\"caption\":\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"When Intellectual Property Walks Out the Door, the Data Stays Behind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cuando la propiedad intelectual se va por la puerta, los datos se quedan atr\u00e1s.","description":"Los robos corporativos m\u00e1s perjudiciales en la actualidad involucran a empleados que abandonan la empresa. Los datos de propiedad intelectual pueden desaparecer sin dejar rastro.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/datos-de-propiedad-intelectual\/","og_locale":"es_ES","og_type":"article","og_title":"When Intellectual Property Walks Out the Door, the Data Stays Behind","og_description":"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.","og_url":"https:\/\/idsinc.com\/es\/datos-de-propiedad-intelectual\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2026-03-26T14:43:24+00:00","article_modified_time":"2026-03-26T14:43:28+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"iDiscovery Solutions","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"When Intellectual Property Walks Out the Door, the Data Stays Behind","datePublished":"2026-03-26T14:43:24+00:00","dateModified":"2026-03-26T14:43:28+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/"},"wordCount":471,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","articleSection":["Blog","IP + Trade Secrets + Employee Risk"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/intellectual-property-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/intellectual-property-data\/","url":"https:\/\/idsinc.com\/intellectual-property-data\/","name":"Cuando la propiedad intelectual se va por la puerta, los datos se quedan atr\u00e1s.","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","datePublished":"2026-03-26T14:43:24+00:00","dateModified":"2026-03-26T14:43:28+00:00","description":"Los robos corporativos m\u00e1s perjudiciales en la actualidad involucran a empleados que abandonan la empresa. Los datos de propiedad intelectual pueden desaparecer sin dejar rastro.","breadcrumb":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/intellectual-property-data\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","width":1920,"height":960,"caption":"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"When Intellectual Property Walks Out the Door, the Data Stays Behind"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"Soluciones iDiscovery","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/es\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/9572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=9572"}],"version-history":[{"count":2,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/9572\/revisions"}],"predecessor-version":[{"id":9578,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/9572\/revisions\/9578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/9573"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=9572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=9572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=9572"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}