{"id":2382,"date":"2014-07-31T00:00:00","date_gmt":"2014-07-30T22:00:00","guid":{"rendered":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/"},"modified":"2024-11-12T15:59:05","modified_gmt":"2024-11-12T14:59:05","slug":"preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm","status":"publish","type":"post","link":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/","title":{"rendered":"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part V (IRM)"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_wp_text el_class=&#8217;section-post-default&#8217;]<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" width=\"454\" height=\"170\" alt=\"Proteger documentos almacenados en SharePoint- Parte V (IRM)\" src=\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/cd3fc33c-e150-45d1-bbd8-84498377a14f\"> In this last chapter of IRM and Office 365 we will go into detail on how <strong>IRM helps companies protect documents stored in SharePoint Online.<\/strong><\/p>\n<\/p>\n<p>With MRI <strong>you can restrict<\/strong> what employees can perform on documents to <strong>protect and control the spread of sensitive content.<\/strong> For example, if you created a document library to share information about upcoming products with the marketing department of your company, you can use IRM to prevent these users from sharing this content with other company employees.<\/p>\n<p>IRM can be configured to automatically protect certain files stored in SharePoint libraries. When enabled, the files are encrypted so that only authorized people can view them or make them the predefined actions. For example:<\/p>\n<ul>\n<li>\n<p> Prevent <b>people outside<\/b> the company can open the document, although physically have. <\/p>\n<\/li>\n<li>\n<p> Avoid the possibility that <b>employees<\/b> of our organization to print, make a screenshot of a document, copy or modify it. <\/p>\n<\/li>\n<li>\n<p> Prevent an unauthorized user to view the contents if sent by mail after downloading it from the server. <\/p>\n<\/li>\n<li>\n<p> Limit the type of files that can be loaded into the library. <\/p>\n<\/li>\n<li>\n<p> Restrict access to content for a specified period, after which users must confirm their credentials. <\/p>\n<\/li>\n<\/ul>\n<p><img decoding=\"async\" alt=\"Proteger documentos almacenados en SharePoint- Parte V (IRM)\" src=\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/66bb5990-3b14-4e79-a8ca-7a6ca353ec59\"><\/p>\n<p>IRM permissions apply to the entire library, not individual files, helping to <b>ensure consistent levels of protection<\/b> for a complete set of documents or files. Thus, IRM helps organizations to force corporate policies governing the use and disclosure of confidential information or property.<\/p>\n<\/p>\n<p> Want to have an overview of how MRI works and Office 365? <\/p>\n<\/p>\n<p> <a title=\"Preventing leaks of sensitive information with the help of Office 365 - Part I (IRM)\" href=\"\/Rendering\/Render\/en-US\/bc648590-08e8-4316-b0ea-6398e7c86844\">Yes, I want to know more<\/a> <\/p>\n<p>[\/vc_wp_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_wp_text el_class=&#8217;section-post-default&#8217;] In this last chapter of IRM and Office 365 we will go into detail on how IRM helps companies protect documents stored in SharePoint Online. With MRI you can restrict what employees can perform on documents to protect and control the spread of sensitive content. For example, if you created a document library [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"categoria_posts":[],"class_list":["post-2382","post","type-post","status-publish","format-standard","hentry","category-sin-categorizar"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Preventing leaks of sensitive information with the help of Office 365 \u2013 Part V (IRM) - Softeng<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part V (IRM) - Softeng\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_wp_text el_class=&#8217;section-post-default&#8217;] In this last chapter of IRM and Office 365 we will go into detail on how IRM helps companies protect documents stored in SharePoint Online. With MRI you can restrict what employees can perform on documents to protect and control the spread of sensitive content. For example, if you created a document library [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/\" \/>\n<meta property=\"og:site_name\" content=\"Softeng\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-30T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-12T14:59:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/cd3fc33c-e150-45d1-bbd8-84498377a14f\" \/>\n<meta name=\"author\" content=\"Daniel Navarro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Navarro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/\"},\"author\":{\"name\":\"Daniel Navarro\",\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/person\/ed4f333f0a809c0610c9f7d9f224ff09\"},\"headline\":\"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part V (IRM)\",\"datePublished\":\"2014-07-30T22:00:00+00:00\",\"dateModified\":\"2024-11-12T14:59:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/\"},\"wordCount\":283,\"publisher\":{\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/cd3fc33c-e150-45d1-bbd8-84498377a14f\",\"articleSection\":[\"Sin categorizar\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/\",\"url\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/\",\"name\":\"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part V (IRM) - Softeng\",\"isPartOf\":{\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/cd3fc33c-e150-45d1-bbd8-84498377a14f\",\"datePublished\":\"2014-07-30T22:00:00+00:00\",\"dateModified\":\"2024-11-12T14:59:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#primaryimage\",\"url\":\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/cd3fc33c-e150-45d1-bbd8-84498377a14f\",\"contentUrl\":\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/cd3fc33c-e150-45d1-bbd8-84498377a14f\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part V (IRM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#website\",\"url\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/\",\"name\":\"Softeng\",\"description\":\"Softeng | Maximize the cloud. Securely.\",\"publisher\":{\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization\",\"name\":\"Softeng\",\"url\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/logo\/image\/\",\"url\":\"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png\",\"contentUrl\":\"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png\",\"width\":696,\"height\":696,\"caption\":\"Softeng\"},\"image\":{\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/softeng\/\",\"https:\/\/www.youtube.com\/@SoftengSL\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/person\/ed4f333f0a809c0610c9f7d9f224ff09\",\"name\":\"Daniel Navarro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"caption\":\"Daniel Navarro\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part V (IRM) - Softeng","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part V (IRM) - Softeng","og_description":"[vc_row][vc_column][vc_wp_text el_class=&#8217;section-post-default&#8217;] In this last chapter of IRM and Office 365 we will go into detail on how IRM helps companies protect documents stored in SharePoint Online. With MRI you can restrict what employees can perform on documents to protect and control the spread of sensitive content. For example, if you created a document library [&hellip;]","og_url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/","og_site_name":"Softeng","article_published_time":"2014-07-30T22:00:00+00:00","article_modified_time":"2024-11-12T14:59:05+00:00","og_image":[{"url":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/cd3fc33c-e150-45d1-bbd8-84498377a14f","type":"","width":"","height":""}],"author":"Daniel Navarro","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Daniel Navarro","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#article","isPartOf":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/"},"author":{"name":"Daniel Navarro","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/person\/ed4f333f0a809c0610c9f7d9f224ff09"},"headline":"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part V (IRM)","datePublished":"2014-07-30T22:00:00+00:00","dateModified":"2024-11-12T14:59:05+00:00","mainEntityOfPage":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/"},"wordCount":283,"publisher":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#primaryimage"},"thumbnailUrl":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/cd3fc33c-e150-45d1-bbd8-84498377a14f","articleSection":["Sin categorizar"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/","name":"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part V (IRM) - Softeng","isPartOf":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#primaryimage"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#primaryimage"},"thumbnailUrl":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/cd3fc33c-e150-45d1-bbd8-84498377a14f","datePublished":"2014-07-30T22:00:00+00:00","dateModified":"2024-11-12T14:59:05+00:00","breadcrumb":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#primaryimage","url":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/cd3fc33c-e150-45d1-bbd8-84498377a14f","contentUrl":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/cd3fc33c-e150-45d1-bbd8-84498377a14f"},{"@type":"BreadcrumbList","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/preventing-leaks-of-sensitive-information-with-the-help-of-office-365-part-v-irm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/"},{"@type":"ListItem","position":2,"name":"Preventing leaks of sensitive information with the help of Office 365 \u2013 Part V (IRM)"}]},{"@type":"WebSite","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#website","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/","name":"Softeng","description":"Softeng | Maximize the cloud. Securely.","publisher":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization","name":"Softeng","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png","contentUrl":"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png","width":696,"height":696,"caption":"Softeng"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/softeng\/","https:\/\/www.youtube.com\/@SoftengSL"]},{"@type":"Person","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/person\/ed4f333f0a809c0610c9f7d9f224ff09","name":"Daniel Navarro","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","caption":"Daniel Navarro"}}]}},"_links":{"self":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/2382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/comments?post=2382"}],"version-history":[{"count":1,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/2382\/revisions"}],"predecessor-version":[{"id":36172,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/2382\/revisions\/36172"}],"wp:attachment":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/media?parent=2382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/categories?post=2382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/tags?post=2382"},{"taxonomy":"categoria_posts","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/categoria_posts?post=2382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}