{"id":11155,"date":"2025-03-12T11:16:43","date_gmt":"2025-03-12T16:16:43","guid":{"rendered":"https:\/\/protechingenieria.com\/?p=11155"},"modified":"2025-03-20T16:51:10","modified_gmt":"2025-03-20T21:51:10","slug":"como-evitar-la-mala-gestion-documental","status":"publish","type":"post","link":"https:\/\/protechingenieria.com\/en\/como-evitar-la-mala-gestion-documental\/","title":{"rendered":"How to avoid penalties for poor document management? Key points to comply with the law"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11155\" class=\"elementor elementor-11155\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9309df e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"d9309df\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89965bf elementor-widget elementor-widget-text-editor\" data-id=\"89965bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">As a company committed to security and transparency in data management, staying informed about Colombian regulations is essential.\n\nThe Resolution 20131200000713 (https:\/\/www.minambiente.gov.co\/documento-normativa\/resolucion-1200-de-2013\/) issued by the [Superintendence of Industry and Commerce (SIC)](https:\/\/sedeelectronica.sic.gov.co\/transparencia\/planeacion\/plan-institucional-de-archivos\/plan-institucional-de-archivos-pinar-sic) is crucial for companies handling personal data. This regulation establishes guidelines for proper document management and the responsible handling of personal information.<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2289f4 elementor-widget elementor-widget-heading\" data-id=\"a2289f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What does the Industry and Commerce Resolution require regarding document management?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18ed1c1 elementor-widget elementor-widget-text-editor\" data-id=\"18ed1c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The resolution sets forth key guidelines that all companies must follow to ensure the protection and privacy of personal information, as well as proper document management. These regulations aim not only to safeguard the rights of information owners but also to ensure that data is handled efficiently and transparently, preventing issues arising from poor document management.<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e699c9 elementor-widget elementor-widget-heading\" data-id=\"5e699c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Main Requirements to Comply with the Resolution<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c477008 elementor-widget elementor-widget-eael-feature-list\" data-id=\"c477008\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-feature-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"-icon-position-left -tablet-icon-position-left -mobile-icon-position-left\">\n\t\t\t<ul id=\"eael-feature-list-c477008\" class=\"eael-feature-list-items circle stacked  eael-feature-list-vertical\" data-layout-tablet=\"vertical\" data-layout-mobile=\"vertical\">\n\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-67bc5ce\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-0\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-user-lock\" viewbox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 256A128 128 0 1 0 96 128a128 128 0 0 0 128 128zm96 64a63.08 63.08 0 0 1 8.1-30.5c-4.8-.5-9.5-1.5-14.5-1.5h-16.7a174.08 174.08 0 0 1-145.8 0h-16.7A134.43 134.43 0 0 0 0 422.4V464a48 48 0 0 0 48 48h280.9a63.54 63.54 0 0 1-8.9-32zm288-32h-32v-80a80 80 0 0 0-160 0v80h-32a32 32 0 0 0-32 32v160a32 32 0 0 0 32 32h224a32 32 0 0 0 32-32V320a32 32 0 0 0-32-32zM496 432a32 32 0 1 1 32-32 32 32 0 0 1-32 32zm32-144h-64v-80a32 32 0 0 1 64 0z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Defined Data Management Policies<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Companies must establish and record clear policies on how personal information is collected, stored, used, and deleted. This prevents issues related to poor document management.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-fd8b772\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-1\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-user-clock\" viewbox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 224c-79.6 0-144 64.4-144 144s64.4 144 144 144 144-64.4 144-144-64.4-144-144-144zm64 150.3c0 5.3-4.4 9.7-9.7 9.7h-60.6c-5.3 0-9.7-4.4-9.7-9.7v-76.6c0-5.3 4.4-9.7 9.7-9.7h12.6c5.3 0 9.7 4.4 9.7 9.7V352h38.3c5.3 0 9.7 4.4 9.7 9.7v12.6zM320 368c0-27.8 6.7-54.1 18.2-77.5-8-1.5-16.2-2.5-24.6-2.5h-16.7c-22.2 10.2-46.9 16-72.9 16s-50.6-5.8-72.9-16h-16.7C60.2 288 0 348.2 0 422.4V464c0 26.5 21.5 48 48 48h347.1c-45.3-31.9-75.1-84.5-75.1-144zm-96-112c70.7 0 128-57.3 128-128S294.7 0 224 0 96 57.3 96 128s57.3 128 128 128z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Audits and Record-Keeping<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">It is essential to maintain detailed records documenting access to and handling of information. Regular reviews ensure compliance with regulations and data security.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-0bb7200\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-2\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-user-edit\" viewbox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 256c70.7 0 128-57.3 128-128S294.7 0 224 0 96 57.3 96 128s57.3 128 128 128zm89.6 32h-16.7c-22.2 10.2-46.9 16-72.9 16s-50.6-5.8-72.9-16h-16.7C60.2 288 0 348.2 0 422.4V464c0 26.5 21.5 48 48 48h274.9c-2.4-6.8-3.4-14-2.6-21.3l6.8-60.9 1.2-11.1 7.9-7.9 77.3-77.3c-24.5-27.7-60-45.5-99.9-45.5zm45.3 145.3l-6.8 61c-1.1 10.2 7.5 18.8 17.6 17.6l60.9-6.8 137.9-137.9-71.7-71.7-137.9 137.8zM633 268.9L595.1 231c-9.3-9.3-24.5-9.3-33.8 0l-37.8 37.8-4.1 4.1 71.8 71.7 41.8-41.8c9.3-9.4 9.3-24.5 0-33.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Security in Information Management<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Robust security protocols must be implemented to prevent data loss, leaks, or unauthorized access, ensuring that poor document management does not compromise information security.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-1a0c82f\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-3\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewbox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Safe Document Handling<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">When data is no longer needed, its secure disposal must be ensured to prevent unauthorized access, which could result in improper document management.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c3a60e elementor-widget elementor-widget-heading\" data-id=\"2c3a60e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why is it important to comply with the resolution?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d7a332 elementor-widget elementor-widget-text-editor\" data-id=\"8d7a332\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Complying with this resolution not only prevents financial penalties, but also strengthens the trust of customers and business partners. The protection of information and clarity in document management are essential to build a responsible image and commitment to best practices, and avoid the consequences of poor document management. In addition, staying aligned with regulations optimizes internal processes, reduces risks and improves operational efficiency.\n\nTranslated with DeepL.com (free version)<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f63fc3e elementor-widget elementor-widget-heading\" data-id=\"f63fc3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Procedures to ensure compliance:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8bcb5a elementor-widget elementor-widget-text-editor\" data-id=\"b8bcb5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\"><strong>Step 1:<\/strong>Verify current document management policies and verify that they are in accordance with the requirements set by the SIC.\n<strong>Step 2:<\/strong> Create a secure and effective system for storing, handling and processing documents and personal information, which will reduce risk. \n<strong>Step 3:<\/strong> Train the entire team in proper data management and privacy practices.\n<strong>Step 4:<\/strong> Execute regular reviews and required modifications to preserve security and transparency, ensuring that there is no mismanagement of documents in your processes.\n<strong>Step 5:<\/strong> If you have questions or require help, we have specialists who can assist you in improving information management.<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06cac10 elementor-widget elementor-widget-heading\" data-id=\"06cac10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Avoid the main risks of poor document management!<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94cc32a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"94cc32a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a127fa1 elementor-widget elementor-widget-image\" data-id=\"a127fa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/02\/que-es-inventario-documental-1024x535.webp\" class=\"attachment-large size-large wp-image-10977\" alt=\"Que es inventario documental\" srcset=\"https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/02\/que-es-inventario-documental-1024x535.webp 1024w, https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/02\/que-es-inventario-documental-300x157.webp 300w, https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/02\/que-es-inventario-documental-768x401.webp 768w, https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/02\/que-es-inventario-documental-18x9.webp 18w, https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/02\/que-es-inventario-documental-150x78.webp 150w, https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/02\/que-es-inventario-documental.webp 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ee2bef elementor-widget elementor-widget-text-editor\" data-id=\"7ee2bef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Resolution of Industry and Commerce constitutes an essential legal framework for Protech Ingenier\u00eda to work in a safe, clear and efficient way. Complying with these guidelines represents a magnificent opportunity to optimize our internal procedures, safeguard personal information and gain the trust of our clients.<\/p><p>Avoid these main risks associated with poor document management<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83b824c elementor-widget elementor-widget-heading\" data-id=\"83b824c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Risk of loss of important information<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a50a280 elementor-widget elementor-widget-text-editor\" data-id=\"a50a280\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Poor document management can lead to the loss of key documents, which can seriously damage the company. It is crucial to implement an effective archiving and storage system.<\/p><ul><li class=\"translation-block\"><strong>Recommendation: <\/strong>To avoid the loss of important data, it is essential to implement an efficient document management system, including organized filing and storage, with the correct location and identification of each document.<\/li><\/ul><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9e8034 elementor-widget elementor-widget-heading\" data-id=\"e9e8034\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Risk of legal noncompliance<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cc0e36 elementor-widget elementor-widget-text-editor\" data-id=\"8cc0e36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Lack of proper administration can result in penalties for non-compliance with legal regulations, which can be a direct effect of poor document management.<\/p><ul><li class=\"translation-block\"><strong>Recommendation: <\/strong>To avoid legal non-compliance, it is crucial to stay updated on relevant regulations and ensure compliance in document management, especially in terms of preservation, privacy and information protection.<\/li><\/ul><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e97102 elementor-widget elementor-widget-heading\" data-id=\"1e97102\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Risk of lack of access to relevant information<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf594f2 elementor-widget elementor-widget-text-editor\" data-id=\"bf594f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Poor document management hinders quick access to important documents, affecting decision making. Establishing an orderly and efficient system is essential.<\/p><ul><li class=\"translation-block\"><strong>Recommendation: <\/strong>To ensure quick access to data, it is essential to create a document management system with an intuitive and easy-to-use folder and label organization.<\/li><\/ul><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-481a8a9 elementor-widget elementor-widget-heading\" data-id=\"481a8a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Risk of deterioration in the quality of information<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8faf7b7 elementor-widget elementor-widget-text-editor\" data-id=\"8faf7b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Inadequate management can affect the integrity of both physical and digital documents. Implement adequate policies for their conservation and safekeeping.<\/p><ul><li class=\"translation-block\"><strong>Recommendation: <\/strong>To preserve the integrity and quality of data, preservation policies should be established that include the use of high quality archival materials and protecting documents from damaging factors such as light, humidity and dust.<\/li><\/ul><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7abc21 elementor-widget elementor-widget-heading\" data-id=\"e7abc21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Risk of theft or loss of confidential documents<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ece47c0 elementor-widget elementor-widget-text-editor\" data-id=\"ece47c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Protect data privacy with physical and digital security measures, such as encryption and access control, to avoid the impact of poor document management.<\/p><ul><li class=\"translation-block\"><strong>Recommendation: <\/strong>To protect the privacy of documents, security measures should be established that include access control policies, restricting access to authorized persons, and physical and digital measures such as locks, document encryption and secure passwords.<\/li><\/ul><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da9a886 elementor-widget elementor-widget-heading\" data-id=\"da9a886\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">6. Risk of difficulty in document search and retrieval.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7224fab elementor-widget elementor-widget-text-editor\" data-id=\"7224fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A poorly organized system, resulting from poor document management, makes it difficult to locate documents. Make sure you implement a categorization system that is intuitive and easy to use.<\/p><ul><li class=\"translation-block\"><strong>Recommendation: <\/strong>To improve document location and retrieval, it is recommended to implement an organization system with detailed file names and an intuitive folder structure.<\/li><\/ul><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-089a01a elementor-widget elementor-widget-heading\" data-id=\"089a01a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">7. Risk of lack of control over document versions.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad974ff elementor-widget elementor-widget-text-editor\" data-id=\"ad974ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The lack of a version control system can cause confusion in teams working with the same documents. Implement a clear versioning system to avoid document mismanagement.<\/p><ul><li class=\"translation-block\"><strong>Recommendation: <\/strong>For effective version control, it is recommended to implement a clear versioning system, with file names indicating the version and tags showing the modifications made.<\/li><\/ul><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-899597e elementor-widget elementor-widget-heading\" data-id=\"899597e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">8. Risk of non-compliance with deadlines<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52e9c95 elementor-widget elementor-widget-text-editor\" data-id=\"52e9c95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Poor document management can cause delays in the delivery of important documents. Establish clear processes to meet established deadlines.<\/p><ul><li class=\"translation-block\"><strong>Recommendation: <\/strong>To meet deadlines, it is essential to establish clear document management policies, assign responsibilities, set realistic timelines and have monitoring systems in place to ensure progress and proper completion of documents.<\/li><\/ul><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bdd538 elementor-widget elementor-widget-heading\" data-id=\"4bdd538\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">9. Risk of loss of business opportunities<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a005a5 elementor-widget elementor-widget-text-editor\" data-id=\"8a005a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Poor document management can lead to lost business opportunities. An efficient system ensures that documents are available when needed.<\/p><ul><li class=\"translation-block\"><strong>Recommendation: <\/strong>To avoid losing business opportunities, it is essential to have a document management system that ensures their availability, organization and efficient retrieval.<\/li><\/ul><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0c17aa elementor-widget elementor-widget-heading\" data-id=\"c0c17aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">10. Risk of damaging the company's image and reputation.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43b9213 elementor-widget elementor-widget-text-editor\" data-id=\"43b9213\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Poor document management can affect corporate reputation, especially if sensitive data is leaked. Protect privacy and confidentiality with appropriate measures.<\/p><ul><li class=\"translation-block\"><strong>Recommendation: <\/strong>To protect the company's image and reputation, it is crucial to safeguard sensitive documents through security measures such as digital encryption and to establish clear policies for their management and access.<\/li><\/ul><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28f6b1d content-align-cta-center elementor-widget elementor-widget-eael-cta-box\" data-id=\"28f6b1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-cta-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"eael-call-to-action cta-basic bg-lite cta-preset-1\">\n        <h2 class=\"title eael-cta-heading\">Are you ready to implement your document management plan?<\/h2><p>Contact us and we will assist you in implementing best practices to comply with regulations and improve your company's security.\u00a0<\/p><p><!-- notionvc: ce091acc-8b3d-4cfb-a8f3-05fa8229b3ee --><\/p><p><!-- notionvc: ce091acc-8b3d-4cfb-a8f3-05fa8229b3ee --><\/p><a href=\"https:\/\/protechingenieria.com\/en\/asesoria\/\" target=\"_blank\" class=\"cta-button cta-preset-1\">Contact Us<\/a>\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Como empresa comprometida con la seguridad y claridad en la gesti\u00f3n de datos, es crucial estar al tanto de las normativas colombianas. La Resoluci\u00f3n 20131200000713 de la Superintendencia de Industria y Comercio (SIC) es fundamental para las empresas que gestionan datos personales, pues establece las pautas para una adecuada administraci\u00f3n de documentos y manejo de la informaci\u00f3n personal. \u00bfQu\u00e9 requiere la Resoluci\u00f3n de Industria y Comercio en relaci\u00f3n con la gesti\u00f3n documental? La resoluci\u00f3n establece directrices clave que todas las empresas deben seguir para garantizar la protecci\u00f3n y privacidad de la informaci\u00f3n personal, as\u00ed como una correcta gesti\u00f3n de los documentos. Estas normas buscan no solo proteger los derechos de los propietarios de la informaci\u00f3n, sino tambi\u00e9n asegurar que los datos se manejen de manera eficiente y transparente, evitando los problemas derivados de la mala gesti\u00f3n documental. Requisitos principales para cumplir la resoluci\u00f3n: Pol\u00edticas de manejo de datos definidas Las empresas deben establecer y registrar pol\u00edticas claras sobre c\u00f3mo se recopila, almacena, usa y elimina la informaci\u00f3n personal, evitando as\u00ed situaciones de mala gesti\u00f3n documental. Auditor\u00edas y documentos de registro Es esencial mantener registros detallados que documenten el acceso y manejo de la informaci\u00f3n. Las revisiones peri\u00f3dicas aseguran el cumplimiento de las normativas y la seguridad. Seguridad en la administraci\u00f3n de informaci\u00f3n Se deben implementar protocolos de seguridad s\u00f3lidos para evitar p\u00e9rdidas, filtraciones o accesos no autorizados, garantizando que no haya mala gesti\u00f3n documental que comprometa la seguridad de la informaci\u00f3n. Manejo seguro de documentos Cuando los datos ya no sean necesarios, se debe garantizar su eliminaci\u00f3n segura, evitando que queden accesibles de alguna forma, lo que puede derivar en una mala gesti\u00f3n documental. \u00bfPor qu\u00e9 es importante cumplir la resoluci\u00f3n? Cumplir con esta resoluci\u00f3n no solo previene sanciones econ\u00f3micas, sino que tambi\u00e9n fortalece la confianza de clientes y socios comerciales. La protecci\u00f3n de la informaci\u00f3n y la claridad en la administraci\u00f3n documental son esenciales para construir una imagen responsable y comprometida con las mejores pr\u00e1cticas, y evitar las consecuencias de la mala gesti\u00f3n documental. Adem\u00e1s, mantenerse alineado con las regulaciones optimiza los procesos internos, reduce riesgos y mejora la eficiencia operativa. Procedimientos para garantizar el cumplimiento: Paso 1: Verifica las pol\u00edticas vigentes de administraci\u00f3n documental y verifica que est\u00e9n en concordancia con los requisitos fijados por la SIC.Paso 2: Crea un sistema seguro y eficaz para guardar, manejar y procesar documentos y informaci\u00f3n personal, lo que reducir\u00e1 el riesgo de\u00a0\u00a0Paso 3: Formaci\u00f3n de todo el equipo en pr\u00e1cticas adecuadas de administraci\u00f3n de datos y privacidad.Paso 4: Ejecuta revisiones regulares y modificaciones requeridas para preservar la seguridad y la transparencia, garantizando que no haya mala gesti\u00f3n documental en tus procesos.Paso 5: Si tienes preguntas o requieres ayuda, disponemos de especialistas que pueden asistirte en la mejora de la gesti\u00f3n de la informaci\u00f3n. \u00a1Evita los principales riesgos de una mala gesti\u00f3n documental! La Resoluci\u00f3n de Industria y Comercio constituye un marco jur\u00eddico imprescindible para que Protech Ingenier\u00eda. labore de forma segura, clara y eficaz. cumplir a estos lineamientos representa una magn\u00edfica oportunidad para optimizar nuestros procedimientos internos, salvaguardar la informaci\u00f3n personal y ganar la confianza de nuestros clientes. Evita estos principales riesgos\u00a0asociados a una mala gesti\u00f3n documental 1. Riesgo de p\u00e9rdida de informaci\u00f3n importante Una mala gesti\u00f3n documental puede llevar a la p\u00e9rdida de documentos clave, lo que puede perjudicar gravemente a la empresa. Es crucial implementar un sistema eficaz de archivo y almacenamiento. Recomendaci\u00f3n:\u00a0Para evitar la p\u00e9rdida de datos importantes, es fundamental implementar un sistema eficiente de gesti\u00f3n de documentos, que incluya un archivo y almacenamiento organizado, con la correcta ubicaci\u00f3n e identificaci\u00f3n de cada documento. 2. Riesgo de incumplimiento legal La falta de una administraci\u00f3n adecuada puede resultar en sanciones por no cumplir con las normativas legales, lo que puede ser un efecto directo de la mala gesti\u00f3n documental. Recomendaci\u00f3n:\u00a0Para evitar el incumplimiento legal, es crucial mantenerse actualizado sobre las normativas relevantes y asegurar su cumplimiento en la gesti\u00f3n de documentos, especialmente en cuanto a la preservaci\u00f3n, privacidad y protecci\u00f3n de la informaci\u00f3n. 3. Riesgo de falta de acceso a informaci\u00f3n relevante La mala gesti\u00f3n documental dificulta el acceso r\u00e1pido a documentos importantes, afectando la toma de decisiones. Establecer un sistema ordenado y eficiente es fundamental. Recomendaci\u00f3n:\u00a0Para garantizar un acceso r\u00e1pido a los datos, es esencial crear un sistema de gesti\u00f3n de documentos con una organizaci\u00f3n de carpetas y etiquetas intuitiva y f\u00e1cil de usar. 4. Riesgo de deterioro de la calidad de la informaci\u00f3n Una gesti\u00f3n inadecuada, puede afectar la integridad de los documentos, tanto f\u00edsicos como digitales. Implementa pol\u00edticas adecuadas para su conservaci\u00f3n y resguardo. Recomendaci\u00f3n:\u00a0Para preservar la integridad y calidad de los datos, se deben establecer pol\u00edticas de conservaci\u00f3n que incluyan el uso de materiales de archivo de alta calidad y proteger los documentos de factores da\u00f1inos como luz, humedad y polvo. 5. Riesgo de robo o p\u00e9rdida de documentos confidenciales Protege la privacidad de los datos con medidas de seguridad f\u00edsicas y digitales, como el cifrado y control de accesos, para evitar el impacto de la mala gesti\u00f3n documental. Recomendaci\u00f3n:\u00a0Para proteger la privacidad de los documentos, se deben establecer medidas de seguridad que incluyan pol\u00edticas de control de acceso, restringiendo el acceso a personas autorizadas, y medidas f\u00edsicas y digitales como cerraduras, cifrado de documentos y contrase\u00f1as seguras. 6. Riesgo de dificultad en la b\u00fasqueda y recuperaci\u00f3n de documentos Un sistema mal organizado, resultado de la mala gesti\u00f3n documental, dificulta la localizaci\u00f3n de documentos. Aseg\u00farate de implementar un sistema de categorizaci\u00f3n intuitivo y f\u00e1cil de manejar. Recomendaci\u00f3n:\u00a0Para mejorar la localizaci\u00f3n y recuperaci\u00f3n de documentos, se recomienda implementar un sistema de organizaci\u00f3n con nombres de archivo detallados y una estructura de carpetas intuitiva. 7. Riesgo de falta de control sobre versiones de los documentos La falta de un sistema de control de versiones puede causar confusi\u00f3n en equipos que trabajan con los mismos documentos. Implementa un sistema claro de versionado para evitar la mala gesti\u00f3n documental. Recomendaci\u00f3n:\u00a0Para un control efectivo de versiones, se recomienda implementar un sistema de versionado claro, con nombres de archivo que<\/p>","protected":false},"author":5,"featured_media":11160,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-11155","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gestion-documental"],"_links":{"self":[{"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/posts\/11155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/comments?post=11155"}],"version-history":[{"count":11,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/posts\/11155\/revisions"}],"predecessor-version":[{"id":11281,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/posts\/11155\/revisions\/11281"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/media\/11160"}],"wp:attachment":[{"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/media?parent=11155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/categories?post=11155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/tags?post=11155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}