Skip to main content

How is Wonderkind Getting Consent From Its Website Visitors?

Updated over a month ago

Wonderkind is committed to GDPR compliance and adheres to the Dutch Telecommunications Act and the ePrivacy Directive. To ensure lawful processing of personal data, Wonderkind employs an opt-in cookie consent mechanism on its website.

Cookie Consent Mechanism

Wonderkind utilizes OneTrust's cookie consent management tool to obtain and manage user consent. This tool allows visitors to accept or decline cookies categorized as Essential, Marketing, or Analytics. The system honors Do Not Track (DNT) preferences, ensuring that users who have enabled DNT in their browsers are not tracked.

Consent Logging

In compliance with Article 7.1 of the GDPR, Wonderkind maintains records of user consent. This documentation includes details about how and when consent was obtained, the information provided to users at the time, and the specific consent given. The Dutch Authority for Consumers & Markets recommends that website owners log all user consents in a consent log, which can serve as evidence in case of complaints.

Use of Cookies for Lead Boost and Retargeting

When utilizing Wonderkind's Lead Boost feature, cookies are placed only after the website visitor has given explicit consent. To enhance campaign performance, cookies may also be placed on your company's career website to retarget visitors for these campaigns. As stipulated in Article 7 of Wonderkind's General Terms and Conditions, and in accordance with relevant legislation such as the Dutch Telecommunications Act, ePrivacy Directive, and GDPR, you are required to obtain consent from your website visitors before placing these cookies.

Data Protection and Security Measures

Wonderkind implements robust security measures to protect personal data, including:

  • Logical access control with two-factor authentication

  • Automatic logging of actions

  • Organizational and physical access security measures

  • Encryption of authentication tokens

  • Use of Transport Layer Security (TLS) technology for network connections

  • SSH keys and application logs

These measures align with industry standards and safeguard user data against unauthorized access.

Did this answer your question?