{"id":9622,"date":"2026-04-13T10:03:17","date_gmt":"2026-04-13T16:03:17","guid":{"rendered":"https:\/\/idsinc.com\/?p=9622"},"modified":"2026-04-13T10:03:20","modified_gmt":"2026-04-13T16:03:20","slug":"pillado-en-horario-laboral","status":"publish","type":"post","link":"https:\/\/idsinc.com\/es\/caught-on-company-time\/","title":{"rendered":"Atrapado en horario laboral"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p>De todas las amenazas internas a las que puede enfrentarse una organizaci\u00f3n, una de las m\u00e1s da\u00f1inas es tambi\u00e9n una de las m\u00e1s dif\u00edciles de detectar: el empleado que est\u00e1 creando activamente un negocio de la competencia mientras sigue sentado en tu escritorio, cobrando tu salario y utilizando tus recursos.<\/p>\n\n\n\n<p>Se trata de una violaci\u00f3n directa del deber fiduciario y una profunda traici\u00f3n a la confianza. Y sin embargo, como miembro del equipo de iDS <a href=\"https:\/\/idsinc.com\/es\/timothy-latulippe\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Timoteo LaTulippe<\/strong><\/a> explica en la tercera entrega de la <a href=\"https:\/\/idsinc.com\/es\/datos-de-propiedad-intelectual\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Pactos rotos<\/em><\/a> serie sobre <a href=\"https:\/\/www.lexology.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lexolog\u00eda<\/a>, Las entrevistas de recursos humanos y las evaluaciones de desempe\u00f1o tradicionales rara vez revelan las pruebas necesarias para actuar.<\/p>\n\n\n\n<p>Sin embargo, el registro digital es mucho m\u00e1s dif\u00edcil de ocultar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-concurrent-login\"><strong>El inicio de sesi\u00f3n simult\u00e1neo<\/strong><\/h3>\n\n\n\n<p>El punto de partida de muchas de estas investigaciones es lo que LaTulippe llama el <strong>inicio de sesi\u00f3n simult\u00e1neo<\/strong> \u2014 la evidencia forense de un empleado que alterna entre los sistemas leg\u00edtimos de la empresa y una infraestructura paralela oculta, a menudo dentro del mismo d\u00eda laboral.<\/p>\n\n\n\n<p>Mediante el an\u00e1lisis de la actividad del navegador, los datos de las cookies y las conexiones de red activas, los investigadores pueden identificar los momentos precisos en que un empleado registraba un dominio de la competencia, buscaba oficinas o elaboraba un plan de negocios rival; todo ello durante el horario laboral, en tiempo y con equipos de la empresa. El registro digital traza una l\u00ednea clara entre el final de la vida profesional del empleado y el comienzo de su actividad competitiva.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-artefacts-of-execution\"><strong>Artefactos de ejecuci\u00f3n<\/strong><\/h3>\n\n\n\n<p>M\u00e1s all\u00e1 del robo de tiempo, la investigaci\u00f3n se centra en lo que LaTulippe describe como <strong>artefactos de ejecuci\u00f3n<\/strong> \u2014 Evidencia t\u00e9cnica de que los recursos de la empresa se utilizaron directamente para subvencionar una empresa emergente. Esto incluye plantillas propietarias sin la marca de la empresa, consultas a sistemas CRM internos para exportar clientes potenciales de alto valor a una hoja de c\u00e1lculo personal, y un patr\u00f3n de acceso a datos que revela que alguien se hab\u00eda desconectado mentalmente mucho antes de recibir su carta de renuncia.<\/p>\n\n\n\n<p>El objetivo es una reconstrucci\u00f3n forense del d\u00eda a d\u00eda: una narraci\u00f3n cronol\u00f3gica que muestre la evoluci\u00f3n de una traici\u00f3n \u2014desde la preparaci\u00f3n inicial hasta la formaci\u00f3n de una entidad competidora en funcionamiento\u2014 presentada de forma que resulte convincente ante un juez.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-role-of-osint\"><strong>El papel de OSINT<\/strong><\/h3>\n\n\n\n<p>No existen dos competidores encubiertos que operen de la misma manera, pero la inteligencia de fuentes abiertas (OSINT) a\u00f1ade una valiosa herramienta a cualquier investigaci\u00f3n. LaTulippe describe c\u00f3mo la actividad en redes sociales, el historial de registro de dominios y las versiones en cach\u00e9 de los sitios web de la competencia pueden revelar que se estaba creando una nueva empresa meses antes de que un empleado abandonara oficialmente la compa\u00f1\u00eda, a menudo mientras la misma organizaci\u00f3n a la que estaba perjudicando a\u00fan le pagaba su salario.<\/p>\n\n\n\n<p>Al superponer los documentos p\u00fablicos y las se\u00f1ales digitales a los hallazgos forenses internos, los investigadores pueden demostrar que las bases de una empresa competidora se construyeron utilizando las propias herramientas, el tiempo y los datos de los clientes del empleador.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-s-coming-next\"><strong>\u00bfQu\u00e9 viene despu\u00e9s?<\/strong><\/h3>\n\n\n\n<p>El cuarto y \u00faltimo art\u00edculo de la serie aborda lo que LaTulippe denomina la batalla de los expertos: la etapa en la que la admisibilidad y la claridad narrativa determinan el resultado. Explora c\u00f3mo miles de l\u00edneas de metadatos complejos se transforman en cronogramas visuales codificados por colores que un juez puede comprender intuitivamente, por qu\u00e9 un informe forense bien elaborado suele propiciar acuerdos mucho antes de que un caso llegue a juicio, y c\u00f3mo una retenci\u00f3n forense proactiva funciona como una p\u00f3liza de seguro estrat\u00e9gica contra la mala conducta en una fuerza laboral cada vez m\u00e1s m\u00f3vil.<\/p>\n\n\n\n<p>En iDS, este trabajo abarca nuestra <a href=\"https:\/\/idsinc.com\/es\/que-hacemos\/analisis-forense-digital\/\" target=\"_blank\" rel=\"noreferrer noopener\">Forense digital<\/a>, <a href=\"https:\/\/idsinc.com\/es\/que-hacemos\/#SpecialInvestigationsUnit\" target=\"_blank\" rel=\"noreferrer noopener\">Investigaciones<\/a>, y <a href=\"https:\/\/idsinc.com\/es\/que-hacemos\/#ediscovery\" target=\"_blank\" rel=\"noreferrer noopener\">descubrimiento electr\u00f3nico y divulgaci\u00f3n<\/a> pr\u00e1cticas que transforman pruebas digitales complejas en narrativas claras y defendibles que respaldan a los equipos legales desde la investigaci\u00f3n hasta el juicio.<a href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=7f883dc4-7bcc-4001-84f4-e2323b687d41\" type=\"link\" id=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=7f883dc4-7bcc-4001-84f4-e2323b687d41\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><br><\/strong><\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=7f883dc4-7bcc-4001-84f4-e2323b687d41\" style=\"background-color:#ee5d20\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Lee el art\u00edculo completo en Lexology.<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p>Para ponerse en contacto con un experto de iDS sobre su pr\u00f3xima investigaci\u00f3n, visite <a href=\"https:\/\/idsinc.com\/es\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>idsinc.com<\/strong><\/a><strong>.<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong><em>iDS ofrece soluciones de datos de consulta a corporaciones y bufetes de abogados de todo el mundo, brind\u00e1ndoles una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo. Para obtener m\u00e1s informaci\u00f3n, visite <\/em><\/strong><a href=\"https:\/\/idsinc.com\/es\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><em>idsinc.com<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n\n\n\n<p><em><br>\u00bfTienes problemas con alg\u00fan t\u00e9rmino t\u00e9cnico utilizado en esta publicaci\u00f3n? Consulta nuestra <\/em><a href=\"https:\/\/idsinc.com\/es\/glosario\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Glosario de Data Investigators<\/em><\/a><em> para descifrar el c\u00f3digo.\u00a0<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Of all the insider threats an organization can face, one of the most damaging is also one of the hardest to detect: the employee who is actively building a competing business while still sitting at your desk, drawing your salary, and using your resources. It is a direct violation of fiduciary duty and a profound [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9625,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,35],"tags":[],"class_list":["post-9622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ip","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Caught on Company Time - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/pillado-en-horario-laboral\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Caught on Company Time\" \/>\n<meta property=\"og:description\" content=\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/pillado-en-horario-laboral\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-13T16:03:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T16:03:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Caught on Company Time\",\"datePublished\":\"2026-04-13T16:03:17+00:00\",\"dateModified\":\"2026-04-13T16:03:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\"},\"wordCount\":629,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"articleSection\":[\"Blog\",\"IP + Trade Secrets + Employee Risk\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\",\"name\":\"Caught on Company Time - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"datePublished\":\"2026-04-13T16:03:17+00:00\",\"dateModified\":\"2026-04-13T16:03:20+00:00\",\"description\":\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"width\":1920,\"height\":960,\"caption\":\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Caught on Company Time\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Atrapados en horario laboral - iDiscovery Solutions","description":"Una de las amenazas internas m\u00e1s perjudiciales a las que se puede enfrentar una organizaci\u00f3n es que un empleado cree negocios de la competencia utilizando sus recursos.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/pillado-en-horario-laboral\/","og_locale":"es_ES","og_type":"article","og_title":"Caught on Company Time","og_description":"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.","og_url":"https:\/\/idsinc.com\/es\/pillado-en-horario-laboral\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2026-04-13T16:03:17+00:00","article_modified_time":"2026-04-13T16:03:20+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"iDiscovery Solutions","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/caught-on-company-time\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Caught on Company Time","datePublished":"2026-04-13T16:03:17+00:00","dateModified":"2026-04-13T16:03:20+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/"},"wordCount":629,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","articleSection":["Blog","IP + Trade Secrets + Employee Risk"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/caught-on-company-time\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/caught-on-company-time\/","url":"https:\/\/idsinc.com\/caught-on-company-time\/","name":"Atrapados en horario laboral - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","datePublished":"2026-04-13T16:03:17+00:00","dateModified":"2026-04-13T16:03:20+00:00","description":"Una de las amenazas internas m\u00e1s perjudiciales a las que se puede enfrentar una organizaci\u00f3n es que un empleado cree negocios de la competencia utilizando sus recursos.","breadcrumb":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/caught-on-company-time\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","width":1920,"height":960,"caption":"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/caught-on-company-time\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Caught on Company Time"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"Soluciones iDiscovery","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/es\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/9622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=9622"}],"version-history":[{"count":2,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/9622\/revisions"}],"predecessor-version":[{"id":9629,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/9622\/revisions\/9629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/9625"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=9622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=9622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=9622"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}