{"id":227022,"date":"2023-10-31T09:37:00","date_gmt":"2023-10-31T09:37:00","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=227022"},"modified":"2025-09-24T10:54:09","modified_gmt":"2025-09-24T10:54:09","slug":"identify-the-regulatory-requirements","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/es\/resources\/community-network-diy-toolkit\/identify-the-regulatory-requirements\/","title":{"rendered":"4. Identificar los requisitos regulatorios y a nivel de pol\u00edticas"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-1b60d478 uagb-columns__columns-1 uagb-columns__max_width-theme background-image-fallback-black uag-hide-tab uag-hide-mob\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-6da44868\"><div class=\"uagb-column__overlay\"><\/div>\n<p class=\"has-neutral-white-color has-text-color has-18-font-size\"><a href=\"https:\/\/internetsociety.org\/es\/resources\/community-network-diy-toolkit\/\">Kit de herramientas \u201ch\u00e1galo usted mismo\u201d para redes comunitarias<\/a> &gt; Identificar los requisitos regulatorios y a nivel de pol\u00edticas<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\">4. Identificar<br>los requisitos regulatorios<br>y a nivel de pol\u00edticas<\/h1>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns uag-hide-desktop is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-desktop\"><\/div>\n\n\n\n<p class=\"has-text-align-left has-18-font-size\"><a href=\"https:\/\/internetsociety.org\/es\/resources\/community-network-diy-toolkit\/\">Kit de herramientas \u201ch\u00e1galo usted mismo\u201d para redes comunitarias<\/a> &gt;<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-left\">4. Identificar los requisitos regulatorios y a nivel de pol\u00edticas<\/h1>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-desktop\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"440\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018-1024x440.jpg\" alt=\"A woman holding a notebook and looking at the laptop\" class=\"wp-image-112751\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018-450x193.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018-250x107.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-tab uag-hide-mob\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-desktop\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-accent-purple-color has-text-color has-48-font-size\" id=\"we-will-equip-the-global-encryption-coalition-and-the-internet-society-community-with-the-tools-needed-to-help-increase-awareness-of-the-value-of-encryption\">\u00bfQu\u00e9 regulaciones, marcos legales y pol\u00edticas debe cumplir su red?<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">El pr\u00f3ximo paso es entender qu\u00e9 marcos regulatorios debe cumplir su red, tanto la red de acceso local como las conexiones a la Internet p\u00fablica. En algunos pa\u00edses, tecnolog\u00edas de acceso local como el Wi-Fi pueden no requerir licencia, mientras que el uso de la telefon\u00eda m\u00f3vil suele estar m\u00e1s regulado. Algunos pa\u00edses pueden exigir que cualquier proveedor de servicios de Internet se registre ante el organismo regulador de telecomunicaciones. Es importante que revise la normativa vigente para saber qu\u00e9 tiene que hacer para operar su red.<\/p>\n\n\n\n<div class=\"wp-block-columns is-not-stacked-on-mobile has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:2%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-32-font-size\">Conceptos clave<\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list has-18-font-size\">\n<li>Muchos pa\u00edses exigen que las redes comunitarias obtengan licencias o permisos espec\u00edficos de los organismos reguladores para operar legalmente.<\/li>\n\n\n\n<li>La cantidad y el tipo de licencias dependen de qu\u00e9 partes de la red se gestionan, qu\u00e9 bandas del espectro se utilizan y qu\u00e9 tipo de servicios se ofrecen.<\/li>\n\n\n\n<li>Estrategias como el uso de infraestructura compartida\u2014por ejemplo, torres comunes a diferentes redes\u2014pueden reducir significativamente los costos operativos.<\/li>\n\n\n\n<li>Los procesos de interacci\u00f3n continua con los organismos reguladores de telecomunicaciones son fundamentales, pero pueden requerir mucho tiempo.<\/li>\n\n\n\n<li>M\u00e1s all\u00e1 de las redes individuales, la promoci\u00f3n de pol\u00edticas por parte de grupos expertos de la sociedad civil tambi\u00e9n puede ayudar a reformar los marcos normativos de manera que sean m\u00e1s favorables para las redes comunitarias.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:2%\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-tab uag-hide-mob\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-3fc73a6d uagb-columns__columns-1 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-cf0d325a\"><div class=\"uagb-column__overlay\"><\/div>\n<h4 class=\"wp-block-heading has-depth-green-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Manos a la obra<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover alignfull is-light has-custom-content-position is-position-bottom-center\" style=\"margin-top:0;padding-top:48px;padding-right:48px;padding-bottom:48px;padding-left:48px\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" class=\"wp-block-cover__image-background wp-image-200099\" alt=\"a woman and a boy on a quad outside\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/ulukhaktok-woman-and-son.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/ulukhaktok-woman-and-son.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/ulukhaktok-woman-and-son-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/ulukhaktok-woman-and-son-768x512.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/ulukhaktok-woman-and-son-250x167.jpg 250w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-30 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-cover background-image-fallback-black has-neutral-white-color has-text-color has-18-font-size\" style=\"min-height:100px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-depth-teal-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-left has-18-font-size\">Identifique todos los marcos regulatorios de telecomunicaciones que permitan a la comunidad operar las funciones y servicios deseados.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover alignfull has-custom-content-position is-position-bottom-center\" style=\"margin-top:0;padding-top:48px;padding-right:48px;padding-bottom:48px;padding-left:48px\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" class=\"wp-block-cover__image-background wp-image-201118\" alt=\"Students sitting in class with books opened\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Students-in-class-in-Nepal.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Students-in-class-in-Nepal.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Students-in-class-in-Nepal-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Students-in-class-in-Nepal-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-30 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-cover background-image-fallback-black has-neutral-white-color has-text-color has-18-font-size\" style=\"min-height:100px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-depth-teal-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-left has-18-font-size\">Identifique con qu\u00e9 organizaciones o personas debe ponerse en contacto y cu\u00e1les podr\u00edan ser los plazos para trabajar con esos grupos.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover alignfull is-light has-custom-content-position is-position-bottom-center\" style=\"margin-top:0;padding-top:48px;padding-right:48px;padding-bottom:48px;padding-left:48px\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" class=\"wp-block-cover__image-background wp-image-201122\" alt=\"Four men standing next to the wall and looking at the notebooks\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Summit-on-Community-Networks-in-Africa.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Summit-on-Community-Networks-in-Africa.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Summit-on-Community-Networks-in-Africa-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Summit-on-Community-Networks-in-Africa-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-30 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-cover background-image-fallback-black has-neutral-white-color has-text-color has-18-font-size\" style=\"min-height:100px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-depth-teal-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-left has-18-font-size\">Determine si alguien dentro de su grupo organizador tiene v\u00ednculos con legisladores o reguladores que puedan ayudarle a entender los pasos a seguir.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover alignfull has-custom-content-position is-position-bottom-center\" style=\"margin-top:0;padding-top:48px;padding-right:48px;padding-bottom:48px;padding-left:48px\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" class=\"wp-block-cover__image-background wp-image-201114\" alt=\"Two men examining papers in Georgia\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Tusheti-Georgia.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Tusheti-Georgia.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Tusheti-Georgia-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Tusheti-Georgia-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-30 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-cover background-image-fallback-black has-neutral-white-color has-text-color has-18-font-size\" style=\"min-height:100px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-depth-teal-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-left has-18-font-size\">Comun\u00edquese con organizaciones de apoyo (entre ellas, Internet Society y sus cap\u00edtulos locales) para conocer qu\u00e9 tipo de asesor\u00eda o experiencia podr\u00edan ofrecer en materia de pol\u00edticas p\u00fablicas.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-tab uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-left\">M\u00e1s informaci\u00f3n<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list has-18-font-size\">\n<li><span class=\"tadv-color\" style=\"color:#2b72d6\"><a href=\"https:\/\/internetsociety.org\/es\/resources\/advancing-community-connectivity\/\">Promoci\u00f3n de la conectividad comunitaria<\/a>:<\/span> Estrategias de pol\u00edticas para cerrar la brecha digital<\/li>\n\n\n\n<li><span class=\"tadv-color\" style=\"color:#2b72d6\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2022\/manual-de-evaluacion-de-la-preparacion-de-las-redes-comunitarias\/\">Manual de evaluaci\u00f3n de la preparaci\u00f3n de las redes comunitarias<\/a><\/span><\/li>\n\n\n\n<li><span class=\"tadv-color\" style=\"color:#2b72d6\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2019\/innovaciones-en-la-gestion-del-espectro\/\">Innovaciones en la gesti\u00f3n del espectro<\/a><\/span><\/li>\n\n\n\n<li><span class=\"tadv-color\" style=\"color:#2b72d6\"><a href=\"https:\/\/www.internetsociety.org\/es\/policybriefs\/spectrum\/\">Informe de pol\u00edticas: Enfoques sobre el espectro para las redes comunitarias<\/a><\/span><\/li>\n\n\n\n<li><span class=\"tadv-color\" style=\"color:#2b72d6\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/2018\/unleashing-community-networks-innovative-licensing-approaches\/\">Liberaci\u00f3n de las redes comunitarias: enfoques de licencias innovadoras<\/a><\/span><\/li>\n<\/ul>\n\n\n\n<p class=\"has-18-font-size\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/community-network-diy-toolkit\/determine-technology-requirements\/\">Siguiente -&gt; 5. Determinar los requisitos tecnol\u00f3gicos<\/a><\/p>\n\n\n\n<p class=\"has-18-font-size\"><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-tab uag-hide-mob\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Derechos de autor:<br>\u00a9 Nyani Quarmyne, \u00a9 Natalie Campbell, \u00a9 Nyani Quarmyne, \u00a9 Nyani Quarmyne, \u00a9 Nyani Quarmyne<\/p>\n","protected":false},"excerpt":{"rendered":"<p><b>\u00bfQu\u00e9 regulaciones, marcos legales y pol\u00edticas debe cumplir su red?<\/b><br \/>\nComprender las regulaciones, los marcos legales y las pol\u00edticas aplicables es fundamental para un lanzamiento exitoso.<\/p>\n","protected":false},"author":11,"featured_media":112753,"parent":226890,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[67,122],"tags":[],"region_news_regions":[6030],"content_category":[6106],"ppma_author":[6073],"class_list":["post-227022","page","type-page","status-publish","has-post-thumbnail","hentry","category-acceso-es","category-redes-comunitarias","region_news_regions-global","content_category-resources-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018-450x193.jpg",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/CN-Summit-South-Africa-9-2018.jpg",600,258,false]},"uagb_author_info":{"display_name":"Internet Society","author_link":"https:\/\/www.internetsociety.org\/es\/author\/isoc\/"},"uagb_comment_info":0,"uagb_excerpt":"\u00bfQu\u00e9 regulaciones, marcos legales y pol\u00edticas debe cumplir su red? Comprender las regulaciones, los marcos legales y las pol\u00edticas aplicables es fundamental para un lanzamiento exitoso.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/227022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=227022"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/227022\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/226890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/112753"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=227022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=227022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=227022"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=227022"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=227022"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=227022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}