{"id":3974,"date":"2023-10-02T13:48:29","date_gmt":"2023-10-02T19:48:29","guid":{"rendered":"https:\/\/redporlaciberseguridad.org\/?p=3974"},"modified":"2023-10-10T13:11:40","modified_gmt":"2023-10-10T19:11:40","slug":"cuales-son-mis-derechos-digitales","status":"publish","type":"post","link":"https:\/\/redporlaciberseguridad.org\/en\/cuales-son-mis-derechos-digitales\/","title":{"rendered":"What are my digital rights?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3974\" class=\"elementor elementor-3974\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1bdc83b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"1bdc83b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3302f89\" data-id=\"3302f89\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9dc496e elementor-widget elementor-widget-heading\" data-id=\"9dc496e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are my digital rights? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc6a5a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"cc6a5a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5dbdb7\" data-id=\"e5dbdb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40d5738 elementor-widget elementor-widget-image\" data-id=\"40d5738\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/derechos-post-1024x577.png\" class=\"attachment-large size-large wp-image-3979\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/derechos-post-1024x577.png 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/derechos-post-600x338.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/derechos-post-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/derechos-post-768x433.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/derechos-post-1536x865.png 1536w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/derechos-post.png 1640w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c408df elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"0c408df\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a26d7d0\" data-id=\"a26d7d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc79e85 elementor-widget elementor-widget-text-editor\" data-id=\"bc79e85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section data-id=\"03e7935\" data-element_type=\"section\"><div data-id=\"fc1ff06\" data-element_type=\"column\"><div data-id=\"df65d53\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">The use of technologies is increasingly constant while digitalization is gaining ground in each of the aspects of our daily lives and therefore it was necessary to adapt different areas.<\/span> <span class=\"OYPEnA text-decoration-none text-strikethrough-none\">And of course the law was not the exception, since having digital citizenship would have to add rights for them.<\/span><\/p><p>\u00a0<\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">To prevent the Internet from becoming a lawless world and where the web becomes an effective and safe tool for all users, different international organizations and organizations created what we know today as digital rights.<\/span><\/p><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2514ebd elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2514ebd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6ebae1\" data-id=\"f6ebae1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27cae4c elementor-widget elementor-widget-heading\" data-id=\"27cae4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Digital rights<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73621ef elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"73621ef\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c1ad728\" data-id=\"c1ad728\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56c0ab0 elementor-widget elementor-widget-heading\" data-id=\"56c0ab0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What are?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf857fc elementor-widget elementor-widget-text-editor\" data-id=\"bf857fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Fundamental rules or freedoms for the enjoyment of digital life in safe conditions that allow any user to access the creation and publication of digital content that in turn allows the use of and access to any electronic device.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8f46e4c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"8f46e4c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-80ce42e\" data-id=\"80ce42e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2263665 elementor-widget elementor-widget-heading\" data-id=\"2263665\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goal<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ab3653 elementor-widget elementor-widget-text-editor\" data-id=\"3ab3653\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-subtitle\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Guarantee the right to safe use of the Internet, avoiding the inequality of the impact of information technologies and guaranteeing communication between social groups.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7445ee0 elementor-widget elementor-widget-image\" data-id=\"7445ee0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-heredar-3-300x251.png\" class=\"attachment-medium size-medium wp-image-3978\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-heredar-3-300x251.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-heredar-3-600x503.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-heredar-3-768x644.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-heredar-3.png 940w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-db25952 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"db25952\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-480bfe3\" data-id=\"480bfe3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-995c7c1 elementor-widget elementor-widget-heading\" data-id=\"995c7c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">WHICH ARE?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc256e3 elementor-widget elementor-widget-text-editor\" data-id=\"cc256e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Each country creates its own digital rights according to the needs and protection mechanisms for users and although they are not currently established in Mexico due to the lack of a law on cybersecurity issues, <\/span><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">no quiere decir que no podamos guiarnos y llevar a la pr\u00e1ctica lo que dicen otros derechos digitales ya que en si todas estas comparten los mismos principios y objetivos.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-662bdcb elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"662bdcb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb361fc\" data-id=\"bb361fc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1f30e3 elementor-widget elementor-widget-heading\" data-id=\"c1f30e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RIGHT TO PRIVACY IN THE WORKPLACE<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f5149c elementor-widget elementor-widget-text-editor\" data-id=\"9f5149c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">It provides protection to the intimacy, privacy and private information of workers against any digital device in the workplace.<\/span><\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\">\u00a0<\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Although control and surveillance measures such as identification cards and even the use of video surveillance can be adopted, although this must meet some requirements that are considered suitable to verify that workers comply with their duties and obligations.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2853603 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2853603\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a384acd\" data-id=\"a384acd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dcf372a elementor-widget elementor-widget-heading\" data-id=\"dcf372a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RIGHT TO INTERNET NEUTRALITY<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6f8033 elementor-widget elementor-widget-text-editor\" data-id=\"e6f8033\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Avoid discrimination by internet service providers, having transparency when offering said service without taking into account technical and\/or economic reasons.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-06a60e6 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"06a60e6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e919ea7\" data-id=\"e919ea7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5100497 elementor-widget elementor-widget-heading\" data-id=\"5100497\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RIGHT TO DIGITAL SECURITY<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa49388 elementor-widget elementor-widget-text-editor\" data-id=\"fa49388\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Provides security to users when carrying out any type of communication over the Internet.<\/span><\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\">\u00a0<\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">For example, in the use of antivirus or identity verification or authentication systems, where both are programs that are responsible for the protection of both our electronic devices and the information that is found.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9cb41b0 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"9cb41b0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9aca35c\" data-id=\"9aca35c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b56e636 elementor-widget elementor-widget-heading\" data-id=\"b56e636\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RIGHT TO BE FORGOTTEN IN INTERNET SEARCHES, SOCIAL NETWORK SERVICES AND EQUIVALENT<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4df080c elementor-widget elementor-widget-text-editor\" data-id=\"4df080c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Any search result referring to a person's name must be removed from any search engine if there is no accurate, relevant or outdated data.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c2bc49 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"4c2bc49\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd65e1f\" data-id=\"fd65e1f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96011e4 elementor-widget elementor-widget-heading\" data-id=\"96011e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RIGHT TO FREEDOM OF EXPRESSION<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e1358a elementor-widget elementor-widget-text-editor\" data-id=\"3e1358a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">The right to seek, receive and\/or disseminate information, ideas or thoughts through the digital sphere without retaliation by the state or companies that provide the service.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-96d2647 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"96d2647\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d250d1a\" data-id=\"d250d1a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-95c13ba elementor-widget elementor-widget-heading\" data-id=\"95c13ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RIGHT TO PORTABILITY<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b99efdf elementor-widget elementor-widget-text-editor\" data-id=\"b99efdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Every user can easily obtain, copy or transmit their personal data in structured electronic formats from public and private institutions, which they can reuse for their benefit, based on ARCO rights.<\/span><\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\">\u00a0<\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">That is, the citizen can demand that any organization that is using their data return it to them or pass it on to another organization or company.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2e472a elementor-widget elementor-widget-image\" data-id=\"d2e472a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-heredar-4-300x251.png\" class=\"attachment-medium size-medium wp-image-3977\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-heredar-4-300x251.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-heredar-4-600x503.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-heredar-4-768x644.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-heredar-4.png 940w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13d95b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"13d95b2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8c9cac8\" data-id=\"8c9cac8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-92add41 elementor-widget elementor-widget-heading\" data-id=\"92add41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">COLLECTIVE BARGAINING LAW<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3b1475 elementor-widget elementor-widget-text-editor\" data-id=\"b3b1475\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Collective agreements can establish additional guarantees of rights and freedoms, related to the personal data of workers and digital rights in the workplace since through the dialogue or conversation that takes place in the digital space, employers and Their organizations and\/or unions can agree to fair wages and decent working conditions for all those involved.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5183107 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5183107\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-13f6b54\" data-id=\"13f6b54\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5101062 elementor-widget elementor-widget-heading\" data-id=\"5101062\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RIGHT TO DATA PROTECTION OF MINORS ON THE INTERNET<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac8829d elementor-widget elementor-widget-text-editor\" data-id=\"ac8829d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Any activity carried out on the website with minors under 14 years of age must have the consent of the minor or their legal representatives.<\/span><\/p><p>\u00a0<\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">We leave you a link to a blog of our friends at <span style=\"color: #000080;\"><strong>#Likeinteligente<\/strong><\/span> where they delve into the topic of data protection of minors and its possible risks: <\/span><span style=\"color: #3366ff;\"><strong><a style=\"color: #3366ff;\" href=\"https:\/\/www.likeinteligente.org\/2022\/06\/01\/ciberseguridad-en-apoyo-a-la-educacion\/\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">https:\/\/www.likeinteligente.org\/2022\/06\/01\/ciberseguridad-en-apoyo-a-la-educacion\/<\/span><\/a><\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0623c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"f0623c9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-374593b\" data-id=\"374593b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-48a8cea elementor-widget elementor-widget-heading\" data-id=\"48a8cea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RIGHT OF RECTIFICATION ON THE INTERNET<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7de759 elementor-widget elementor-widget-text-editor\" data-id=\"b7de759\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Permite que los usuarios<\/span> <span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Let the users correct their error when disseminating non-true content and\/or information that has been transmitted through a digital medium, the dissemination of which may cause some damage to the image, privacy and intimacy of third parties.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8291d9 elementor-widget elementor-widget-image\" data-id=\"e8291d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-derechos-300x251.png\" class=\"attachment-medium size-medium wp-image-3976\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-derechos-300x251.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-derechos-600x503.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-derechos-768x644.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-derechos.png 940w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5eab04b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5eab04b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8507ec6\" data-id=\"8507ec6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5699edf elementor-widget elementor-widget-heading\" data-id=\"5699edf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><b>bibliographic references<\/b><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-645eb12 elementor-widget elementor-widget-text-editor\" data-id=\"645eb12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Ram\u00edrez, H. (2022, 26 julio). Derechos Digitales. Conoce cu\u00e1les son tus derechos en Internet. Grupo Atico34. <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/protecciondatos-lopd.com\/empresas\/derechos-digitales\/\">https:\/\/protecciondatos-lopd.com\/empresas\/derechos-digitales\/<\/a><\/span><\/li><li>Derechos digitales, imprescindibles en la era de Internet. (2021, 22 abril). Iberdrola. <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/www.iberdrola.com\/innovacion\/que-son-derechos-digitales\">https:\/\/www.iberdrola.com\/innovacion\/que-son-derechos-digitales<\/a><\/span><\/li><li>Galeano, S. (s. f.). LOS 10 DERECHOS DIGITALES QUE DEBES CONOCER. qroo.gob. Recuperado de <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/ayudaleyprotecciondatos.es\/2018\/11\/15\/invasion-privacidad-laboral\/\">https:\/\/qroo.gob.mx\/iqit\/derechos-humanos-10-derechos-digitales-debes-conocer<\/a><\/span><\/li><li>Tablado, F. (2020, 4 diciembre). \u00bfQu\u00e9 se considera una invasi\u00f3n en la privacidad laboral? Ayuda Ley Protecci\u00f3n Datos. <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/ayudaleyprotecciondatos.es\/2018\/11\/15\/invasion-privacidad-laboral\/\">https:\/\/ayudaleyprotecciondatos.es\/2018\/11\/15\/invasion-privacidad-laboral\/<\/a><\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d5cfb78 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"d5cfb78\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-374443f\" data-id=\"374443f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27ab2a3 elementor-widget elementor-widget-image\" data-id=\"27ab2a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1024x576.png\" class=\"attachment-large size-large wp-image-3605\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1024x576.png 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-600x338.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-768x432.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1536x864.png 1536w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-312df40 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"312df40\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b03bc27\" data-id=\"b03bc27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d4acee elementor-shape-circle elementor-grid-0 e-grid-align-center elementor-widget elementor-widget-social-icons\" data-id=\"5d4acee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-facebook elementor-repeater-item-7974e07\" href=\"https:\/\/www.facebook.com\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Facebook<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-facebook\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-3faa0ff\" href=\"https:\/\/www.linkedin.com\/company\/red-por-la-ciberseguridad\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-linkedin\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-youtube elementor-repeater-item-f3c2677\" href=\"https:\/\/www.youtube.com\/@redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Youtube<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-youtube\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-twitch elementor-repeater-item-5ad851c\" href=\"https:\/\/www.twitch.tv\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Twitch<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-twitch\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u00bfCu\u00e1les son mis derechos digitales? El uso de las tecnolog\u00edas es cada vez m\u00e1s constante mientras que la digitalizaci\u00f3n est\u00e1 ganando terreno en cada uno de los aspectos de nuestra vida diaria y por ello fue necesario adaptar distintos \u00e1mbitos y claro que la ley no fue la excepci\u00f3n, ya que al tener una ciudadan\u00eda<\/p>","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[22],"tags":[],"class_list":["post-3974","post","type-post","status-publish","format-standard","hentry","category-noticias"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/3974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=3974"}],"version-history":[{"count":0,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/3974\/revisions"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=3974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/categories?post=3974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/tags?post=3974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}