Infrastructure // Networking
10:33 AM
Connect Directly
Repost This

Gigya Certification Aims To Allay Social Login Fears

SocialPrivacy Certification holds organizations accountable for data, privacy protection.

Facebook's 2012 Highs And Lows
Facebook's 2012 Highs And Lows
(click image for larger view and for slideshow)
Social business infrastructure provider Gigya's new SocialPrivacy Certification program is designed to provide peace of mind to users of social login services by holding organizations displaying the certificate accountable for doing -- and not doing -- specific things.

Social login services, including Gigya's own Social Login, enable users to register for sites and services using a preferred social network account, such as Facebook, LinkedIn, Google+ or Twitter. But while such services make authentication relatively quick and easy, not all users are comfortable using them.

Gigya conducted a survey of 2,600 people and found that 53% have logged in to a website or mobile application using social login. It was the 47% who had not that Gigya wanted to reach, according to company CEO Patrick Salyer.

[ What do you expect to see in social business this year? Read 5 Social Business Predictions For 2013. ]

Survey respondents who had used social login services cited username/password fatigue, streamlined registration and social syndication as the three top benefits. Survey respondents who had not used social login services cited data transfer, social posting concerns and uncertainly of data usage as the top three factors for skipping a social login option when signing in to a website or mobile application. Respondents were concerned that if they used social login services, businesses would then sell their social data, their social network contacts would be spammed or businesses would post to their social networks without permission.

"They were concerned in terms of what is happening when they log in socially," Salyer told The BrainYard. "There was concern that their social login data would be sold or that they or their friends would be spammed."

To help allay those fears, Gigya formed a privacy advisory board and began working with the Future of Privacy Forum, ConnectSafely and Stanford University. "We thought there was an opportunity to form a certification program where an online business would guarantee consumers that social login data would be handled in very specific ways," said Salyer.

To become certified and to maintain the Gigya certification, organizations must adhere to four key principles:

1. They will not sell social data.

2. They will not post to social feeds without explicit permissions.

3. They will not engage in social data-based email marketing campaigns without user permissions.

4. They will not send private messages to users' friends without permission.

A privacy team put together by Gigya performs an audit on organizations seeking to become certified and will conduct ongoing audits to ensure that companies are abiding by the certification's standards. Organizations that check out and that pay about $1,500 per month can display the Gigya SocialPrivacy Certification seal. Participating organizations include Martha Stewart Omnimedia and Lush Cosmetics. Salyer said companies that display the seal have seen a significant increase in social login.

He added that most companies seeking the SocialPrivacy Certification seal already meet the program's requirements, but the certification provides users with a better understanding of what participating organizations will and won't do with their social data.

"The vast majority of these requirements are things that businesses have already been doing, but they're making a public commitment," said Salyer. "We consider this a virtual handshake. It's a win for businesses and a win for users."

Follow Deb Donston-Miller on Twitter at @debdonston.

Attend Online Marketing Summit San Diego, Feb. 11-13, and gather the insights and strategies you need to make the right online marketing choices to deliver the most value for your business. OMS San Diego offers three days of inspiration, connections, and practical learning. Register by Jan. 11 with code WETW01 and save up to $600 on All Access or Conference passes.

Comment  | 
Print  | 
More Insights
2014 Private Cloud Survey
2014 Private Cloud Survey
Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ­extend their clouds across multiple datacenters. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Government, May 2014
NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.