{"version":"1.0","provider_name":"Library &amp; Information Technology Services","provider_url":"https:\/\/www.trincoll.edu\/lits","author_name":"Inghilterra, John M.","author_url":"https:\/\/www.trincoll.edu\/lits\/author\/jinghilt\/","title":"Application Consent and Permissions","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Te9wLQgSxJ\"><a href=\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/application-integrations-3rd-party\/\">Application Consent and Permissions<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/application-integrations-3rd-party\/embed\/#?secret=Te9wLQgSxJ\" width=\"600\" height=\"338\" title=\"&#8220;Application Consent and Permissions&#8221; &#8212; Library &amp; Information Technology Services\" data-secret=\"Te9wLQgSxJ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"What is Application Consent? Application consent is an important aspect of user privacy and data security, as it ensures that users have control over how their information is shared and used by third-party applications. Developers and service providers must adhere to legal and regulatory requirements regarding consent, such as GDPR (General Data Protection Regulation) in [&hellip;]"}