{"id":1294,"date":"2022-10-05T10:00:00","date_gmt":"2022-10-05T15:00:00","guid":{"rendered":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?p=1294"},"modified":"2022-10-05T08:13:28","modified_gmt":"2022-10-05T13:13:28","slug":"politica-escritorio-despejado-seguridad-y-proteccion-de-datos","status":"publish","type":"post","link":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/","title":{"rendered":"Pol\u00edtica de Escritorio Despejado: Seguridad y Protecci\u00f3n de Datos"},"content":{"rendered":"\n<p class=\"has-text-align-justify\">Una pol\u00edtica de escritorio limpio o despejado es una forma sencilla de mantener la seguridad de tu empresa. En t\u00e9rminos generales, implica&nbsp;eliminar cualquier informaci\u00f3n confidencial&nbsp;de tu escritorio o&nbsp;almacenarla de forma adecuada: memorias USB, port\u00e1tiles, tarjetas de visita y documentos impresos, entre otros. Las sanciones por incumplimiento interno pueden variar desde advertencias hasta multas.<\/p>\n\n\n\n<div class=\"wp-block-cover\" style=\"min-height:288px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1125\" height=\"750\" class=\"wp-block-cover__image-background wp-image-1297\" alt=\"Pol\u00edtica \" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/image.png\" data-object-fit=\"cover\"\/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">ESCRITORIO DESPEJADO<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-justify\">Tras la vuelta a la presencia f\u00edsica en oficinas, os recordamos algunos aspectos de la pol\u00edtica de escritorio despejado que todos los empleados y empleadas deben cumplir.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">1- Tu PC&nbsp;port\u00e1til debe permanecer siempre con candado&nbsp;cuando abandones tu puesto de trabajo, aunque se trate de un per\u00edodo corto de tiempo<\/p>\n\n\n\n<p class=\"has-text-align-justify\">2- No esperes a que autom\u00e1ticamente se active el &#8220;salvapantallas&#8221; cuando no est\u00e9s en tu puesto de trabajo.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">3-&nbsp;No tires informaci\u00f3n confidencial a la papelera, destruye la informaci\u00f3n.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Se entiende por informaci\u00f3n confidencial, entre otras:<\/li><li>Informaci\u00f3n que contiene datos personales.<\/li><li>Datos relativos a ofertas y estrategia de la compa\u00f1\u00eda.<\/li><li>Informes de auditor\u00eda.<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-cover aligncenter\" style=\"min-height:339px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1125\" height=\"750\" class=\"wp-block-cover__image-background wp-image-1299\" alt=\"Pol\u00edtica \" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/image-2.png\" data-object-fit=\"cover\"\/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">SEGURIDAD<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-justify\">4- Est\u00e1&nbsp;prohibido anotar contrase\u00f1as&nbsp;en post-its, notas, agendas o similar que permitan f\u00e1cil acceso a las mismas.&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-justify\">5- Si est\u00e1s ubicado en un despacho o sala de reuni\u00f3n,&nbsp;ci\u00e9rralo con llave cuando salgas.<br><br>6- Si utilizas las pizarras en las salas de reuniones,&nbsp;borra la informaci\u00f3n escrita&nbsp;en ellas antes de abandonar la sala y no olvides la documentaci\u00f3n o dispositivos.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">7-&nbsp;No utilices dispositivos personales extra\u00edbles&nbsp;(smarthphone, disco duro, pen dirve, etc.) para extraer informaci\u00f3n de tu compa\u00f1\u00eda.<\/p>\n\n\n\n<div class=\"wp-block-cover\" style=\"min-height:325px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1125\" height=\"750\" class=\"wp-block-cover__image-background wp-image-1300\" alt=\"Pol\u00edtica \" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/image-3.png\" data-object-fit=\"cover\"\/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">PROTECCI\u00d3N | DATOS<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-justify\">8- S\u00e9 cuidadoso cuando hables por tel\u00e9fono en la calle o en espacios de EC en relaci\u00f3n con la informaci\u00f3n que comentas,&nbsp;no divulgues informaci\u00f3n confidencial.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">9-&nbsp;Evita dejar tu PC desatendido en el coche&nbsp;si tienes que hacer una parada de camino a casa.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">10-&nbsp;Mantente alerta sobre los correos de phishing e intentos de ingenier\u00eda social.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">Si observas informaci\u00f3n confidencial tirada en la papelera, sufres un robo de port\u00e1til, detectas actividad sospechosa en tu PC o cualquier otro tipo de incidente, por favor rep\u00f3rtalo a tu&nbsp;oficina de Seguridad de la Informaci\u00f3n.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><a href=\"https:\/\/uninter.edu.mx\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/04\/logouninter-1.png\" alt=\"\" class=\"wp-image-744\" width=\"122\" height=\"131\"\/><\/a><figcaption>    <\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><a href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/04\/LogoDTIP-2.png\" alt=\"\" class=\"wp-image-743\" width=\"127\" height=\"128\"\/><\/a><figcaption>        <\/figcaption><\/figure><\/div>","protected":false},"excerpt":{"rendered":"<p>Una pol\u00edtica de escritorio limpio o despejado es una forma sencilla de mantener la seguridad de tu empresa. En t\u00e9rminos generales, implica&nbsp;eliminar cualquier informaci\u00f3n confidencial&nbsp;de tu escritorio o&nbsp;almacenarla de forma adecuada: memorias USB, port\u00e1tiles, tarjetas de visita y documentos impresos, entre otros. Las sanciones por incumplimiento interno pueden variar desde advertencias hasta multas. Tras la&hellip;<\/p>\n","protected":false},"author":2,"featured_media":1306,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[30],"tags":[36],"class_list":["post-1294","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","tag-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Pol\u00edtica de Escritorio Despejado: Seguridad y Protecci\u00f3n de Datos - DTIP<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/\" \/>\r\n<meta property=\"og:locale\" content=\"es_MX\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Pol\u00edtica de Escritorio Despejado: Seguridad y Protecci\u00f3n de Datos - DTIP\" \/>\r\n<meta property=\"og:description\" content=\"Una pol\u00edtica de escritorio limpio o despejado es una forma sencilla de mantener la seguridad de tu empresa. En t\u00e9rminos generales, implica&nbsp;eliminar cualquier informaci\u00f3n confidencial&nbsp;de tu escritorio o&nbsp;almacenarla de forma adecuada: memorias USB, port\u00e1tiles, tarjetas de visita y documentos impresos, entre otros. Las sanciones por incumplimiento interno pueden variar desde advertencias hasta multas. Tras la&hellip;\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/\" \/>\r\n<meta property=\"og:site_name\" content=\"DTIP\" \/>\r\n<meta property=\"article:published_time\" content=\"2022-10-05T15:00:00+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/PAleSeguridadF.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\r\n\t<meta property=\"og:image:height\" content=\"620\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Alejandro Navarro\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alejandro Navarro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/\",\"name\":\"Pol\u00edtica de Escritorio Despejado: Seguridad y Protecci\u00f3n de Datos - DTIP\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/PAleSeguridad.jpg\",\"datePublished\":\"2022-10-05T15:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\"},\"breadcrumb\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/#primaryimage\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/PAleSeguridad.jpg\",\"contentUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/PAleSeguridad.jpg\",\"width\":460,\"height\":260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pol\u00edtica de Escritorio Despejado: Seguridad y Protecci\u00f3n de Datos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\",\"name\":\"DTIP\",\"description\":\"Direcci\u00f3n de Tecnolog\u00edas y Publicidad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\",\"name\":\"Alejandro Navarro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"caption\":\"Alejandro Navarro\"},\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pol\u00edtica de Escritorio Despejado: Seguridad y Protecci\u00f3n de Datos - DTIP","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/","og_locale":"es_MX","og_type":"article","og_title":"Pol\u00edtica de Escritorio Despejado: Seguridad y Protecci\u00f3n de Datos - DTIP","og_description":"Una pol\u00edtica de escritorio limpio o despejado es una forma sencilla de mantener la seguridad de tu empresa. En t\u00e9rminos generales, implica&nbsp;eliminar cualquier informaci\u00f3n confidencial&nbsp;de tu escritorio o&nbsp;almacenarla de forma adecuada: memorias USB, port\u00e1tiles, tarjetas de visita y documentos impresos, entre otros. Las sanciones por incumplimiento interno pueden variar desde advertencias hasta multas. Tras la&hellip;","og_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/","og_site_name":"DTIP","article_published_time":"2022-10-05T15:00:00+00:00","og_image":[{"width":1201,"height":620,"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/PAleSeguridadF.jpg","type":"image\/jpeg"}],"author":"Alejandro Navarro","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Alejandro Navarro","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/","name":"Pol\u00edtica de Escritorio Despejado: Seguridad y Protecci\u00f3n de Datos - DTIP","isPartOf":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/#primaryimage"},"image":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/PAleSeguridad.jpg","datePublished":"2022-10-05T15:00:00+00:00","author":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a"},"breadcrumb":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/#primaryimage","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/PAleSeguridad.jpg","contentUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/PAleSeguridad.jpg","width":460,"height":260},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/10\/05\/politica-escritorio-despejado-seguridad-y-proteccion-de-datos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/blogs.uninter.edu.mx\/DTIP\/"},{"@type":"ListItem","position":2,"name":"Pol\u00edtica de Escritorio Despejado: Seguridad y Protecci\u00f3n de Datos"}]},{"@type":"WebSite","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/","name":"DTIP","description":"Direcci\u00f3n de Tecnolog\u00edas y Publicidad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a","name":"Alejandro Navarro","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","caption":"Alejandro Navarro"},"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/10\/PAleSeguridad.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/1294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/comments?post=1294"}],"version-history":[{"count":8,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/1294\/revisions"}],"predecessor-version":[{"id":1308,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/1294\/revisions\/1308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media\/1306"}],"wp:attachment":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media?parent=1294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/categories?post=1294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/tags?post=1294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}