Data privacy

Google adheres to the U.S. Safe Harbor principles on the protection of privacy.

The privacy principles that are implemented

Google follows 5 principles which dictate its privacy policy:

  1. Use private information only to improve user experience and to design new useful services.
  2. Comply with all applicable laws regarding the protection of privacy. Develop tools that allow users to access and manage their personal information knowingly. The Google Dashboard is a simple web page that groups all the tools needed to manage personal data for each application and service. The details of the privacy rules that apply are summarized on the same page.
  3. Notify a user explicitly when data is collected and explain what kind of use is made of that data.
  4. Never take personal data hostage and allow users to adjust the level of privacy according to their needs.
  5. Manage data in a responsible way by consulting the user and developer communities and by consulting external experts.
    The privacy principles that are implemented

What data is collected?

A detailed description of the use that is made of personal data is provided in a document entitled Privacy Rules.

When Google intends to use personal data for purposes other than those specified in this document, it will seek explicit permission from the user. The user may then choose to refuse such use.

Let's look at the key elements of the Privacy Rules.

Use of personal information

Data such as the username, the password, mail address, or credit card number (in encrypted form, obviously) is collected for the sole purpose of improving the quality of service.

Cookies

C ookies are small files, stored locally on a desktop computer, which contain strings of characters, transmitted by a web server. They are used, for instance, to uniquely identify a user session. Google's goal, here as well, is to improve quality of service by storing for each user his or her preferences or search habits.

Connection data

E ach time a user connects to one of Google's services, data such as the IP address, the type of browser, the language, and the time of day is collected for similar reasons as those previously mentioned.

Geographic location

M obile terminals with a GPS can send geographic data to services like Google Maps. Note however that, if for one reason or another, a user does not want this geographic data to be sent to Google, he or she can simply disable it on the device itself.

Technical means

To ensure strict privacy, data is both encrypted and stored on servers in a non-contiguous manner. For even greater security, file names are randomized. For instance, it is totally impossible to reconstruct all files belonging to one user.

To prevent hacking, the Google security team works in close collaboration with companies specializing in security to continuously optimize its infrastructures. Most of Google's software infrastructure is not standard but was developed specifically by Google for its own purposes. On the software side, each server is equipped with the strict minimum that is necessary to perform the tasks to which it is dedicated.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset