[{"id":"ci_779a27da612e1b50827bc26088ad8e586ab5fb4578a3781d9190d355f4d9be7e","title":"Security Governance","path":"/en/trust-center/v1/gobierno-de-la-seguridad","children":[{"id":"ci_970a9ab7bd47bf0f07e2fa2213e1571433ffd25c181bf9ed09c3db91b727812b","title":"Our Security Philosophy","path":"/en/trust-center/v1/nuestra-filosofia-de-seguridad","children":[]}]},{"id":"ci_0559eb6947bf28b661110b80db4498821ac7f360641ab94e9bbdfaae02bb64d5","title":"Compliance and Risk Management","path":"/en/trust-center/v1/compliance-and-risk-management","children":[{"id":"ci_173d17a48023488340248bca2a9096fd99993f5364a8ef6a11798f8a35a7b6d2","title":"Certifications and Regulatory Compliance","path":"/en/trust-center/v1/certificaciones-y-cumplimiento-normativo","children":[]},{"id":"ci_535a828707eba942da28ec78b92c60fd63a87fd8f31f7d5de8d59f898a23ec41","title":"Data Processors of Personal Data","path":"/en/trust-center/v1/subencargados-de-tratamiento","children":[]},{"id":"ci_d20a5591e4ef092edfe168a1135a280a1e3fe08bb98dbccd2a7d9ec2fdc7c936","title":"Policy and Risk Management","path":"/en/trust-center/v1/politica-y-gestion-de-riesgos","children":[]}]},{"id":"ci_46b4f52c066999ab55f942e981ffee742eb1f6c6cdb44b3f39f4373cb160f2ef","title":"Cloud Infrastructure","path":"/en/trust-center/v1/cloud-infrastructure","children":[{"id":"ci_c01cad476d635673a88acef6348f27cb91b7d1e206bfb5d2700c904f8e1f3af8","title":"Multi-Tenant Architecture","path":"/en/trust-center/v1/arquitectura-multi-tenant","children":[]},{"id":"ci_a7b1d0128dfbc1be5d8ad362a1331bc68f312305025d5e8a9c8da7b6113069d0","title":"Network Security","path":"/en/trust-center/v1/seguridad-en-la-red","children":[]},{"id":"ci_38cb761d821476e0bfc0cbbd416e66bc8cc7c05ff899037da08e9644596d0e45","title":"Business Continuity","path":"/en/trust-center/v1/continuidad-de-negocio","children":[]}]},{"id":"ci_09c12ab67c237454d05a53add48f76154134bd230867127b872197115718ccab","title":"Protecting our infrastructure","path":"/en/trust-center/v1/protecting-our-infrastructure","children":[{"id":"ci_4a9112be1a18e01a999c8e06f816527fd34d64388f133fb07fd07450505bc89e","title":"Infrastructure Overview","path":"/en/trust-center/v1/descripcion-general-de-la-infraestructura","children":[]},{"id":"ci_0e006944253f01848a1579ceafe55463b56f3f759b3909baa0857409fdf4863d","title":"Data Management","path":"/en/trust-center/v1/gestion-del-dato","children":[]},{"id":"ci_80e974597616b2286700c6305a65f9af7cd34d3176b609369a27c52a18bd9789","title":"Incident Management","path":"/en/trust-center/v1/gestion-de-incidentes","children":[]},{"id":"ci_c8afc3413ddb242014ec560b3d672aa85621e054b0fd092375d75d790625ede6","title":"Physical Security","path":"/en/trust-center/v1/seguridad-fisica","children":[]},{"id":"ci_dcb02150620e8a13feeabdfa3229c8228cc3a56f630da82253ad72c18f04ee39","title":"Encryption","path":"/en/trust-center/v1/cifrado","children":[]},{"id":"ci_96b45ee55cad416d732230c1937142d8d84eff88b0dfe222aed8596b53f30a6d","title":"Access Management","path":"/en/trust-center/v1/gestion-de-acceso","children":[]},{"id":"ci_0dc8681c15d52a2365df3f4dce43cf7f44ce2461e6b385875a20f68bbf73d25c","title":"Vulnerability Management","path":"/en/trust-center/v1/gestion-de-vulnerabilidades","children":[]}]},{"id":"ci_90f782244b4b269ed8073f995e1f5ba557bfdbcb8c6180bd30c0ecb9963b3a9b","title":"Protecting Our People","path":"/en/trust-center/v1/protegiendo-nuestras-personas","children":[]},{"id":"ci_3595139934ff1507a860f92ac55b4dec3a3e2d511d3b181c2483d6418ca185a2","title":"Protecting our products","path":"/en/trust-center/v1/protegiendo-nuestros-productos","children":[]}]