{"id":21365,"date":"2022-04-07T15:37:43","date_gmt":"2022-04-07T13:37:43","guid":{"rendered":"https:\/\/mailcommsgroup.com\/blog\/how-to-verify-and-authenticate-your-customers-identity\/"},"modified":"2025-08-27T09:42:03","modified_gmt":"2025-08-27T07:42:03","slug":"how-to-verify-and-authenticate-your-customers-identity","status":"publish","type":"post","link":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/","title":{"rendered":"How to verify and authenticate your customer&#8217;s identity?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_single_image image=&#8221;10082&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;grid&#8221; css=&#8221;.vc_custom_1555933626160{margin-top: 0px !important;padding-top: 20px !important;}&#8221;][vc_column dp_animation=&#8221;&#8221; css=&#8221;.vc_custom_1646912863207{padding-top: 0px !important;}&#8221;][vc_column_text]Spain, according to the European Commission, is one of the member countries in which the highest percentage of the population has been affected by digital fraud caused by identity theft. In 2019, and only in this criminal typology, around 3,000 lawsuits were filed. The unstoppable rise of e-commerce and criminal activity is forcing companies in a wide variety of industries to implement secure and reliable digital identity verification systems.  <\/p>\n<p>In our <em>whitepaper<\/em> &#8220;<strong>How to verify and authenticate your customer&#8217;s legal identity<\/strong>&#8221; we tell you the main benefits of digital identity verification and explain the differences between two different but complementary concepts: identify and authenticate. You will also find information on the most commonly used authentication systems and the techniques they use to achieve their goals. <\/p>\n<p>In addition, we will talk in detail about one of the most interesting types of authentication today: biometrics. Finally, before telling you about the sectors that use digital identity verification the most, we show you a &#8220;step by step&#8221; on how to verify and authenticate your customer&#8217;s identity with the solution we offer through our partner OneSpan.[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1650355121688{margin-top: 20px !important;padding-bottom: 50px !important;}&#8221;][vc_column][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_cta h2=&#8221;&#8221; h4=&#8221;Do not hesitate to contact us so that we can tell you how to implement a digital identity verification system in your company&apos;s activity.&#8221;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f22879-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"22879\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/21365#wpcf7-f22879-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"22879\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f22879-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"col1-2 pd-10\">\n\t<p>Name*<span class=\"wpcf7-form-control-wrap\" data-name=\"Nombre\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"Nombre\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"col1-2 pd-10\">\n\t<p>Last Name*<span class=\"wpcf7-form-control-wrap\" data-name=\"Apellidos\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"Apellidos\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"col1-2 pd-10\">\n\t<p>Company email*<span class=\"wpcf7-form-control-wrap\" data-name=\"Email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"Email\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"col1-2 pd-10\">\n\t<p>Phone*<span class=\"wpcf7-form-control-wrap\" data-name=\"Telefono\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-text wpcf7-validates-as-tel\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"Telefono\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"col1-1 pd-10\">\n\t<p><label class=\"checkbox-label\"><span>I agree to the processing of my personal data to receive commercial information in accordance with our <a class=\"post entry-content\" href=\"https:\/\/mailcommsgroup.com\/en\/privacy-policy\/\" target=\"_blank\"><strong>privacy policy.<\/strong><\/a><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"conditions\"><span class=\"wpcf7-form-control wpcf7-checkbox wpcf7-validates-as-required\"><span class=\"wpcf7-list-item first last\"><input type=\"checkbox\" name=\"conditions[]\" value=\"1\" \/><span class=\"wpcf7-list-item-label\">1<\/span><\/span><\/span><\/span><\/label>\n\t<\/p>\n<\/div>\n<div class=\"col1-1 pd-10 submit-col\">\n\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"url\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text displaynone\" aria-invalid=\"false\" value=\"customercomms.com\" type=\"text\" name=\"url\" \/><\/span>\n\t<\/p>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_cta][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The various digital identity verification systems offer secure and reliable techniques to businesses while providing engaging user experiences to customers. Learn about the main characteristics of these systems and the techniques most commonly used today in our specialized whitepaper. You can download it in this article.<\/p>\n","protected":false},"author":1,"featured_media":16981,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[480],"class_list":["post-21365","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-communication-solutions-with-legal-value"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to verify and authenticate your customer&#039;s identity?<\/title>\n<meta name=\"description\" content=\"Verification techniques offer a secure and reliable solution to identify and authenticate your customers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to verify and authenticate your customer&#039;s identity?\" \/>\n<meta property=\"og:description\" content=\"Verification techniques offer a secure and reliable solution to identify and authenticate your customers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailcomms Group\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-07T13:37:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-27T07:42:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2022\/04\/Mailteck-CustomerComms_892x623-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"892\" \/>\n\t<meta property=\"og:image:height\" content=\"623\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mailcomms Group\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CommsCustomer\" \/>\n<meta name=\"twitter:site\" content=\"@CommsCustomer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mailcomms Group\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/\"},\"author\":{\"name\":\"Mailcomms Group\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/c3a3ecfc795ade78319e6b1af9d65684\"},\"headline\":\"How to verify and authenticate your customer&#8217;s identity?\",\"datePublished\":\"2022-04-07T13:37:43+00:00\",\"dateModified\":\"2025-08-27T07:42:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/\"},\"wordCount\":417,\"publisher\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2022\/04\/Mailteck-CustomerComms_892x623-3.jpg\",\"articleSection\":[\"Communication solutions with legal value\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/\",\"name\":\"How to verify and authenticate your customer's identity?\",\"isPartOf\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2022\/04\/Mailteck-CustomerComms_892x623-3.jpg\",\"datePublished\":\"2022-04-07T13:37:43+00:00\",\"dateModified\":\"2025-08-27T07:42:03+00:00\",\"description\":\"Verification techniques offer a secure and reliable solution to identify and authenticate your customers.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#primaryimage\",\"url\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2022\/04\/Mailteck-CustomerComms_892x623-3.jpg\",\"contentUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2022\/04\/Mailteck-CustomerComms_892x623-3.jpg\",\"width\":892,\"height\":623,\"caption\":\"C\u00f3mo verificar la identidad legal de tu cliente\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mailcomms Group\",\"item\":\"https:\/\/mailcommsgroup.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/mailcommsgroup.com\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to verify and authenticate your customer&#8217;s identity?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#website\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/\",\"name\":\"MailComms Group\",\"description\":\"La transformaci\u00f3n digital a trav\u00e9s de la comunicaci\u00f3n omnicanal, con plena validez legal.\",\"publisher\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\"},\"alternateName\":\"MailComms Group\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailcommsgroup.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\",\"name\":\"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.\",\"alternateName\":\"MailComms Group\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png\",\"contentUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png\",\"width\":512,\"height\":512,\"caption\":\"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CommsCustomer\",\"https:\/\/www.linkedin.com\/company\/customercomms\/\",\"https:\/\/www.youtube.com\/channel\/UCtvYLee1QHy89JS2-gMgnTQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/c3a3ecfc795ade78319e6b1af9d65684\",\"name\":\"Mailcomms Group\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g\",\"caption\":\"Mailcomms Group\"},\"sameAs\":[\"https:\/\/mailcommsgroup.com\"],\"url\":\"https:\/\/mailcommsgroup.com\/en\/blog\/author\/ntrwrks_ccmms\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to verify and authenticate your customer's identity?","description":"Verification techniques offer a secure and reliable solution to identify and authenticate your customers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/","og_locale":"en_US","og_type":"article","og_title":"How to verify and authenticate your customer's identity?","og_description":"Verification techniques offer a secure and reliable solution to identify and authenticate your customers.","og_url":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/","og_site_name":"Mailcomms Group","article_published_time":"2022-04-07T13:37:43+00:00","article_modified_time":"2025-08-27T07:42:03+00:00","og_image":[{"width":892,"height":623,"url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2022\/04\/Mailteck-CustomerComms_892x623-3.jpg","type":"image\/jpeg"}],"author":"Mailcomms Group","twitter_card":"summary_large_image","twitter_creator":"@CommsCustomer","twitter_site":"@CommsCustomer","twitter_misc":{"Written by":"Mailcomms Group","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#article","isPartOf":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/"},"author":{"name":"Mailcomms Group","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/c3a3ecfc795ade78319e6b1af9d65684"},"headline":"How to verify and authenticate your customer&#8217;s identity?","datePublished":"2022-04-07T13:37:43+00:00","dateModified":"2025-08-27T07:42:03+00:00","mainEntityOfPage":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/"},"wordCount":417,"publisher":{"@id":"https:\/\/mailcommsgroup.com\/en\/#organization"},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2022\/04\/Mailteck-CustomerComms_892x623-3.jpg","articleSection":["Communication solutions with legal value"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/","url":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/","name":"How to verify and authenticate your customer's identity?","isPartOf":{"@id":"https:\/\/mailcommsgroup.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#primaryimage"},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2022\/04\/Mailteck-CustomerComms_892x623-3.jpg","datePublished":"2022-04-07T13:37:43+00:00","dateModified":"2025-08-27T07:42:03+00:00","description":"Verification techniques offer a secure and reliable solution to identify and authenticate your customers.","breadcrumb":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#primaryimage","url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2022\/04\/Mailteck-CustomerComms_892x623-3.jpg","contentUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2022\/04\/Mailteck-CustomerComms_892x623-3.jpg","width":892,"height":623,"caption":"C\u00f3mo verificar la identidad legal de tu cliente"},{"@type":"BreadcrumbList","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-to-verify-and-authenticate-your-customers-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mailcomms Group","item":"https:\/\/mailcommsgroup.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/mailcommsgroup.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"How to verify and authenticate your customer&#8217;s identity?"}]},{"@type":"WebSite","@id":"https:\/\/mailcommsgroup.com\/en\/#website","url":"https:\/\/mailcommsgroup.com\/en\/","name":"MailComms Group","description":"La transformaci\u00f3n digital a trav\u00e9s de la comunicaci\u00f3n omnicanal, con plena validez legal.","publisher":{"@id":"https:\/\/mailcommsgroup.com\/en\/#organization"},"alternateName":"MailComms Group","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailcommsgroup.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailcommsgroup.com\/en\/#organization","name":"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.","alternateName":"MailComms Group","url":"https:\/\/mailcommsgroup.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png","contentUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png","width":512,"height":512,"caption":"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal."},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CommsCustomer","https:\/\/www.linkedin.com\/company\/customercomms\/","https:\/\/www.youtube.com\/channel\/UCtvYLee1QHy89JS2-gMgnTQ"]},{"@type":"Person","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/c3a3ecfc795ade78319e6b1af9d65684","name":"Mailcomms Group","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g","caption":"Mailcomms Group"},"sameAs":["https:\/\/mailcommsgroup.com"],"url":"https:\/\/mailcommsgroup.com\/en\/blog\/author\/ntrwrks_ccmms\/"}]}},"_links":{"self":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/21365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/comments?post=21365"}],"version-history":[{"count":15,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/21365\/revisions"}],"predecessor-version":[{"id":37670,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/21365\/revisions\/37670"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/media\/16981"}],"wp:attachment":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/media?parent=21365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/categories?post=21365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}