{"version":"1.0","provider_name":"Consent Management Platform (CMP) Usercentrics","provider_url":"https:\/\/usercentrics.com\/fr","author_name":"mounahrizi","author_url":"https:\/\/usercentrics.com\/fr\/author\/mounahrizi\/","title":"La confidentialit\u00e9 des applications : guide ultime sur les r\u00e9glementations en mati\u00e8re de protection des donn\u00e9es pour les applications","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"nvZs0MRC2J\"><a href=\"https:\/\/usercentrics.com\/fr\/knowledge-hub\/guide-ultime-de-la-confidentialite-des-applications\/\">Guide complet sur la confidentialit\u00e9 et la protection des donn\u00e9es pour les applications<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/usercentrics.com\/fr\/knowledge-hub\/guide-ultime-de-la-confidentialite-des-applications\/embed\/#?secret=nvZs0MRC2J\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Guide complet sur la confidentialit\u00e9 et la protection des donn\u00e9es pour les applications\u00a0\u00bb &#8212; Consent Management Platform (CMP) Usercentrics\" data-secret=\"nvZs0MRC2J\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/usercentrics.com\/fr\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/usercentrics.com\/wp-content\/uploads\/sites\/4\/2023\/03\/ultimate-guide.png","thumbnail_width":500,"thumbnail_height":500,"description":"Comme les sites web, les applications ont besoin du consentement utilisateur mais peu le demandent correctement. D\u00e9couvrez comment le consentement et la conformit\u00e9 \u00e0 la confidentialit\u00e9 influencent les applications, et comment le SDK de gestion du consentement peut aider \u00e0 automatiser ce processus."}