Limit The Duration Google Holds Your Data

Google has made security and privacy major features at it's annual I/O developers Conference in California recently.  

The company went so far as to say that “security and privacy are the central theme” of its upcoming Android Q release

But supposing you want to take some control over what data Google has about you right now. Right now, anyone with a Google account can start limiting how long their data gets stored using new settings. 

The feature allows users to set a time limit for Google to retain certain types of data, either three months or 18 months, after which the information is automatically deleted.

For now, the auto-delete feature is only available for “Web & App Activity,” which tracks things like your searches and other browsing data. The company will offer options across more services in the future, including highly anticipated controls for location data.

None of this will happen on its own, though. By default, Google will continue to indefinitely retain the Web & Activity data you’ve set it to collect, everything by default. In this state, before auto-delete is turned on, the Web & App Activity page says, “Your activity is being kept until you delete it manually.”

To make the changes, log into your Google Account and go to Web & App Activity. Then press the “Choose to delete automatically” button. An overlay will offer three options: “Keep until I delete manually,” “Keep for 18 months then delete automatically,” and “Keep for 3 months then delete automatically.”

Google says that “what you search, read, and watch can work together to help you get things done faster, discover new content, and pick up where you left off,” as an explanation for why you might want to store your data longer.

Google already allowed users to "pause" data collection for Web & App Activity altogether. If you have that enabled, there will be no data for Google to delete, but it still can’t hurt to enable another line of defense.

“Our goal is simple: earn and keep your trust by clearly explaining how our products work and how we’ll uphold our commitment to respect your privacy,” Google says in the commitment statement.

Users will also be able to migrate their Nest accounts into a new or existing Google account so they can have access to Google security features like suspicious activity monitoring and expanded options for two-factor authentication.

Nest already offers two-factor authentication, though, so you can also just make sure you have that turned on if you want to ward off takeovers without linking even more of your life to your Google account.

Wired

You Might Also Read: 

California Passes Its Own GDPR Law:

Get Ready For ePrivacy Regulation:

 

 

« Cyber Security Consultancy
Cyber Threats And Nuclear Weapons Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

SafeCipher

SafeCipher

SafeCypher are crypto specialists with a very specialized knowledge of Public Key Infrastructure (PKI), Hardware Security Modules (HSM), Quantum Resistant Cryptography and Crypto-Agility.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

Vizius Group

Vizius Group

The Vizius Group are a think tank of cybersecurity consultants who understand the mechanics and business value of risk reduction.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.