Case Study: Legal Requirements for the Use of Social Login Features For
Total Page:16
File Type:pdf, Size:1020Kb
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Lirias Case study: Legal Requirements for the Use of Social Login Features for Online Reputation Updates Yung Shin VAN DER SYPE Jean-Marc SEIGNEUR ICRI – KU Leuven Université de Genève Sint-Michielsstraat 6, bus 3443 7 route de Drize 3000 Leuven, BELGIUM 1227 Carouge, SWITZERLAND +32 495 21 33 31 +41 22 379 0238 [email protected] [email protected] ABSTRACT Online users use more and more social login on third-party sites 1. INTRODUCTION More and more sites and applications allow their users to create or applications. To use an existing account to login is faster than an account and authenticate for further logins via a third-party to fill in personal information forms over and over again. social network such as LinkedIn, Google, Facebook or Twitter. However, many online users, even those who frequently use social Users tend to prefer such social login because they do not have to login systems, are not aware of the policies and conditions they fill in again their personal information every time they request agree with. They are often unaware of the consequences of their access. Once they are logged in to a social network, they can authentications to access websites and applications, and thus of easily use this login to access the other site or application. Thus the information that can be retrieved from their social networks. this way of registration is faster for the user, and also more In this paper, we provide a case-study of the legal requirements convenient because they do not need to remember other that must be observed when social login features are used for passwords than the one they use for their social network. authentication in a mobile application in the workplace. The legal However, users often do not take the time to carefully read the requirements considered in this case-study follow from the policy explanations before they authorize websites and Belgian implementation of the EU legal framework on privacy applications to use their social networks for login. As a result they and data protection. Particularly interesting for this study is the may not be aware of which information the websites and storage of the data following from external social network applications can retrieve from their social networks. profiles; the retention of the retrieved information processed to compute an extra layer of reputation; and the policies In this paper, we provide a case-study of the legal requirements accompanying the social login features. that must be observed when social login features are used for user authentication to access a mobile application, which retrieves Categories and Subject Descriptors information from social networks to compute an extra layer of K.4.1 [Computers and Society]: Public Policy Issues – Privacy, reputation on top of that retrieved information, and which is Regulation. K.4.3 [Computers and Society]: Social Issues – owned or controlled by the user’s employer or contracting party. Employment. K.6.5 [Management of Computing and The considered legal requirements are based on the EU legal framework on privacy and data protection, as implemented in Information Systems]: Security and Protection – Authentication. Belgian law. In Section 2 we discuss related work in the fields of social login and reputation computation. In Section 3 we present General Terms the studied mobile application. Section 4 lists our findings Security, Human Factors, Legal Aspects. regarding the legal requirements for social login and further reputation computation according to Belgian law. And finally, in Keywords Section 5 we conclude and discuss future work. Social Login, Online Reputation, Workplace Privacy, Legal Aspects. 2. RELATED WORK In this section, we start by related work regarding the technical aspects of social login and reputation computation and then delve into related work regarding legal requirements. Permission to make digital or hard copies of all or part of this work for personal or classroom use is 2.1 Social Login granted without fee provided that copies are not made For the past 10 years, many technical initiatives have been or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on launched in order to achieve single-sign-on (SSO) and federated the first page. To copy otherwise, to republish, to identity management between different services, applications and post on servers or to redistribute too lists, requires prior specific permission and/or a fee. Web sites owned by different legal entities. A few of these technical initiatives were strongly backed up by major information SAC’14, March 24-28, 2014, Gyeongju, Korea. technology companies such as Windows Cardspace, Liberty Copyright 2014 ACM 978-1-4503-2469-4/14/03... $15.00. Alliance or IBM Higgins [1]. Surprisingly, it is not them that http://dx.doi.org/10.1145/2554850.2554857 achieved large scale user adoption but a combination of the 1698 creation of open authentication and authorization protocols and extension of the Friend-Of-A-Friend (FOAF) vocabulary and their use by large scale online social networks such as Facebook. algorithms to propagate trust values estimated by users rather than Users had already massively joined these online social networks computed based on a clear count of pieces of evidence. and filled their information including with whom they are friends Reputation has been defined as follows : “Reputation is the or connected. To avoid having to spend time re-authenticating, subjective aggregated value, as perceived by the requester, of the filling their information, and to remember new passwords, they assessments by other people, who are not exactly identified, of then adopted massively the Facebook Connect social login option some quality, character, characteristic or ability of a specific that many services, Web sites and application started to easily entity without taking into account direct previous interactions implement thanks to an Application Programming Interface (API) with the entity” (adapted from [9]). However, to be able to provided by Facebook. Given the success of Facebook Connect, perceive the reputation of an entity is only one aspect of other major online social networks started to provide their social reputation management. The other aspects of reputation login option and API such as Twitter or LinkedIn. Although most management for an entity consist of: of them have built their social login according to the OAuth [2] open standard for authentication and authorization, the original x Monitoring the entity reputation as broadly as possible open standard for authentication, which OAuth took a number of in a proactive way; ideas from, is OpenID [3]. Unfortunately, although most of them x Analysing the sources spreading the entity reputation; have used a common standard basis and provide an API, their APIs are constantly evolving, often without backward x Influencing the number and content of these sources to compatibility with the previous version of their API, and are very spread an improved reputation. different between the social networks. Thus, it has become Founded in 1995, eBay is the first large-scale online reputation difficult for a third-party service to cover all the potential social service that allows the users to check the reputation of other networks that a new potential user may want to use to create their buyers/sellers users or selling companies based on the number of account. This is why a new type of providers has emerged on top positive and negative ratings that are aggregated in their Feedback of these “social login” providers. Those providers do the hard Score as well as potential written text comments. Founded in work to maintain a tool that allows a user to create an account 2004, Opinity [9] was one of the first commercial effort to build with all the “social login” providers as well as store and manage decentralized online reputation for users in all contexts beyond users information on behalf of the service or Web site that uses eBay's limited e-commerce context. Unfortunately, Opinity closed this tool. Thus, user management has started to be used for such as several other services that tried to become the leader in online services to clearly underline they go beyond previous identity reputation calculation because very few users are willing to pay management solutions that focused on the authentication and for such service. However, a few new services try to compute the identity certification issues. The owners of Web sites and services influence of users in such or such topic, which is related to the install the user management tool on their Web site or service in reputation of these users regarding a topic. For example, Klout order not to have to worry about maintaining code when one of [10] was created in 2008. Once the Klout account is linked to a the “social login” providers change their API. The price of user’s social network via social login, it can detect automatically allowing a user to create an account with any of the main online when the user sends a new post and check how much buzz it has social networks providers without having to maintain each “social generated. Thus instead of computing the reputation of a person login” module has to be weighed against the subscription price to mainly based on recommendations from other users, Klout one of these user management providers such as Janrain [4] or analyses the social networks of the user, e.g., Twitter based on the Gigya [5]. As the number of intermediaries managing users following 3 main criterions: information increase, some privacy concerns arise, especially when the users do not take the time or are not enough technology x True Reach: the number of followers of the user’s aware to check the information they allow to be shared between Twitter account and following the user’s tweets the intermediaries.