Google Tips for Securing Gmail Privacy



[ad_1]

The protection of security and privacy in Gmail is a priority for Google, which seeks to protect users against malicious or deceptive applications

This is reported by the company, which has provided clarification and advice after the "noise" that has erupted since yesterday because of the revelation that sometimes third parties can read the emails of users.

As for the substance, Google does not deny that this is the case, but on the one hand I badure it has a process of filtering and control, and invites the users to be more cautious when they allow applications to access their data.

The company claims that it allows applications that have been created by other developers, for example Gmail integration of mail client applications, travel agents and CRM – for users to have options allowing them to access and use their email.

Google badures that it is constantly trying to control and evaluate developers and their applications built into Gmail before giving them generic access, and also provides business administrators and individuals with transparency and transparency. control

The company invites users to view the "Security Scan" of their account to verify which licenses they have licensed to applications other than Google and, if they wish, to

Google states "There is a whole ecosystem and living non-Google applications that gives you the choice and helps you get the most out of your emails. However, before an application does not exist, it does not help." Not belonging to Google can access your Gmail messages, it goes through an examination process including automatic and manual evaluations of its developer, an evaluation of the privacy rules and the payment of the fees. ge. home, in order to ensure that it is a legitimate implementation, as well as a test of its functions, so it is also certain that it works as it should. "

To pbad these tests According to the company, applications that do not belong to Google must meet two basic requirements:

· Applications should not distort their identity, but be clear about the how they use the user data They should not appear as something specific by doing something else It is always necessary to provide clear and visible information on the protection of the privacy of users [19659003] Applications should only ask for the data they need for their particular function and leave no doubt about their usage 19659003] "We control all non-Google applications to make sure they continue to respond to our policies and, if they do not, delete them, "said the company.

It also notes that the user they can control their data, because before an application not owned by Google can access user data, users see an approval page that indicates the type of data accessible application and how it can be used. Users must always check the corresponding image before giving access to their data to an application other than Google

Source: RES MP

[ad_2]
Source link