Limit The Duration Google Holds Your Data

Google has made security and privacy major features at it's annual I/O developers Conference in California recently.  

The company went so far as to say that “security and privacy are the central theme” of its upcoming Android Q release

But supposing you want to take some control over what data Google has about you right now. Right now, anyone with a Google account can start limiting how long their data gets stored using new settings. 

The feature allows users to set a time limit for Google to retain certain types of data, either three months or 18 months, after which the information is automatically deleted.

For now, the auto-delete feature is only available for “Web & App Activity,” which tracks things like your searches and other browsing data. The company will offer options across more services in the future, including highly anticipated controls for location data.

None of this will happen on its own, though. By default, Google will continue to indefinitely retain the Web & Activity data you’ve set it to collect, everything by default. In this state, before auto-delete is turned on, the Web & App Activity page says, “Your activity is being kept until you delete it manually.”

To make the changes, log into your Google Account and go to Web & App Activity. Then press the “Choose to delete automatically” button. An overlay will offer three options: “Keep until I delete manually,” “Keep for 18 months then delete automatically,” and “Keep for 3 months then delete automatically.”

Google says that “what you search, read, and watch can work together to help you get things done faster, discover new content, and pick up where you left off,” as an explanation for why you might want to store your data longer.

Google already allowed users to "pause" data collection for Web & App Activity altogether. If you have that enabled, there will be no data for Google to delete, but it still can’t hurt to enable another line of defense.

“Our goal is simple: earn and keep your trust by clearly explaining how our products work and how we’ll uphold our commitment to respect your privacy,” Google says in the commitment statement.

Users will also be able to migrate their Nest accounts into a new or existing Google account so they can have access to Google security features like suspicious activity monitoring and expanded options for two-factor authentication.

Nest already offers two-factor authentication, though, so you can also just make sure you have that turned on if you want to ward off takeovers without linking even more of your life to your Google account.

Wired

You Might Also Read: 

California Passes Its Own GDPR Law:

Get Ready For ePrivacy Regulation:

 

 

« Cyber Security Consultancy
Cyber Threats And Nuclear Weapons Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

Pioneer Search

Pioneer Search

Pioneer Search is a UK based Technology & Change, Electronics Engineering, Cyber Security & Cloud and Data & Analytics Employment Agency.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

Ever Nimble

Ever Nimble

Ever Nimble are award-winning experts in IT support, cybersecurity, and cloud technology. Our proactive approach will enhance your security and protect you from cyber security threats.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Btech

Btech

Btech is the market leader in providing affordable managed IT security services for credit unions.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.

Instil Software

Instil Software

Instil helps technology brands transform, innovate and disrupt their markets with category-defining software products that challenge us to think, feel and act in new ways.