Methods, computer program products, and systems are presented and can include for instance: The method can include for example, establishing a permission that authorizes a second shopper to act on behalf of a first shopper, the first shopper having a profile that includes first shopper information stored in a secure computing environment; and performing a transaction based on one or more input of the second shopper, the transaction using content of the first shopper information stored in a secure computing environment, wherein the second shopper is restricted from accessing one or more information item of the first shopper information stored in a secure computing environment.