{"id":22629,"date":"2024-05-15T08:26:08","date_gmt":"2024-05-15T06:26:08","guid":{"rendered":"https:\/\/icr-evolution.com\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/"},"modified":"2024-06-05T16:41:50","modified_gmt":"2024-06-05T14:41:50","slug":"data-protection-in-the-contact-center-advanced-practices-and-technical-considerations","status":"publish","type":"post","link":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/","title":{"rendered":"Data protection in the contact center: advanced practices and technical considerations"},"content":{"rendered":"<p>In the contact center environment, where large volumes of confidential information are handled, <strong>data protection has become the central axis of the entire business&#8217;s security.<\/strong> The technical teams responsible for implementing systems and processes must adhere to advanced practices to ensure data security and privacy. In this article, we will explore the best practices and key technical considerations to bring security and peace of mind to these complex and information-sensitive environments.<\/p>\n<h3>How to maintain a high level of data protection in the contact center<\/h3>\n<p><strong>Data Encryption<\/strong><br \/>\nEncryption is essential for protecting the confidentiality of data in transit and at rest. To ensure effective protection, the following aspects should be considered:<\/p>\n<ul>\n<li><strong>Encryption of communications:<\/strong> Implement robust encryption protocols (such as TLS\/SSL) to ensure that communications between agents and servers are secure and not susceptible to interception.<\/li>\n<li><strong>Encrypted storage:<\/strong> All sensitive data stored should be encrypted. Use strong encryption algorithms and manage encryption keys properly to prevent unauthorised access.<\/li>\n<\/ul>\n\n\t\t<!--HubSpot Call-to-Action Code -->\n\t\t<span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-7e1ab971-092d-42a9-97ef-f66cd7cb797a\">\n\t\t<span class=\"hs-cta-node hs-cta-7e1ab971-092d-42a9-97ef-f66cd7cb797a\" id=\"7e1ab971-092d-42a9-97ef-f66cd7cb797a\">\n\t\t<!--[if lte IE 8]>\n\t\t<div id=\"hs-cta-ie-element\"><\/div>\n\t\t<![endif]-->\n\t\t<a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/20121242\/7e1ab971-092d-42a9-97ef-f66cd7cb797a\" >\n\t\t<img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-7e1ab971-092d-42a9-97ef-f66cd7cb797a\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/20121242\/7e1ab971-092d-42a9-97ef-f66cd7cb797a.png\"  alt=\"New call-to-action\"\/>\n\t\t<\/a>\n\t\t<\/span>\n\t\t<script charset=\"utf-8\" src=\"\/\/js.hubspot.com\/cta\/current.js\"><\/script>\n\t\t<script>\n\t\thbspt.cta.load(20121242, '7e1ab971-092d-42a9-97ef-f66cd7cb797a', {});\n\t\t<\/script>\n\t\t<\/span>\n\t\t<!-- end HubSpot Call-to-Action Code -->\n\t\t\n<h3>Access control and authentication<\/h3>\n<p>Access control ensures that only authorised users can access data. Applying the principle of least privilege ensures that each user has only the permissions necessary to perform their functions.<\/p>\n<h3>Continuous auditing and monitoring<\/h3>\n<p>Constant monitoring and auditing are essential to detect and respond to potential breaches or unauthorised access attempts. Therefore, comprehensive logs of all activities related to sensitive data, including access, modification, and deletion, are recommended.<\/p>\n<h3>Regulatory compliance<\/h3>\n<p>It is crucial to comply with data protection regulations and standards, such as GDPR or HIPAA, depending on the location and type of data handled:<\/p>\n<ul>\n<li><strong>Training and awareness:<\/strong> Regularly train staff on data protection regulations and best practices to ensure compliance.<\/li>\n<li><strong>Incident management:<\/strong> Establish an incident response plan to act quickly in case of security breaches and meet notification requirements.<\/li>\n<\/ul>\n<h3>Physical and logical security<\/h3>\n<p>In addition to technical measures, physical and logical security play a crucial role in data protection:<\/p>\n<ul>\n<li><strong>Physical Security of the Contact Centre:<\/strong> Limit physical access to the contact centre facilities through access controls and surveillance cameras.<\/li>\n<li><strong>Logical Network Security:<\/strong> Segment the network to limit access to critical systems and use firewalls and intrusion prevention systems (IPS) to protect against external threats.<\/li>\n<\/ul>\n<p>Implementing these advanced data protection practices not only ensures regulatory compliance but also <strong>strengthens customer trust and protects the company&#8217;s reputation<\/strong>. High-level technical teams play a vital role in this task, ensuring that contact centers operate securely and ethically in an increasingly digitalised and therefore potentially more vulnerable environment.<\/p>\n<p>If you have any questions about the security measures of <a href=\"https:\/\/icr-evolution.com\/en\/\" target=\"_blank\" rel=\"noopener\">our omnichannel software EVOLUTION<\/a>, feel free to <a href=\"https:\/\/info.icr-evolution.com\/es\/demo\" target=\"_blank\" rel=\"noopener\">request a free demo here<\/a>.<\/p>\n\n\t\t<!--HubSpot Call-to-Action Code -->\n\t\t<span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-34b93525-a41a-4d12-8295-ff3bf6f5289b\">\n\t\t<span class=\"hs-cta-node hs-cta-34b93525-a41a-4d12-8295-ff3bf6f5289b\" id=\"34b93525-a41a-4d12-8295-ff3bf6f5289b\">\n\t\t<!--[if lte IE 8]>\n\t\t<div id=\"hs-cta-ie-element\"><\/div>\n\t\t<![endif]-->\n\t\t<a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/20121242\/34b93525-a41a-4d12-8295-ff3bf6f5289b\" >\n\t\t<img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-34b93525-a41a-4d12-8295-ff3bf6f5289b\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/20121242\/34b93525-a41a-4d12-8295-ff3bf6f5289b.png\"  alt=\"New call-to-action\"\/>\n\t\t<\/a>\n\t\t<\/span>\n\t\t<script charset=\"utf-8\" src=\"\/\/js.hubspot.com\/cta\/current.js\"><\/script>\n\t\t<script>\n\t\thbspt.cta.load(20121242, '34b93525-a41a-4d12-8295-ff3bf6f5289b', {});\n\t\t<\/script>\n\t\t<\/span>\n\t\t<!-- end HubSpot Call-to-Action Code -->\n\t\t\n","protected":false},"excerpt":{"rendered":"<p>In the contact center environment, where large volumes of confidential information are handled, data protection has become the central axis of the entire business&#8217;s security. The technical teams responsible for implementing systems and processes must adhere to advanced practices to ensure data security and privacy. In this article, we will explore the best practices and [&hellip;]<\/p>\n","protected":false},"author":100015,"featured_media":22591,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[96,98],"tags":[],"class_list":["post-22629","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-customer-service-en","category-news-in-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data protection in the contact center: advanced practices<\/title>\n<meta name=\"description\" content=\"Technical teams in the contact center must adhere to advanced practices to ensure data security and privacy. See here how.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data protection in the contact center: advanced practices\" \/>\n<meta property=\"og:description\" content=\"Technical teams in the contact center must adhere to advanced practices to ensure data security and privacy. See here how.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/\" \/>\n<meta property=\"og:site_name\" content=\"ICR Evolution\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-15T06:26:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-05T14:41:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2024\/05\/AdobeStock_282283313-scaled-e1715099816178.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1147\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juanjo Lopez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juanjo Lopez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/\"},\"author\":{\"name\":\"Juanjo Lopez\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#\\\/schema\\\/person\\\/aa0041cffb9cde84fc0b87529c4d968e\"},\"headline\":\"Data protection in the contact center: advanced practices and technical considerations\",\"datePublished\":\"2024-05-15T06:26:08+00:00\",\"dateModified\":\"2024-06-05T14:41:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/\"},\"wordCount\":469,\"publisher\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.icr-evolution.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/AdobeStock_282283313-scaled-e1715099816178.jpeg\",\"articleSection\":[\"Customer Service\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/\",\"url\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/\",\"name\":\"Data protection in the contact center: advanced practices\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.icr-evolution.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/AdobeStock_282283313-scaled-e1715099816178.jpeg\",\"datePublished\":\"2024-05-15T06:26:08+00:00\",\"dateModified\":\"2024-06-05T14:41:50+00:00\",\"description\":\"Technical teams in the contact center must adhere to advanced practices to ensure data security and privacy. See here how.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.icr-evolution.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/AdobeStock_282283313-scaled-e1715099816178.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.icr-evolution.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/AdobeStock_282283313-scaled-e1715099816178.jpeg\",\"width\":2560,\"height\":1147,\"caption\":\"protecci\u00f3n de datos contact center\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data protection in the contact center: advanced practices and technical considerations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/\",\"name\":\"ICR Evolution\",\"description\":\"Software para Call Center Omnicanal\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#organization\",\"name\":\"ICR Evolution\",\"url\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/icr-evolution.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/logo-icrevolution.png\",\"contentUrl\":\"https:\\\/\\\/icr-evolution.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/logo-icrevolution.png\",\"width\":376,\"height\":76,\"caption\":\"ICR Evolution\"},\"image\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#\\\/schema\\\/person\\\/aa0041cffb9cde84fc0b87529c4d968e\",\"name\":\"Juanjo Lopez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g\",\"caption\":\"Juanjo Lopez\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data protection in the contact center: advanced practices","description":"Technical teams in the contact center must adhere to advanced practices to ensure data security and privacy. See here how.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/","og_locale":"en_US","og_type":"article","og_title":"Data protection in the contact center: advanced practices","og_description":"Technical teams in the contact center must adhere to advanced practices to ensure data security and privacy. See here how.","og_url":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/","og_site_name":"ICR Evolution","article_published_time":"2024-05-15T06:26:08+00:00","article_modified_time":"2024-06-05T14:41:50+00:00","og_image":[{"width":2560,"height":1147,"url":"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2024\/05\/AdobeStock_282283313-scaled-e1715099816178.jpeg","type":"image\/jpeg"}],"author":"Juanjo Lopez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Juanjo Lopez","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/#article","isPartOf":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/"},"author":{"name":"Juanjo Lopez","@id":"https:\/\/www.icr-evolution.com\/en\/#\/schema\/person\/aa0041cffb9cde84fc0b87529c4d968e"},"headline":"Data protection in the contact center: advanced practices and technical considerations","datePublished":"2024-05-15T06:26:08+00:00","dateModified":"2024-06-05T14:41:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/"},"wordCount":469,"publisher":{"@id":"https:\/\/www.icr-evolution.com\/en\/#organization"},"image":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2024\/05\/AdobeStock_282283313-scaled-e1715099816178.jpeg","articleSection":["Customer Service","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/","url":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/","name":"Data protection in the contact center: advanced practices","isPartOf":{"@id":"https:\/\/www.icr-evolution.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/#primaryimage"},"image":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2024\/05\/AdobeStock_282283313-scaled-e1715099816178.jpeg","datePublished":"2024-05-15T06:26:08+00:00","dateModified":"2024-06-05T14:41:50+00:00","description":"Technical teams in the contact center must adhere to advanced practices to ensure data security and privacy. See here how.","breadcrumb":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/#primaryimage","url":"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2024\/05\/AdobeStock_282283313-scaled-e1715099816178.jpeg","contentUrl":"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2024\/05\/AdobeStock_282283313-scaled-e1715099816178.jpeg","width":2560,"height":1147,"caption":"protecci\u00f3n de datos contact center"},{"@type":"BreadcrumbList","@id":"https:\/\/www.icr-evolution.com\/en\/blog\/data-protection-in-the-contact-center-advanced-practices-and-technical-considerations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.icr-evolution.com\/en\/"},{"@type":"ListItem","position":2,"name":"Data protection in the contact center: advanced practices and technical considerations"}]},{"@type":"WebSite","@id":"https:\/\/www.icr-evolution.com\/en\/#website","url":"https:\/\/www.icr-evolution.com\/en\/","name":"ICR Evolution","description":"Software para Call Center Omnicanal","publisher":{"@id":"https:\/\/www.icr-evolution.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.icr-evolution.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.icr-evolution.com\/en\/#organization","name":"ICR Evolution","url":"https:\/\/www.icr-evolution.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.icr-evolution.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/icr-evolution.com\/wp-content\/uploads\/2020\/11\/logo-icrevolution.png","contentUrl":"https:\/\/icr-evolution.com\/wp-content\/uploads\/2020\/11\/logo-icrevolution.png","width":376,"height":76,"caption":"ICR Evolution"},"image":{"@id":"https:\/\/www.icr-evolution.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.icr-evolution.com\/en\/#\/schema\/person\/aa0041cffb9cde84fc0b87529c4d968e","name":"Juanjo Lopez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g","caption":"Juanjo Lopez"}}]}},"_links":{"self":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/posts\/22629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/users\/100015"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/comments?post=22629"}],"version-history":[{"count":0,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/posts\/22629\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/media\/22591"}],"wp:attachment":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/media?parent=22629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/categories?post=22629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/tags?post=22629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}