Limit The Duration Google Holds Your Data

Google has made security and privacy major features at it's annual I/O developers Conference in California recently.  

The company went so far as to say that “security and privacy are the central theme” of its upcoming Android Q release

But supposing you want to take some control over what data Google has about you right now. Right now, anyone with a Google account can start limiting how long their data gets stored using new settings. 

The feature allows users to set a time limit for Google to retain certain types of data, either three months or 18 months, after which the information is automatically deleted.

For now, the auto-delete feature is only available for “Web & App Activity,” which tracks things like your searches and other browsing data. The company will offer options across more services in the future, including highly anticipated controls for location data.

None of this will happen on its own, though. By default, Google will continue to indefinitely retain the Web & Activity data you’ve set it to collect, everything by default. In this state, before auto-delete is turned on, the Web & App Activity page says, “Your activity is being kept until you delete it manually.”

To make the changes, log into your Google Account and go to Web & App Activity. Then press the “Choose to delete automatically” button. An overlay will offer three options: “Keep until I delete manually,” “Keep for 18 months then delete automatically,” and “Keep for 3 months then delete automatically.”

Google says that “what you search, read, and watch can work together to help you get things done faster, discover new content, and pick up where you left off,” as an explanation for why you might want to store your data longer.

Google already allowed users to "pause" data collection for Web & App Activity altogether. If you have that enabled, there will be no data for Google to delete, but it still can’t hurt to enable another line of defense.

“Our goal is simple: earn and keep your trust by clearly explaining how our products work and how we’ll uphold our commitment to respect your privacy,” Google says in the commitment statement.

Users will also be able to migrate their Nest accounts into a new or existing Google account so they can have access to Google security features like suspicious activity monitoring and expanded options for two-factor authentication.

Nest already offers two-factor authentication, though, so you can also just make sure you have that turned on if you want to ward off takeovers without linking even more of your life to your Google account.

Wired

You Might Also Read: 

California Passes Its Own GDPR Law:

Get Ready For ePrivacy Regulation:

 

 

« Cyber Security Consultancy
Cyber Threats And Nuclear Weapons Systems »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

NetFort

NetFort

NetFort provides software products to monitor activity on virtual and physical networks.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

Yaana Technologies

Yaana Technologies

Yaana is a leading provider of intelligent compliance solutions including lawful interception, data retention & disclosure, and advanced security analytics.

Snode Technologies

Snode Technologies

Snode's Guardian cybersecurity platform uses AI and machine learning to monitor, detect and proactively respond to all threats on every device within your network.

Wolf Hill Group

Wolf Hill Group

Wolf Hill Group, a Slone Partners company, is a national recruitment firm focused on Cybersecurity.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

Core42

Core42

Core42 provides a full-spectrum of AI enablement solutions covering cloud, data, cybersecurity and digital services designed for customer success.

UBDS Digital

UBDS Digital

UBDS Digital is your Digital Lifecycle Partner for Secure Cloud Transformation.