{"id":223,"date":"2013-09-24T03:30:28","date_gmt":"2013-09-24T02:30:28","guid":{"rendered":"http:\/\/emplois.isarta.com\/event\/showthread.php?t=911"},"modified":"2014-03-07T22:55:48","modified_gmt":"2014-03-08T03:55:48","slug":"le-marketing-sans-permission-3","status":"publish","type":"post","link":"https:\/\/isarta.com\/infos\/le-marketing-sans-permission-3\/","title":{"rendered":"Le marketing sans permission"},"content":{"rendered":"<div><a href=\"http:\/\/isarta.com\/infos\/wp-content\/uploads\/2013\/09\/fn010.gif\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-335\" alt=\"fn010\" src=\"http:\/\/isarta.com\/infos\/wp-content\/uploads\/2013\/09\/fn010.gif\" width=\"320\" height=\"170\" \/><\/a><\/div>\n<div>\n<p>Cela fera bient\u00f4t quinze ans que Seth Godin a popularis\u00e9 le concept de <i>permission marketing<\/i> (marketing de permission) avec son ouvrage \u2026 <i>Permission Marketing: turning strangers into friends, and friends into customers.<\/i><\/p>\n<p><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\">Le concept de permission, par opposition \u00e0 l\u2019interruption que repr\u00e9sente la publicit\u00e9 non sollicit\u00e9e de toutes sortes, constituait alors une bonne nouvelle pour les consommateurs. Ces derniers pouvaient esp\u00e9rer voir dans cette nouvelle fa\u00e7on de faire la diminution des appels \u00e0 domicile en soir\u00e9e, de la publicit\u00e9 postale incessante, des courriels ind\u00e9sirables, etc.<\/span><\/span><\/p>\n<p><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\">Parall\u00e8lement au concept, certains changements l\u00e9gislatifs et technologiques sont venus mettre des b\u00e2tons dans les roues de ceux qui persistaient \u00e0 pratiquer un marketing dit d\u2019interruption. Le projet de loi C-28 visant l\u2019\u00e9limination des pourriels, la Liste nationale de num\u00e9ros de t\u00e9l\u00e9communication exclus ou l\u2019am\u00e9lioration des filtres des services de messagerie Web ont tous permis de diminuer la publicit\u00e9 intrusive.<\/span><\/span><\/p>\n<p><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\">Les organisations ont d\u00fb s\u2019adapter \u00e0 cette nouvelle r\u00e9alit\u00e9. Tout en devant changer leur approche, elles ont toutefois encore un message \u00e0 livrer et un produit \u00e0 vendre. <\/span><\/span><\/p>\n<p><b><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\">Une permission trop facile<\/span><\/span><\/b><\/p>\n<p><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\">Pour ma part, je re\u00e7ois tr\u00e8s peu de publicit\u00e9 non sollicit\u00e9e, mais je trouve parfois que certaines entreprises n\u2019attentent pas une tr\u00e8s grosse \u00ab permission \u00bb de notre part avant de nous communiquer leur offre.<\/span><\/span><\/p>\n<p><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\">Par exemple, certains commerces ont pris l\u2019habitude de collecter l\u2019adresse courriel de leur client lors d\u2019un achat. En th\u00e9orie, puisqu\u2019un client donne son adresse courriel au vendeur, on peut affirmer qu\u2019il donne une certaine permission de communiquer avec lui. Mais en pratique, lorsqu\u2019on ach\u00e8te une paire de chaussures, sommes-nous vraiment int\u00e9ress\u00e9es \u00e0 recevoir ensuite chaque semaine une infolettre de cette m\u00eame entreprise?<\/span><\/span><\/p>\n<p><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\">Plusieurs autres situations peuvent s\u2019ajouter \u00e0 celle-ci, allant des c\u00e2blodistributeurs qui s\u2019empressent de nous proposer de nouveaux produits chaque fois qu\u2019on communique avec eux, jusqu&rsquo;aux courriels que l\u2019on re\u00e7oit lorsqu\u2019on abandonne un panier d\u2019achats en ligne, en passant par les entreprises qui nous t\u00e9l\u00e9phonent suite au t\u00e9l\u00e9chargement d\u2019une publication sur leur site.<\/span><\/span><\/p>\n<p><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\">Gmail a r\u00e9cemment <\/span><\/span><a href=\"http:\/\/blogs.hbr.org\/cs\/2013\/07\/how_email_marketers_can_survive_gmails_tabbed_inbox.html\" target=\"_blank\"><span style=\"font-family: Verdana;\">segment\u00e9 les courriels<\/span><\/a><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\"> des bo\u00eetes de r\u00e9ception de ses abonn\u00e9s en cat\u00e9gories, dont une appel\u00e9e <i>Promotions<\/i>. Cette cat\u00e9gorie deviendra pour certains l\u2019\u00e9quivalent \u00ab moderne \u00bb du dossier Courrier ind\u00e9sirable. Si les entreprises jugent que leurs offres perdent de la visibilit\u00e9 de cette fa\u00e7on, elles feront en sorte que celles-ci entrent par la bo\u00eete principale. Au final, tout le monde s\u2019adapte.<\/span><\/span><\/p>\n<p><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\">Le projet de <\/span><\/span><a href=\"http:\/\/www.ic.gc.ca\/eic\/site\/ecic-ceac.nsf\/eng\/h_gv00567.html\" target=\"_blank\"> <span style=\"font-family: Verdana;\"><span style=\"color: #1155cc;\">loi C-28<\/span><\/span><\/a><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\"> d\u00e9finit ce qu\u2019est une autorisation accord\u00e9e par un client \u00e0 une entreprise en termes de publicit\u00e9. Cette autorisation peut \u00eatre <\/span><a href=\"http:\/\/www.marketingmag.ca\/news\/marketer-news\/bill-c-28-a-fine-line-45867\" target=\"_blank\"><span style=\"color: #1155cc;\">explicite ou implicite<\/span><\/a><span style=\"color: #222222;\">. Les organisations peuvent donc s\u2019adapter tant qu\u2019elles restent dans ce cadre. Toutefois, est-ce que le message reste efficace? Comme le <\/span><a href=\"http:\/\/sethgodin.typepad.com\/seths_blog\/2008\/01\/permission-mark.html\" target=\"_blank\"><span style=\"color: #1155cc;\">mentionne Seth Godin<\/span><\/a><\/span><span style=\"font-family: Verdana;\"><span style=\"color: #222222;\"> lui-m\u00eame : obtenir une vraie permission d\u2019un client est diff\u00e9rent d\u2019une permission pr\u00e9sum\u00e9e ou encore de celle permise par la loi. Si vous cessez de communiquer avec votre client\u00e8le et que celle-ci s\u2019en rend compte et s\u2019en plaint, \u00e0 ce moment, vous avez vraiment obtenu leur permission.<\/span><\/span><\/p>\n<\/div>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_223\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/le-marketing-sans-permission-3\/\"  data-item_title=\"Le marketing sans permission\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2013\/09\/fn010.gif\"  data-item_date=\"2013-09-24T03:30:28-04:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><\/p>\n<hr size=\"3\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cela fera bient\u00f4t quinze ans que Seth Godin a popularis\u00e9 le concept de permission marketing (marketing de permission) avec son ouvrage \u2026 Permission Marketing: turning strangers into friends, and friends into customers. Le concept de permission, par opposition \u00e0 l\u2019interruption que repr\u00e9sente la publicit\u00e9 non sollicit\u00e9e de toutes sortes, constituait alors une bonne nouvelle pour [&hellip;]<\/p>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_223\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/le-marketing-sans-permission-3\/\"  data-item_title=\"Le marketing sans permission\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2013\/09\/fn010.gif\"  data-item_date=\"2013-09-24T03:30:28-04:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><hr size=\"3\"><\/div>","protected":false},"author":2,"featured_media":335,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[1176],"_links":{"self":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/223"}],"collection":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/comments?post=223"}],"version-history":[{"count":5,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/223\/revisions"}],"predecessor-version":[{"id":372,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/223\/revisions\/372"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media\/335"}],"wp:attachment":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media?parent=223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/categories?post=223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/tags?post=223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}