Feeds

Google: Go public on Profiles or we'll delete you

Want to use our stuff? Have to let us use yours

Maximizing your infrastructure through virtualization

Comment Google's efforts to get more Web2.0-social online have had an interesting but not altogether surprising side-effect: Profiles will no longer be hidden from view as of the end of this month.

The company, which is busily crafting a social network dubbed Google+, has put the policy on how it handles its user profiles on notice.

From 31 July, people who have created private profiles in, say, the ad broker's free email service Gmail will be deleted by Google unless individuals switch it to public view.

"The purpose of Google Profiles is to enable you to manage your online identity. Today, nearly all Google Profiles are public. We believe that using Google Profiles to help people find and connect with you online is how the product is best used. Private profiles don't allow this, so we have decided to require all profiles to be public," said the company.

Google said that it would only require a user's full name and gender to be displayed on the public profile. Any other information an individual doesn't want to reveal to the world can be edited or deleted.

"If you currently have a private profile but you do not wish to make your profile public, you can delete your profile. Or, you can simply do nothing. All private profiles will be deleted after July 31, 2011," said Google.

The move is part of Mountain View's wider ambition to bake social products into its search and email products.

As a result, anyone planning to use Google+ will need a public profile with, at minimum, their full name and gender displayed.

Google would argue that providing those details via its service will increase trust among participants within its social network.

The notion of identity online is currently undergoing a significant shift away from the old model of individuals having separate accounts for different parts of a web giant's online estate.

Google has arguably been at the forefront of that shift even if it has arrived late to the social party – setting aside the failed Buzz and uninspired Orkut.

Facebook has been insisting for years that users who sign up to its private network can only do so using their real names. Staggeringly, it can and does routinely ask users whose accounts are temporarily disabled to submit proof that they are who they say they are before they are allowed to return to the site.

Photocopied versions of an individual's passport or driving licence are the price. And users, more often than not, comply. Facebook temporarily stores that information on its servers.

In some circles, the method is known as "identity assurance" and the handling of such data is being considered even by the UK's Cabinet Office, which seems to think it is easier to shift the responsibility of an ID database over to any number of third parties, including social networks, rather than keep the whole thing in-house – which, as the previous Labour government learned, is a different kind of headache.

Microsoft, too, has recently made the single sign-in shift with its Windows Live estate, and some users aren't happy about it.

But the reality is that identity is becoming a lucrative and even essential part of an online business that trades its data for ad revenue. And now that the practice is seemingly industry-wide, web surfers are being forced to make decisions about what networks they want to make uneasy concessions with, or else opt out for good. ®

The Essential Guide to IT Transformation

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Google Nest, ARM, Samsung pull out Thread to strangle ZigBee
But there's a flaw in Google's IP-based IoT system
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.