{"id":2028,"date":"2023-04-06T13:36:00","date_gmt":"2023-04-06T17:36:00","guid":{"rendered":"https:\/\/www.dialoginsight.com\/gestion-des-consentements\/"},"modified":"2024-05-01T11:36:25","modified_gmt":"2024-05-01T15:36:25","slug":"consent-management","status":"publish","type":"post","link":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/","title":{"rendered":"Consent Management, What Could it Look Like?"},"content":{"rendered":"<section class=\"page-block page-block-simple-text vertical-padding-top-normal vertical-padding-bottom-none text-color-black page-block-text-color-black page-block-background-color-transparent full-background background-crop-none filter-none\">\n<div class=\"page-block-inner\">\n<div class=\"the-page-block simple-text\">\n<div class=\"the-page-block-inner content-width col-8-12\">\n<div class=\"fragment-text-block has-deco-pattern text-color-black padding-normal background-crop-none\">\n<div class=\"fragment-inner\">\n<div class=\"fragment-text\">\n<div class=\"fragment-inner\">\n<div class=\"the-text wysiwyg light-bg\">\n<p>These days, everyone is talking about data privacy. Several laws and regulations have been written, are being implemented, or are just being applied. Companies must be open and give contacts access to their data. The concept of consent is included in the realm of data protection. It is applied in various situations. Before to talk about the future, I suggest you take a quick look back at the consents\u2019 past.<\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">History<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Express vs implied consent<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Let\u2019s first go over the distinction between express and implied consent. In the first scenario,\u00a0<strong>the person is required to express consent by acting<\/strong>. This could entail completing a form, checking a box, or just nodding in agreement with the policies. People who haven\u2019t engaged in one of these actions haven\u2019t indicated their approval. This is a different action than implied consent, which grants the right to keep and use data, such as for email communications. In fact, in some nations (Canada in particular), it is possible to<strong>\u00a0communicate with someone for a while after they submit their email address<\/strong>. This also applies when a call centre notifies you that your call might be recorded. You are indicating your agreement by continuing the call.<\/span><\/p>\n<h3>Concept of unsubscription<\/h3>\n<p>I first entered the field of relationship marketing more than 20 years ago. The idea of getting consent was nonexistent. In terms of email communications and telemarketing calls, we were then in a more opt-out mode (Do not call list). This best practice was mandated by us, and\u00a0<strong>every message sent using our platform had to include an unsubscribe option<\/strong>. The methods of doing things have changed over the course of a few years with the introduction of marketing\u2019s glut of channels.<\/p>\n<h3>Behavioral tracking<\/h3>\n<p>I also recall the time nearly 15 years ago when we introduced tools for tracking website visitors. I felt uneasy. Who would want to be recognized and followed in a physical store, I wondered. However,\u00a0<strong>given the nature of the internet, these are effective tools that are simple to set up<\/strong>. They delivered the right message, at the right time, to the right person if used properly. Relationship marketing campaigns were in data heaven.<\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">The future of consent<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p>Today\u2019s marketing teams are dealing with significant changes in their business strategies with regard to data access, use, and privacy. The market must now strike the ideal balance between maintaining its current practices and satisfying the demands of its customers for control and transparency. The management of the gathering and use of their personal data is first handled by marketers, according to a recent webinar. They are searching for morals and laws. Therefore, it\u2019s critical to improve accessibility by establishing a consent manager that is simple for everyone to understand.<\/p>\n<h3><span data-contrast=\"auto\">Consent centre<\/span><\/h3>\n<p>In order to honour various consents across various platforms, it\u2019s crucial to keep in mind that a consent centre must be able to connect with your entire Martech ecosystem. The web is the best way to accomplish this because the form must also always be accessible. Finally, the procedure needs to be safe so that only the specific contact can execute the actions. To ensure easy access control, using double authentication via email or SMS could be a great option.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"page-block page-block-simple-text vertical-padding-top-none vertical-padding-bottom-normal text-color-black page-block-text-color-black page-block-background-color-transparent full-background background-crop-none filter-none\">\n<div class=\"page-block-inner\">\n<div class=\"fragment-background background-width-full background-crop-none\" role=\"presentation\">\n<div class=\"fragment-inner\">\n<div class=\"color background-color-transparent\"><\/div>\n<\/div>\n<\/div>\n<div class=\"the-page-block simple-text\">\n<div class=\"the-page-block-inner content-width col-8-12\">\n<div class=\"fragment-text-block has-deco-pattern text-color-black padding-normal background-crop-none\">\n<div class=\"fragment-background background-width-full background-crop-none\" role=\"presentation\">\n<div class=\"fragment-inner\">\n<div class=\"color background-color-transparent\"><\/div>\n<\/div>\n<\/div>\n<div class=\"fragment-inner\">\n<div class=\"fragment-text\">\n<div class=\"fragment-inner\">\n<div class=\"the-text wysiwyg light-bg\">\n<h3 aria-level=\"3\">Essential sections of a consent centre<\/h3>\n<p>Here are the seven key components of a successful consent centre.<\/p>\n<h4 aria-level=\"4\">1. Identification data<\/h4>\n<p>A key component of privacy is being able to see and comprehend contact-recognizable information. This section may include email addresses, phone numbers, and physical addresses without being restricted to contact information. Added in accordance with the business\u2019 requirements is any additional pertinent information (training, employer, etc.). Access to the data allows for modification, addition, or removal of the information.<\/p>\n<h4><span data-contrast=\"none\">2. Communication and subscription channels<\/span><\/h4>\n<p>The vast majority of businesses already have a procedure in place for customers to subscribe to and unsubscribe from relational communications. Nothing radically different needs to be done. Ordinarily, opt-in methods are adhered to. It\u2019s possible to see a sample communication. An option to immediately unsubscribe from all relational mailings could be displayed if necessary.<\/p>\n<h4><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">3.\u00a0<\/span>Frequency optimizer<\/h4>\n<p>Another method for limiting data usage is to give contacts control over the communication frequency. You can specify the frequency at which data may be used for communication purposes using this feature. It can also be used to specify a shutdown period (6 months, 1 year, etc.).<\/p>\n<h4><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a04. Business r<\/span>elationship<\/h4>\n<p>A loyalty program, the use of a product or service, etc. are a few examples of factors that might affect the collection and use of data. You have consented to certain rules that are particular to this program as a member or customer. A link to the policy would appear here. This would explain how to leave the relationship program or end the business relationship in addition to giving a thorough explanation of the data collected and how it was used.<\/p>\n<h4><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">5.\u00a0<\/span>Data management<\/h4>\n<p>Two (2) separate components make up data management. The first is related to cookie-based behavioural data collection, and the second is related to data sharing with third-party service providers.<\/p>\n<h5 aria-level=\"4\"><em>Collecting behavioural data<\/em><\/h5>\n<p>A significant change has occurred here, primarily as a result of Quebec\u2019s passage of Law 25 (PL64). I support the #NoConsentNoTracking philosophy. I believe that the concept of behavioural tracking based on cookies or pixels should have already been included in our best practices.<\/p>\n<p>In Quebec, you will have to formally request permission in order to conduct tracking on the website and through other channels as of September 2023. This will lead to a consent option, particularly in banner form, on your website and app. In our illustration, we only present one choice. However, some websites distinguish between analytical trackers and experience-personalization trackers. Again, it will be your responsibility to define and present the available consents in a clear manner. Just like with websites, it may be a good idea to get consent before collecting opening and click data at the level of the channels, primarily email.<\/p>\n<h5 aria-level=\"4\"><em>Data sharing with third-party platforms<\/em><\/h5>\n<p>Asking your client whether or not he consents to the transfer of his data to third-party platforms with privacy policies that differ from your own will also be necessary in the interest of transparency. Particularly in the case of social media and advertising platforms. Adding components to your privacy policy doesn\u2019t seem to be enough; you\u2019ll need to make it explicit when you take action and want to share the data. The consent centre may include a general agreement that applies to all systems, a platform-specific agreement (e.g., social media vs. advertising), or even an agreement that is provided in a specific situation. It will be up to you to determine the best approach that relies on your business strategies.<\/p>\n<h4><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">6.\u00a0<\/span>Data mobility<\/h4>\n<p>A person must be able to understand which systems are sharing their data, which is already mandated by the GDPR. The user can ask to view or delete the data. The data sharing ecosystem\u2019s technologies could all be displayed by the consent centre in this situation. Using a form that must be filled out and sent to your customer service, you can choose to view or delete the data. Under the new law, this will be necessary for Quebec starting in 2024.<\/p>\n<h4><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">7. Adoption of policies<\/span><\/h4>\n<p>The policy acceptance history, including the context, date, and time, may be very significant. Clear policies should outline your expectations for the gathering, use, and privacy of personal data. You do not need to formally request your current contacts\u2019 consent to the privacy policies again. Keeping track of the circumstances surrounding the adoption of policies or the introduction of new ones, however, might be a wise idea.<\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Conclusion<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p>Transparency and giving control over consent management still need to be attained. The most crucial thing is to continue acting with respect. If you have policies in place but feel uncomfortable sharing them, just don\u2019t. Slowly but surely, we will get there, and ethical behaviour will become clear in the coming years. Attempt to foresee the trend and provide a secure setting where your contacts can work freely right away.<\/p>\n<p>#NoConsentNoTracking: Recover the bare minimum, grant control, and be transparent.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Consent management from past to present. Everything you need to know about best practices for consent.<\/p>\n","protected":false},"author":2,"featured_media":1390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-2028","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-and-conformity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Consent Management, What Could it Look Like?<\/title>\n<meta name=\"description\" content=\"Consent management from the past to the present. Everything you need to know about best practices for consent.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consent Management, What Could it Look Like?\" \/>\n<meta property=\"og:description\" content=\"Consent management from the past to the present. Everything you need to know about best practices for consent.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Dialog Insight\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-06T17:36:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-01T15:36:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/donnees.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"701\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pascale Guay\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pascale Guay\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/\"},\"author\":{\"name\":\"Pascale Guay\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670\"},\"headline\":\"Consent Management, What Could it Look Like?\",\"datePublished\":\"2023-04-06T17:36:00+00:00\",\"dateModified\":\"2024-05-01T15:36:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/\"},\"wordCount\":1359,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/donnees.jpg\",\"articleSection\":[\"Security and conformity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/\",\"url\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/\",\"name\":\"Consent Management, What Could it Look Like?\",\"isPartOf\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/donnees.jpg\",\"datePublished\":\"2023-04-06T17:36:00+00:00\",\"dateModified\":\"2024-05-01T15:36:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670\"},\"description\":\"Consent management from the past to the present. Everything you need to know about best practices for consent.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#primaryimage\",\"url\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/donnees.jpg\",\"contentUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/donnees.jpg\",\"width\":701,\"height\":369,\"caption\":\"donnees\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dialoginsight.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consent Management, What Could it Look Like?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#website\",\"url\":\"https:\/\/www.dialoginsight.com\/en\/\",\"name\":\"Dialog Insight\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dialoginsight.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670\",\"name\":\"Pascale Guay\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/da316bcfa54507d75e1b17a3c105573ce98ae7b2e60719e8eeb009b44407533c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/da316bcfa54507d75e1b17a3c105573ce98ae7b2e60719e8eeb009b44407533c?s=96&d=mm&r=g\",\"caption\":\"Pascale Guay\"},\"description\":\"Co-fondatrice et pr\u00e9sidente de Dialog Insight, Pascale Guay a pr\u00e8s de 20 ans d'exp\u00e9rience dans le d\u00e9veloppement des affaires et le marketing relationnel. Elle dirige le service de strat\u00e9gie de conseil offert \u00e0 plus de 300 clients importants de Dialog Insight. Elle participe activement \u00e0 l'identification des strat\u00e9gies \u00e0 mettre en \u0153uvre en collaboration avec les clients tout en assurant la croissance de l'entreprise.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Consent Management, What Could it Look Like?","description":"Consent management from the past to the present. Everything you need to know about best practices for consent.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/","og_locale":"en_US","og_type":"article","og_title":"Consent Management, What Could it Look Like?","og_description":"Consent management from the past to the present. Everything you need to know about best practices for consent.","og_url":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/","og_site_name":"Dialog Insight","article_published_time":"2023-04-06T17:36:00+00:00","article_modified_time":"2024-05-01T15:36:25+00:00","og_image":[{"width":701,"height":369,"url":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/donnees.jpg","type":"image\/jpeg"}],"author":"Pascale Guay","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pascale Guay","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#article","isPartOf":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/"},"author":{"name":"Pascale Guay","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670"},"headline":"Consent Management, What Could it Look Like?","datePublished":"2023-04-06T17:36:00+00:00","dateModified":"2024-05-01T15:36:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/"},"wordCount":1359,"commentCount":0,"image":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/donnees.jpg","articleSection":["Security and conformity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/","url":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/","name":"Consent Management, What Could it Look Like?","isPartOf":{"@id":"https:\/\/www.dialoginsight.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#primaryimage"},"image":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/donnees.jpg","datePublished":"2023-04-06T17:36:00+00:00","dateModified":"2024-05-01T15:36:25+00:00","author":{"@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670"},"description":"Consent management from the past to the present. Everything you need to know about best practices for consent.","breadcrumb":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#primaryimage","url":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/donnees.jpg","contentUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/donnees.jpg","width":701,"height":369,"caption":"donnees"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/consent-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dialoginsight.com\/en\/"},{"@type":"ListItem","position":2,"name":"Consent Management, What Could it Look Like?"}]},{"@type":"WebSite","@id":"https:\/\/www.dialoginsight.com\/en\/#website","url":"https:\/\/www.dialoginsight.com\/en\/","name":"Dialog Insight","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dialoginsight.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670","name":"Pascale Guay","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/da316bcfa54507d75e1b17a3c105573ce98ae7b2e60719e8eeb009b44407533c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/da316bcfa54507d75e1b17a3c105573ce98ae7b2e60719e8eeb009b44407533c?s=96&d=mm&r=g","caption":"Pascale Guay"},"description":"Co-fondatrice et pr\u00e9sidente de Dialog Insight, Pascale Guay a pr\u00e8s de 20 ans d'exp\u00e9rience dans le d\u00e9veloppement des affaires et le marketing relationnel. Elle dirige le service de strat\u00e9gie de conseil offert \u00e0 plus de 300 clients importants de Dialog Insight. Elle participe activement \u00e0 l'identification des strat\u00e9gies \u00e0 mettre en \u0153uvre en collaboration avec les clients tout en assurant la croissance de l'entreprise."}]}},"_links":{"self":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/2028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/comments?post=2028"}],"version-history":[{"count":1,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/2028\/revisions"}],"predecessor-version":[{"id":8385,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/2028\/revisions\/8385"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/media\/1390"}],"wp:attachment":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/media?parent=2028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/categories?post=2028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/tags?post=2028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}