Limit The Duration Google Holds Your Data

Google has made security and privacy major features at it's annual I/O developers Conference in California recently.  

The company went so far as to say that “security and privacy are the central theme” of its upcoming Android Q release

But supposing you want to take some control over what data Google has about you right now. Right now, anyone with a Google account can start limiting how long their data gets stored using new settings. 

The feature allows users to set a time limit for Google to retain certain types of data, either three months or 18 months, after which the information is automatically deleted.

For now, the auto-delete feature is only available for “Web & App Activity,” which tracks things like your searches and other browsing data. The company will offer options across more services in the future, including highly anticipated controls for location data.

None of this will happen on its own, though. By default, Google will continue to indefinitely retain the Web & Activity data you’ve set it to collect, everything by default. In this state, before auto-delete is turned on, the Web & App Activity page says, “Your activity is being kept until you delete it manually.”

To make the changes, log into your Google Account and go to Web & App Activity. Then press the “Choose to delete automatically” button. An overlay will offer three options: “Keep until I delete manually,” “Keep for 18 months then delete automatically,” and “Keep for 3 months then delete automatically.”

Google says that “what you search, read, and watch can work together to help you get things done faster, discover new content, and pick up where you left off,” as an explanation for why you might want to store your data longer.

Google already allowed users to "pause" data collection for Web & App Activity altogether. If you have that enabled, there will be no data for Google to delete, but it still can’t hurt to enable another line of defense.

“Our goal is simple: earn and keep your trust by clearly explaining how our products work and how we’ll uphold our commitment to respect your privacy,” Google says in the commitment statement.

Users will also be able to migrate their Nest accounts into a new or existing Google account so they can have access to Google security features like suspicious activity monitoring and expanded options for two-factor authentication.

Nest already offers two-factor authentication, though, so you can also just make sure you have that turned on if you want to ward off takeovers without linking even more of your life to your Google account.

Wired

You Might Also Read: 

California Passes Its Own GDPR Law:

Get Ready For ePrivacy Regulation:

 

 

« Cyber Security Consultancy
Cyber Threats And Nuclear Weapons Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

SmartSearch

SmartSearch

SmartSearch is a leading online provider of Anti-Money Laundering and Fraud Prevention Services.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Research Institute in Science of Cyber Security (RISCS)

Research Institute in Science of Cyber Security (RISCS)

RISCS is focused on giving organisations more evidence, to allow them to make better decisions, aiding to the development of cybersecurity as a science.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

Advanced Systems International SAC

Advanced Systems International SAC

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.