{"id":9600,"date":"2026-04-02T12:57:42","date_gmt":"2026-04-02T18:57:42","guid":{"rendered":"https:\/\/idsinc.com\/?p=9600"},"modified":"2026-04-02T12:57:45","modified_gmt":"2026-04-02T18:57:45","slug":"pactos-rotos","status":"publish","type":"post","link":"https:\/\/idsinc.com\/es\/broken-covenants\/","title":{"rendered":"Mensajes privados, consecuencias p\u00fablicas: El rastro forense tras las violaciones de los acuerdos de no competencia"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p>Existe una creciente creencia entre quienes incumplen sus obligaciones posteriores a la rescisi\u00f3n del contrato: si trasladan la conversaci\u00f3n del correo electr\u00f3nico corporativo a WhatsApp o Signal, se habr\u00e1n alejado del alcance de la empresa. Sin registro del servidor, no hay pruebas. Sin pruebas, no hay caso.<\/p>\n\n\n\n<p>Es un error de c\u00e1lculo fundamental.<\/p>\n\n\n\n<p>En el <a href=\"https:\/\/idsinc.com\/es\/datos-de-propiedad-intelectual\/\" target=\"_blank\" rel=\"noreferrer noopener\">segunda entrega<\/a> del <em>Pactos rotos<\/em> serie publicada en <a href=\"https:\/\/www.lexology.com\/\">Lexolog\u00eda<\/a>, miembro del equipo iDS <a href=\"https:\/\/idsinc.com\/es\/timothy-latulippe\/\">Timoteo LaTulippe<\/a> Examina las t\u00e9cnicas forenses que se utilizan para descifrar la privacidad de los mensajes y por qu\u00e9 las aplicaciones cifradas ofrecen mucha menos protecci\u00f3n de la que suponen sus usuarios.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-paperless-trail\"><strong>El sendero sin papel<\/strong><\/h3>\n\n\n\n<p>Demostrar el incumplimiento de un pacto de no competencia o de no captaci\u00f3n de clientes exige m\u00e1s que simples coincidencias o rumores. Requiere lo que el art\u00edculo denomina \u201cel rastro digital\u201d. Si bien las aplicaciones de mensajer\u00eda cifrada protegen los datos en tr\u00e1nsito, los datos almacenados en un dispositivo f\u00edsico cuentan una historia diferente. Las t\u00e9cnicas de extracci\u00f3n sofisticadas pueden recuperar fragmentos de mensajes eliminados de tel\u00e9fonos m\u00f3viles y sacar a la luz registros de sincronizaci\u00f3n en la nube que el usuario probablemente hab\u00eda olvidado por completo.<\/p>\n\n\n\n<p>Las plataformas m\u00e1s utilizadas son aquellas que la gente ya usa a diario: WhatsApp en el Reino Unido y Europa Occidental, WeChat en China, LINE en Asia Oriental y Signal o Viber en otros lugares. Su comodidad es precisamente la raz\u00f3n por la que se convierten en el veh\u00edculo para actividades il\u00edcitas. Y a pesar de su reputaci\u00f3n de proteger la privacidad desde el dise\u00f1o, la mayor\u00eda son vulnerables a la explotaci\u00f3n por parte de expertos forenses que saben d\u00f3nde se almacenan los registros de las conversaciones.<\/p>\n\n\n\n<p>LaTulippe describe casos en los que exempleados negaron rotundamente haber contactado a colegas, pero un an\u00e1lisis forense de im\u00e1genes revel\u00f3 una lista de contactos oculta o una carpeta secreta con capturas de pantalla creadas en un dispositivo personal en los d\u00edas previos a la renuncia. En otros casos, el an\u00e1lisis de sentimientos y el examen de metadatos revelaron un patr\u00f3n calculado: un gerente que, al momento de su partida, compart\u00eda datos internos sobre salarios y evaluaciones de desempe\u00f1o con un competidor en tiempo real, mientras a\u00fan estaba en la n\u00f3mina.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-right-to-access-problem\"><strong>El problema del derecho de acceso<\/strong><\/h3>\n\n\n\n<p>Recuperar los datos es solo la mitad del desaf\u00edo. El problema m\u00e1s complejo para los equipos legales radica en el derecho a acceder a ellos. Si bien el uso de dispositivos personales con fines comerciales es habitual, las pol\u00edticas de uso aceptable a menudo no contemplan la realidad de los entornos donde se permite el uso de dispositivos personales. Sin una redacci\u00f3n clara en los contratos laborales, la creaci\u00f3n de im\u00e1genes de un dispositivo personal rara vez es sencilla.<\/p>\n\n\n\n<p>Como se\u00f1ala el art\u00edculo, una pol\u00edtica s\u00f3lida \u2014establecida mucho antes de que surja cualquier disputa\u2014 crea la expectativa legal de que se pueda acceder a los dispositivos o evaluarlos en el contexto de una investigaci\u00f3n. Es, como indica LaTulippe, un aspecto crucial que los equipos legales deben abordar antes de que se produzca una crisis.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-comes-next-in-the-series\"><strong>\u00bfQu\u00e9 sigue en la serie?<\/strong><\/h3>\n\n\n\n<p>La pr\u00f3xima entrega abordar\u00e1 otra forma de amenaza interna: individuos que crean negocios paralelos que compiten entre s\u00ed \u2014a veces utilizando los sistemas y el horario laboral de la empresa\u2014 y las huellas que dejan al intentar llevarse consigo a clientes y compa\u00f1eros.<\/p>\n\n\n\n<p>En iDS, este trabajo se encuentra en el centro de lo que hacemos. Nuestro <a href=\"https:\/\/idsinc.com\/es\/que-hacemos\/analisis-forense-digital\/\" target=\"_blank\" rel=\"noreferrer noopener\">Forense digital<\/a>, <a href=\"https:\/\/idsinc.com\/es\/que-hacemos\/#SpecialInvestigationsUnit\" target=\"_blank\" rel=\"noreferrer noopener\">Investigaciones<\/a>, y <a href=\"https:\/\/idsinc.com\/es\/que-hacemos\/#ediscovery\" target=\"_blank\" rel=\"noreferrer noopener\">descubrimiento electr\u00f3nico y divulgaci\u00f3n<\/a> Estas pr\u00e1cticas ayudan a los equipos legales a construir el tipo de narrativa respaldada por evidencia que sustenta las medidas cautelares y los litigios, transformando artefactos digitales fragmentados en un relato coherente y defendible de lo que realmente sucedi\u00f3.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=0ff46e8d-84a1-4421-ace3-04f0560590fe\" style=\"background-color:#ee5d20;padding-top:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40)\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Lee el art\u00edculo completo en Lexology.<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p>Para hablar con un experto de iDS sobre investigaciones de no competencia o an\u00e1lisis forense digital, visite <a href=\"https:\/\/idsinc.com\/es\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>idsinc.com<\/strong><\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em><strong>iDS ofrece soluciones de datos de consulta a corporaciones y bufetes de abogados de todo el mundo, brind\u00e1ndoles una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo. Para obtener m\u00e1s informaci\u00f3n, visite <a href=\"https:\/\/idsinc.com\/es\/\" type=\"link\" id=\"https:\/\/idsinc.com\" target=\"_blank\" rel=\"noreferrer noopener\">idsinc.com<\/a><\/strong><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>There is a growing assumption among those who choose to violate their post-termination obligations: move the conversation off corporate email and onto WhatsApp or Signal, and you have effectively stepped outside the company&#8217;s reach. No server log, no evidence. No evidence, no case. It is a fundamental miscalculation. In the second installment of the Broken [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9601,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,33,34],"tags":[],"class_list":["post-9600","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-data-sources","category-privacy","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Broken Covenants: Private Messages, Public Consequences<\/title>\n<meta name=\"description\" content=\"This article on Broken Covenants reveals the misconceptions surrounding encrypted apps and their actual security in corporate settings.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/pactos-rotos\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Private Messages, Public Consequences: The Forensic Trail Behind Non-Compete Violations\" \/>\n<meta property=\"og:description\" content=\"This article on Broken Covenants reveals the misconceptions surrounding encrypted apps and their actual security in corporate settings.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/pactos-rotos\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-02T18:57:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T18:57:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Broken-Covenants-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Private Messages, Public Consequences: The Forensic Trail Behind Non-Compete Violations\",\"datePublished\":\"2026-04-02T18:57:42+00:00\",\"dateModified\":\"2026-04-02T18:57:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/\"},\"wordCount\":598,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Broken-Covenants-scaled.jpg\",\"articleSection\":[\"Blog\",\"Data Sources (Mobile, IoT, Non-Traditional)\",\"Privacy + Compliance\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/\",\"name\":\"Broken Covenants: Private Messages, Public Consequences\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Broken-Covenants-scaled.jpg\",\"datePublished\":\"2026-04-02T18:57:42+00:00\",\"dateModified\":\"2026-04-02T18:57:45+00:00\",\"description\":\"This article on Broken Covenants reveals the misconceptions surrounding encrypted apps and their actual security in corporate settings.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Broken-Covenants-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Broken-Covenants-scaled.jpg\",\"width\":1920,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/broken-covenants\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Private Messages, Public Consequences: The Forensic Trail Behind Non-Compete Violations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pactos rotos: Mensajes privados, consecuencias p\u00fablicas","description":"Este art\u00edculo de Broken Covenants revela las ideas err\u00f3neas que rodean a las aplicaciones cifradas y su seguridad real en entornos corporativos.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/pactos-rotos\/","og_locale":"es_ES","og_type":"article","og_title":"Private Messages, Public Consequences: The Forensic Trail Behind Non-Compete Violations","og_description":"This article on Broken Covenants reveals the misconceptions surrounding encrypted apps and their actual security in corporate settings.","og_url":"https:\/\/idsinc.com\/es\/pactos-rotos\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2026-04-02T18:57:42+00:00","article_modified_time":"2026-04-02T18:57:45+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Broken-Covenants-scaled.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"iDiscovery Solutions","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/broken-covenants\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/broken-covenants\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Private Messages, Public Consequences: The Forensic Trail Behind Non-Compete Violations","datePublished":"2026-04-02T18:57:42+00:00","dateModified":"2026-04-02T18:57:45+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/broken-covenants\/"},"wordCount":598,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/broken-covenants\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Broken-Covenants-scaled.jpg","articleSection":["Blog","Data Sources (Mobile, IoT, Non-Traditional)","Privacy + Compliance"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/broken-covenants\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/broken-covenants\/","url":"https:\/\/idsinc.com\/broken-covenants\/","name":"Pactos rotos: Mensajes privados, consecuencias p\u00fablicas","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/broken-covenants\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/broken-covenants\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Broken-Covenants-scaled.jpg","datePublished":"2026-04-02T18:57:42+00:00","dateModified":"2026-04-02T18:57:45+00:00","description":"Este art\u00edculo de Broken Covenants revela las ideas err\u00f3neas que rodean a las aplicaciones cifradas y su seguridad real en entornos corporativos.","breadcrumb":{"@id":"https:\/\/idsinc.com\/broken-covenants\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/broken-covenants\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/broken-covenants\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Broken-Covenants-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Broken-Covenants-scaled.jpg","width":1920,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/broken-covenants\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Private Messages, Public Consequences: The Forensic Trail Behind Non-Compete Violations"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"Soluciones iDiscovery","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/es\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/9600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=9600"}],"version-history":[{"count":2,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/9600\/revisions"}],"predecessor-version":[{"id":9606,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/9600\/revisions\/9606"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/9601"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=9600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=9600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=9600"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}