COOKIES. CONSENT. COMPLIANCE
secure privacy badge logo
June 24, 2019

How to install Secure Privacy on Wix

This guide explains you how to install Secure Privacy on Wix

1. Click here to go to your WIX dashboard.

2. Click Manage Website in the side.

3. Go to the Tracking & Analytics section of Site Manager.

text

4. Click + New Tool and select Custom from the dropdown.

text

5. Enter your secure privacy code into the custom code.

6. Select the relevant domain.
Note: This option will appear only if you have multiple domains.

7. Enter the name of the custom code (Secure Privacy).

8. Add Code to Pages: Select All pages >  Load code on each new page to add your code.

9. Place Code in Select > Head

Read about Cookie Compliance and Privacy Policy on Wix.

Other articles that might interest you:

How to install Secure Privacy on Shopify

How to install Secure Privacy with Google Tag Manager (GTM)

How to integrate Secure Privacy with Hubspot

How to install Secure Privacy on Joomla

How to install Secure Privacy with Google Tag Manager (GTM)

How to install Secure Privacy on SquareSpace

image

EU AI Act Implementation Sprint: A 90-Day Playbook for Enterprise Compliance

The EU AI Act is no longer a regulation on the horizon. Prohibited AI practices have been enforceable since February 2025. General-purpose AI obligations have applied since August 2025. And on 2 August 2026 — five months from now — the full weight of high-risk AI system requirements under Annex III comes into force, bringing with it a penalty structure that exceeds even the GDPR: up to €35 million or 7% of global annual turnover for the most serious violations, and up to €15 million or 3% for non-compliance with high-risk obligations.

  • AI Governance
image

Security by Design: Principles, Frameworks, and Enterprise Implementation

Security vulnerabilities found and patched after deployment cost organisations ten times more to remediate than the same vulnerabilities caught at the design stage. That figure — cited consistently across NIST, CISA, and IBM cost-of-breach research — is the foundational economic argument for security by design. But the concept has expanded well beyond cost avoidance. In 2026, security by design is simultaneously an engineering methodology, a regulatory obligation, and a governance architecture. Understanding how all three layers work together — and where most organisations are still failing — is the purpose of this guide.

  • Privacy Governance
  • Data Protection
image

How to Implement Consent in Captive Browsers for GDPR-Compliant Public Wi-Fi

A captive portal collects personal data — IP addresses, MAC addresses, emails, session metadata — from the moment a user connects. GDPR applies to all of it.

  • Consent Management
  • Governance