{"id":245899,"date":"2025-12-02T18:12:38","date_gmt":"2025-12-02T18:12:38","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=245899"},"modified":"2026-03-02T15:02:05","modified_gmt":"2026-03-02T15:02:05","slug":"security-policy","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/es\/our-work\/security\/security-policy\/","title":{"rendered":"Pol\u00edtica de seguridad"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-d6a40f3e uagb-columns__columns-1 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-87a6a79b\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading\">Pol\u00edtica de seguridad<\/h1>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-32-font-size\">Los formuladores de pol\u00edticas pueden fortalecer o debilitar la seguridad de Internet. Explore c\u00f3mo las pol\u00edticas afectan el ecosistema de seguridad en l\u00ednea.<\/h2>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-29daa086 uagb-columns__columns-1 uagb-columns__max_width-custom grid-post-filter-view\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-48634806\"><div class=\"uagb-column__overlay\"><\/div>\n<p class=\"has-18-font-size\"><\/p>\n\n\n<div class='pt-cv-wrapper'> <div class='cvp-lf-wrapper '><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label for='sf_1258' class=\"cvp-label\"><\/label><input type=\"text\" id=\"sf_1258\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"Buscar por palabra clave\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_content_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_content_category\"><option value=\"\">Contenido<\/option><option value=\"blog-type\" >Blog<span class=\"cvp-count\"> (2)<\/span><\/option><option value=\"resources-type\" >Recurso<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"policy-briefs\" >&nbsp;&nbsp;&nbsp;Informes de pol\u00edticas p\u00fablicas<span class=\"cvp-count\"> (3)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_region_news_regions\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_region_news_regions\"><option value=\"\">Regi\u00f3n<\/option><option value=\"global\" >Global<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"america-del-norte\" >America del Norte<span class=\"cvp-count\"> (1)<\/span><\/option><\/select><\/div><\/div><div class=\"pt-cv-view pt-cv-blockgrid iscvblock iscvreal paging-noscroll grid1 layout3 cveffect-zoomin pt-cv-pgregular pt-cv-left cvp-lfres\" id=\"pt-cv-view-bu5bn556\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"241253\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/informe-de-politicas-seguridad-en-linea-y-restricciones-de-edad\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/policy-briefs\/' title='Informes de pol\u00edticas p\u00fablicas' class='pt-cv-tax-policy-briefs'>Informes de pol\u00edticas p\u00fablicas<\/a><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-12-04T12:01:00+00:00\">4 de diciembre de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/informe-de-politicas-seguridad-en-linea-y-restricciones-de-edad\/\" class=\"_self\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad\">Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad<\/a><\/h2><div class=\"pt-cv-content\">Si bien suelen tener buenas intenciones, las pol\u00edticas que exigen la verificaci\u00f3n de edad crean riesgos para la privacidad, la &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"230519\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/perspectivas-sobre-el-bloqueo-de-contenido-en-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/policy-briefs\/' title='Informes de pol\u00edticas p\u00fablicas' class='pt-cv-tax-policy-briefs'>Informes de pol\u00edticas p\u00fablicas<\/a><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-09-04T11:31:06+00:00\">4 de septiembre de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/perspectivas-sobre-el-bloqueo-de-contenido-en-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet\">Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet<\/a><\/h2><div class=\"pt-cv-content\">Internet Society alienta a los formuladores de pol\u00edticas a priorizar soluciones que aborden el contenido da\u00f1ino en su origen, en &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"119708\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2020\/07\/internet-sencillamente-funciona-la-ley-earn-it-supone-una-amenaza-para-ello-y-mucho-mas\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Internet \u201csencillamente funciona\u201d: la ley EARN IT supone una amenaza para ello y mucho m\u00e1s\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Internet \u201csencillamente funciona\u201d: la ley EARN IT supone una amenaza para ello y mucho m\u00e1s\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet-450x193.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet-250x107.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet.jpg 1280w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2020-07-03T00:30:13+00:00\">3 de julio de 2020<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2020\/07\/internet-sencillamente-funciona-la-ley-earn-it-supone-una-amenaza-para-ello-y-mucho-mas\/\" class=\"_self\" target=\"_self\" aria-label=\"Internet \u201csencillamente funciona\u201d: la ley EARN IT supone una amenaza para ello y mucho m\u00e1s\">Internet \u201csencillamente funciona\u201d: la ley EARN IT supone una amenaza para ello y mucho m\u00e1s<\/a><\/h2><div class=\"pt-cv-content\">Cuando se present\u00f3 la ley EARN IT en marzo de 2020, expertos en tecnolog\u00eda, organizaciones de la sociedad civil, acad\u00e9micos &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"82810\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2018\/07\/registration-open-for-cyber-diplomacy-meets-infosec-and-technology-alongside-ietf-102\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Registro abierto para &quot;Cyber Diplomacy Meets InfoSec and Technology&quot; junto al IETF 102\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"284\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Registro abierto para &quot;Cyber Diplomacy Meets InfoSec and Technology&quot; junto al IETF 102\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-768x284.png\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-768x284.png 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-300x111.png 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-1024x379.png 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-250x93.png 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-e1530085923306.png 1500w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2018-07-09T08:00:18+00:00\">9 de julio de 2018<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2018\/07\/registration-open-for-cyber-diplomacy-meets-infosec-and-technology-alongside-ietf-102\/\" class=\"_self\" target=\"_self\" aria-label=\"Registro abierto para &quot;Cyber Diplomacy Meets InfoSec and Technology&quot; junto al IETF 102\">Registro abierto para \u00abCyber Diplomacy Meets InfoSec and Technology\u00bb junto al IETF 102<\/a><\/h2><div class=\"pt-cv-content\">Como anunciamos recientemente, la Comisi\u00f3n Mundial sobre la Estabilidad del Ciberespacio (GCSC) ser\u00e1 la anfitriona de un panel sobre \u00abCyber &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"55948\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/policybriefs\/spam\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: El desaf\u00edo del spam\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Informe de pol\u00edticas: El desaf\u00edo del spam\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/policy-briefs\/' title='Informes de pol\u00edticas p\u00fablicas' class='pt-cv-tax-policy-briefs'>Informes de pol\u00edticas p\u00fablicas<\/a><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2015-10-30T12:11:10+00:00\">30 de \r\noctubre de 2015<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/policybriefs\/spam\/\" class=\"_self\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: El desaf\u00edo del spam\">Informe de pol\u00edticas: El desaf\u00edo del spam<\/a><\/h2><div class=\"pt-cv-content\">Tambi\u00e9n conocido como comunicaciones electr\u00f3nicas no solicitadas, el spam representa para los usuarios de Internet una amenaza perjudicial, costosa y &#8230;<\/div><\/div><\/div><\/div><\/div> <\/div> <style>\n#pt-cv-view-bu5bn556 {text-align: left}\n#pt-cv-view-bu5bn556 .pt-cv-remain-wrapper { background-color: #eff2ec; }#pt-cv-view-bu5bn556 .pt-cv-content-item { background-color: #eff2ec;padding: 5% 5% 1% 5%;border-radius: 0px 0px 0px 0px; }#pt-cv-view-bu5bn556 .pt-cv-meta-fields {  }#pt-cv-view-bu5bn556 .pt-cv-meta-fields * { color: #0c1c2bcf;font-size: 16px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper:not(.miniwrap) {  }#pt-cv-view-bu5bn556 .pt-cv-thumbnail:not(.pt-cv-thumbnailsm) { height: 200px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper {  }#pt-cv-view-bu5bn556[class*=\"cveffect\"] .pt-cv-thumb-wrapper, #pt-cv-view-bu5bn556:not([class*=\"cveffect\"]) .pt-cv-thumbnail { border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 .pt-cv-thumbnail {  }#pt-cv-view-bu5bn556 .pt-cv-title a { display: block;color: #24366e;margin: 0px 0px 0px 0px;padding: 10px 0px 10px 0px; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-weight: 300;text-decoration: none;font-size: 28px;line-height: 1em; }#pt-cv-view-bu5bn556 .pt-cv-titlesm a { font-weight: 600;font-size: 18px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-weight: 300;font-size: 18px;line-height: 21px; }#pt-cv-view-bu5bn556 .pt-cv-rmwrap {  }#pt-cv-view-bu5bn556 .pt-cv-readmore { color: #fff;background-color: #0075ff;font-size: 14px; }#pt-cv-view-bu5bn556 .pt-cv-taxoterm {  }#pt-cv-view-bu5bn556 .pt-cv-taxoterm * { color: #222;background-color: #dedad0;font-size: 16px;padding: 8px 8px 8px 8px;border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper { text-align: left; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a { color: #0c1c2c;background-color: #eff2ec;font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] .cvp-label { text-align: right; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { text-align: left;font-size: 18px; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-submit { text-align: right; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-reset { text-align: right;color: #eff2ec;background-color: #24366e;font-weight: 600;font-size: 18px;padding: 10px 10px 10px 10px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(3, 1fr);grid-gap: 20px;}#pt-cv-view-bu5bn556 .pt-cv-title a:hover { color: #3a82e4; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a:hover { color: #24366e; }\n@media all and (max-width: 1024px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(2, 1fr);}\n} \n@media all and (max-width: 767px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(1, 1fr);}\n} <\/style>\n\n\n<p class=\"has-18-font-size\"><\/p>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Pol\u00edtica de seguridad Los formuladores de pol\u00edticas pueden fortalecer o debilitar la seguridad de Internet. Explore c\u00f3mo las pol\u00edticas afectan el ecosistema de seguridad en l\u00ednea.<\/p>\n","protected":false},"author":46,"featured_media":0,"parent":244768,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[4057],"class_list":["post-245899","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/es\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"Pol\u00edtica de seguridad Los formuladores de pol\u00edticas pueden fortalecer o debilitar la seguridad de Internet. Explore c\u00f3mo las pol\u00edticas afectan el ecosistema de seguridad en l\u00ednea.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/245899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=245899"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/245899\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244768"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=245899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=245899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=245899"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=245899"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=245899"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=245899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}