SlideShare a Scribd company logo
1 of 3
Download to read offline
DATA SHEET
Cloud technologies continue to explode in popularity. In fact,
“Gartner predicts a 16.0% growth in public cloud services in
2016 with a revenue of $204 billion in 2016.”1
But growing
concerns about consumer privacy are rewriting the rules for
how cloud providers must manage user data, with transparency,
consent and control being the top concerns.
Complex enterprise cloud technology stacks are driving ROI at ever-expanding
rates, by harnessing the power of big data to deliver the personalized customer
experiences that consumers now expect. But, as the old saying goes: “With great
power comes great responsibility.”
It’s now commonplace for a single enterprise stack to tap cloud technologies
operating in multiple time zones and country codes, slinging consumers’ personal
data across the borders of nations that have varying requirements for how that data
must be handled. A host of new data protection and privacy regulations are rolling
out across the globe in the near future, most notably the European General Data
Protection Regulation (GDPR). The GDPR is a
complex regulation and carries the threat
of massive penalties of up to €20,000,000
or 4% of global turnover for non compliance.
So where should your business begin to
address consumer privacy compliance in your
wider digital strategy?
Privacy By Design
The GDPR actually presents an exciting
opportunity to evaluate your strategy around
consumer data, beginning with the principle of
“Privacy by Design” (PbD). For every service
or business process making use of personal
data that you employ — whether on-premise or
cloud-based — the protection of that data must
be taken into consideration. If you’re trusting a
variety of distributed cloud-based point solutions
for marketing, service or sales to safeguard consumer data and keep your business
in legal compliance, you may be taking a big risk. The safer route is to centralize
management of all personal data, to give you maximum visibility and control of where
that data lives and how it is used.
Managing Consumer Privacy in the
Cloud with Gigya
1 
Gartner, Forecast Analysis: Public Cloud Services, Worldwide, 1Q16 Update, (May, 2016)
PRIVACY
BY DESIGN
7 Foundational
Principles
Proactive not
Reactive;
Preventative
not Remedial
Privacy as
the Default
Setting
Privacy
Embedded
into Design
Full
Functionality –
Positive-Sum,
not Zero-Sum
Visibility and
Transparency –
Keep it Open
End-to-End
Security – Full
Lifecycle
Protection
Respect for
User Privacy –
Keep it
User-Centric
DATA SHEET
Your goal should be to build the transparency into the user experience that
consumers expect and the law demands, while extracting maximum value from the
data that you collect and manage. Gigya enables you to centralize all management
of consumer data in a single, end-to-end solution. Our industry-leading Customer
Identity Management platform is built specifically for managing consumer identity
data. Designed with features that are built according to the central tenets of PbD,
Gigya’s platform acts as the essential customer identity layer across today’s
complex, cloud-driven technology stacks.
Consent Management
Many regional regulations mandate that businesses obtain verifiable
consent from their users when collecting and using their personal
information. Gigya’s flexible SaaS platform offers self-service registration,
login and profile management flows that can be easily customized to
communicate the specific data that will be collected from users and how
it will be used for each context. Privacy notices, terms and conditions,
marketing opt-in/out functions, account preferences, and the all-important
“right to be forgotten” — the ability for users to delete their data at any
point — can all be baked into your strategy by design.
To help you meet proof of consent requirements, Gigya stores current
terms of consent and individual identifiers for each user, so proof is
always at hand. Requirements for the minimum age of consent — which
varies widely by country — are also easily met with our platform.
User Data Control
There are strict new requirements for giving consumers control over
their own data. At any point and for any reason, users must be able
to autonomously export, delete, edit and freeze processing of their
profile information. Gigya’s Profile Management functions ensure that
consumers remain in full control of their data, and make it possible for
your business to store only data that is absolutely necessary to enable
the functionality of relevant applications or services.
Data Localization
Many countries now require that any organization doing digital business
within their borders store and manage associated consumer data there.
Because ours is a purely cloud-based platform, Gigya maintains data
centers in multiple regions, including North America, Europe, Australia,
Russia and China (2017) to ensure that brands can continue to safely
serve their audiences, wherever they are.
© 2016 Gigya, Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other
trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available
to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable).
Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at
http://www.gigya.com/privacy-policy/.
Gigya_Data_Sheet_Managing_Consumer_Privacy_in_the_Cloud_with_Gigya_201612
Social Compliance
Gigya helps maintains compliance with the current terms of service (TOS) of more
than 25 international social networks and identity providers, giving businesses
maximum flexibility when offering social login functionality to international audiences.
Gigya’s platform ensures that your database is updated whenever Facebook profiles
are changed, and also facilitates the deletion of non-public profile information when
users revoke their permissions for Facebook apps.
Anti-Spam Preference Management
Gigya’s cloud-based platform facilitates compliance with regional opt-out laws and
newsletter optimization by enabling you to implement per-country compliance —
such as Canada’s requirement to keep newsletter opt-in boxes unchecked by
default — and synchronizing with ESPs to ensure that user preferences like
newsletter frequency are always respected.
Accessibility Compliance
As of early 2017, Gigya also helps you comply with Web Content Accessibility
Guidelines (WCAG) by offering out-of-the-box workflows that enable vision-impaired
users to navigate registration and authentication processes using only their keyboards.
The Bottom Line?
For more agile and dynamic digital strategies that drive revenue, the future is in
the cloud, but only if you also have a firm handle on managing consumer data
privacy compliance. One ill-timed lawsuit or data breach can cause irreparable
damage to both your brand’s reputation and value. To learn more about how
Gigya’s Customer Identity Management solutions can help you win and engage
more customers while keeping you in full compliance with regional laws and social
network TOS, visit www.gigya.com/trust/

More Related Content

More from Gigya

More from Gigya (20)

Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
 
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaCase Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy Practices
 
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer Identity
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
Data Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceData Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory Compliance
 
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - French
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A Password
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG Company
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality Company
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce Company
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French Edition
 
Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data Privacy
 
Information Security and Data Privacy Practices
Information Security and Data Privacy PracticesInformation Security and Data Privacy Practices
Information Security and Data Privacy Practices
 
Russian Data Center
Russian Data CenterRussian Data Center
Russian Data Center
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, Convert
 
Gigya and Marketo
Gigya and MarketoGigya and Marketo
Gigya and Marketo
 
White Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
White Paper: 5 Ways Airports Can Drive Non-Aviation RevenueWhite Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
White Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
 

Recently uploaded

Recently uploaded (20)

Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 

Data Sheet - Managing Consumer Privacy in the Cloud with Gigya

  • 1. DATA SHEET Cloud technologies continue to explode in popularity. In fact, “Gartner predicts a 16.0% growth in public cloud services in 2016 with a revenue of $204 billion in 2016.”1 But growing concerns about consumer privacy are rewriting the rules for how cloud providers must manage user data, with transparency, consent and control being the top concerns. Complex enterprise cloud technology stacks are driving ROI at ever-expanding rates, by harnessing the power of big data to deliver the personalized customer experiences that consumers now expect. But, as the old saying goes: “With great power comes great responsibility.” It’s now commonplace for a single enterprise stack to tap cloud technologies operating in multiple time zones and country codes, slinging consumers’ personal data across the borders of nations that have varying requirements for how that data must be handled. A host of new data protection and privacy regulations are rolling out across the globe in the near future, most notably the European General Data Protection Regulation (GDPR). The GDPR is a complex regulation and carries the threat of massive penalties of up to €20,000,000 or 4% of global turnover for non compliance. So where should your business begin to address consumer privacy compliance in your wider digital strategy? Privacy By Design The GDPR actually presents an exciting opportunity to evaluate your strategy around consumer data, beginning with the principle of “Privacy by Design” (PbD). For every service or business process making use of personal data that you employ — whether on-premise or cloud-based — the protection of that data must be taken into consideration. If you’re trusting a variety of distributed cloud-based point solutions for marketing, service or sales to safeguard consumer data and keep your business in legal compliance, you may be taking a big risk. The safer route is to centralize management of all personal data, to give you maximum visibility and control of where that data lives and how it is used. Managing Consumer Privacy in the Cloud with Gigya 1  Gartner, Forecast Analysis: Public Cloud Services, Worldwide, 1Q16 Update, (May, 2016) PRIVACY BY DESIGN 7 Foundational Principles Proactive not Reactive; Preventative not Remedial Privacy as the Default Setting Privacy Embedded into Design Full Functionality – Positive-Sum, not Zero-Sum Visibility and Transparency – Keep it Open End-to-End Security – Full Lifecycle Protection Respect for User Privacy – Keep it User-Centric
  • 2. DATA SHEET Your goal should be to build the transparency into the user experience that consumers expect and the law demands, while extracting maximum value from the data that you collect and manage. Gigya enables you to centralize all management of consumer data in a single, end-to-end solution. Our industry-leading Customer Identity Management platform is built specifically for managing consumer identity data. Designed with features that are built according to the central tenets of PbD, Gigya’s platform acts as the essential customer identity layer across today’s complex, cloud-driven technology stacks. Consent Management Many regional regulations mandate that businesses obtain verifiable consent from their users when collecting and using their personal information. Gigya’s flexible SaaS platform offers self-service registration, login and profile management flows that can be easily customized to communicate the specific data that will be collected from users and how it will be used for each context. Privacy notices, terms and conditions, marketing opt-in/out functions, account preferences, and the all-important “right to be forgotten” — the ability for users to delete their data at any point — can all be baked into your strategy by design. To help you meet proof of consent requirements, Gigya stores current terms of consent and individual identifiers for each user, so proof is always at hand. Requirements for the minimum age of consent — which varies widely by country — are also easily met with our platform. User Data Control There are strict new requirements for giving consumers control over their own data. At any point and for any reason, users must be able to autonomously export, delete, edit and freeze processing of their profile information. Gigya’s Profile Management functions ensure that consumers remain in full control of their data, and make it possible for your business to store only data that is absolutely necessary to enable the functionality of relevant applications or services. Data Localization Many countries now require that any organization doing digital business within their borders store and manage associated consumer data there. Because ours is a purely cloud-based platform, Gigya maintains data centers in multiple regions, including North America, Europe, Australia, Russia and China (2017) to ensure that brands can continue to safely serve their audiences, wherever they are.
  • 3. © 2016 Gigya, Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at http://www.gigya.com/privacy-policy/. Gigya_Data_Sheet_Managing_Consumer_Privacy_in_the_Cloud_with_Gigya_201612 Social Compliance Gigya helps maintains compliance with the current terms of service (TOS) of more than 25 international social networks and identity providers, giving businesses maximum flexibility when offering social login functionality to international audiences. Gigya’s platform ensures that your database is updated whenever Facebook profiles are changed, and also facilitates the deletion of non-public profile information when users revoke their permissions for Facebook apps. Anti-Spam Preference Management Gigya’s cloud-based platform facilitates compliance with regional opt-out laws and newsletter optimization by enabling you to implement per-country compliance — such as Canada’s requirement to keep newsletter opt-in boxes unchecked by default — and synchronizing with ESPs to ensure that user preferences like newsletter frequency are always respected. Accessibility Compliance As of early 2017, Gigya also helps you comply with Web Content Accessibility Guidelines (WCAG) by offering out-of-the-box workflows that enable vision-impaired users to navigate registration and authentication processes using only their keyboards. The Bottom Line? For more agile and dynamic digital strategies that drive revenue, the future is in the cloud, but only if you also have a firm handle on managing consumer data privacy compliance. One ill-timed lawsuit or data breach can cause irreparable damage to both your brand’s reputation and value. To learn more about how Gigya’s Customer Identity Management solutions can help you win and engage more customers while keeping you in full compliance with regional laws and social network TOS, visit www.gigya.com/trust/