Learn more about our acquisition of Social Pinpoint, an online community engagement platform that gives more people a voice.
Continue readingProactive Engagement with Community and Stakeholders: WA Groundwater Replenishment Scheme
Discover how WA Water Corporation used Consultation Manager for community and stakeholder engagement on its groundwater replenishment scheme.
Continue readingInformation Security and Quality – We are ISO 27001 and ISO 9001 Certified
Discover how Consultation Manager’s ISO 27001 and ISO 9001 accreditation reflects our commitment to quality and information security.
Continue readingSpotlight On: Consultation Manager’s John Steyntjes
Our Spotlight Series recognises the people doing great things in our industry, giving you a behind-the-scenes look into what makes them tick.
Continue readingAnnouncing Our New Social Pinpoint Integration
Our integration with community engagement leaders, Social Pinpoint, makes it easier for you to track stakeholder sentiment.
Continue readingAnnouncing: The International Champions of Innovation in Engagement Award 2016
We are inviting stakeholder and community engagement experts to submit entries for the 2016 Champions of Innovation in Engagement Awards.
Continue readingCracking the Small Cap Code: Changes to Community Consultation Requirements
The new Exploration Code of Practice: Community Consultation reflects a growing national focus on process, documentation, and reporting.
Continue readingIntroducing: New and Improved Mapping
Discover how you can plot your stakeholders and events on a map, allowing you to tap into location-specific trends with Consultation Manager.
Continue readingNotes from the CEO: Data, data, everywhere!
Discover the benefits of consolidating all of your distributed stakeholder communication into a single repository with Consultation Manager.
Continue readingNotes from the CEO: Data Security and Data Sovereignty, our commitment to you
We take our responsibility to manage sensitive data very seriously and are committed to best practices in data security and sovereignty.
Continue reading