Limit The Duration Google Holds Your Data

Google has made security and privacy major features at it's annual I/O developers Conference in California recently.  

The company went so far as to say that “security and privacy are the central theme” of its upcoming Android Q release

But supposing you want to take some control over what data Google has about you right now. Right now, anyone with a Google account can start limiting how long their data gets stored using new settings. 

The feature allows users to set a time limit for Google to retain certain types of data, either three months or 18 months, after which the information is automatically deleted.

For now, the auto-delete feature is only available for “Web & App Activity,” which tracks things like your searches and other browsing data. The company will offer options across more services in the future, including highly anticipated controls for location data.

None of this will happen on its own, though. By default, Google will continue to indefinitely retain the Web & Activity data you’ve set it to collect, everything by default. In this state, before auto-delete is turned on, the Web & App Activity page says, “Your activity is being kept until you delete it manually.”

To make the changes, log into your Google Account and go to Web & App Activity. Then press the “Choose to delete automatically” button. An overlay will offer three options: “Keep until I delete manually,” “Keep for 18 months then delete automatically,” and “Keep for 3 months then delete automatically.”

Google says that “what you search, read, and watch can work together to help you get things done faster, discover new content, and pick up where you left off,” as an explanation for why you might want to store your data longer.

Google already allowed users to "pause" data collection for Web & App Activity altogether. If you have that enabled, there will be no data for Google to delete, but it still can’t hurt to enable another line of defense.

“Our goal is simple: earn and keep your trust by clearly explaining how our products work and how we’ll uphold our commitment to respect your privacy,” Google says in the commitment statement.

Users will also be able to migrate their Nest accounts into a new or existing Google account so they can have access to Google security features like suspicious activity monitoring and expanded options for two-factor authentication.

Nest already offers two-factor authentication, though, so you can also just make sure you have that turned on if you want to ward off takeovers without linking even more of your life to your Google account.

Wired

You Might Also Read: 

California Passes Its Own GDPR Law:

Get Ready For ePrivacy Regulation:

 

 

« Cyber Security Consultancy
Cyber Threats And Nuclear Weapons Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

CM Blockchain Security Center

CM Blockchain Security Center

We are dedicated to building a healthier blockchain ecosystem, providing solutions to security technology, and helping those who practice in the area of blockchain to get insight into industry trends.

Penten

Penten

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence).

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

QFunction

QFunction

QFunction works within your existing security stack to detect anomalies and threats within your data.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.