Security & Privacy

Statement From Google:
Two of the most common topics of questions regarding Google in general, and Google Apps specifically, are security and privacy. We take both topics very seriously and truly believe that our offerings are a great option for customers on both fronts. Our business is built on our users' trust: trust in our ability to properly secure their data and our commitment respect the privacy of the information they place in our systems by not giving that information to others or using it inappropriately.

In order to help answer some of the many questions we receive and to dispel some common misconceptions we encounter; we have created this FAQ and the corresponding Google Apps security whitepaper. We hope this helps to answer some of your questions about Google's position on these important issues!


  • Who owns the data I put into your system?
    To put it simply, Google does not own your data. We do not take a position on whether the data belongs to the institution signing up for Apps, or the individual user (that's between the two of you), but we know it doesn't belong to us! The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things. We won't share your data with others except as noted in our Privacy Policy. We keep your data as long as you require us to keep it. Finally, you should be able to take your data with you if you choose to use external services in conjunction with Google Apps or stop using our services altogether.
  • Are Google employees reading my emails and looking at my documents?
    Absolutely not. Google employees are not reading your email or other content.
  • Does Google give third parties access to my data?
    Google does not share or reveal private user content such as email or personal information with third parties except as required by law, on request by a user or system administrator, or to protect our systems. These exceptions include requests by users that Google's support staff access their email messages in order to diagnose problems; when Google is required by law to do so; and when we are compelled to disclose personal information because we reasonably believe it's necessary in order to protect the rights, property or safety of Google, its users and the public. For full details, please refer to the "Information Sharing" section of our Privacy Policy.
  • What kind of scanning/indexing of user data is done?
    User content is scanned and indexed in many cases. We scan the contents in order to provide a variety of services, such as spam filtering and virus detection. We also use this technology to display ads to users in some circumstances. Information from scanning is not shared with third parties. We also index some user data, such as email messages and documents, in order to provide the quality search across your content that you have come to expect from Google. This process is completely automated, involves no human interaction, the index is not part of the general index and it is not shared with any other users.
  • Where is the data stored?
    Locations of Google data centers are kept private and the buildings themselves are kept discrete for security. Access to data centers is very limited to only select Google employees. There is no guarantee which data center will house the data. Google does this to ensure that we can best handle security, scalability, usage spikes, and redundancy.
  • How long does Google keep my data?
    We believe that you should have control over your data. Google keeps multiple backup copies of users content so that we can recover data and restore accounts in case of errors or system failure. When you ask us to delete messages and content, we will make reasonable efforts to remove deleted information from our systems as quickly as is practicable.
  • How does Google handle law enforcement requests?
    Google complies with valid legal processes seeking account information, such as search warrants, court orders, or subpoenas.  We attempt to notify users before turning over their data whenever possible and legally permissible.
  • I am outside the United States and need to comply with the European Commission Directive on Data Protection. Am I safe using Google's services?
    Yes, Google is a member of the EU Safe Harbor program.  The safe harbor -- approved by the EU in 2000 -- is an important way for U.S. companies to avoid experiencing interruptions in their business dealings with the EU or facing prosecution by European authorities under European privacy laws. By certifying safe harbor, Google has assured EU organizations that Google provides "adequate" privacy protection for you your data, as defined by the Directive.
  • Where can I find more information on Google's Privacy Policy?
    All of our Privacy Policies are online and can be found here:  We have a general privacy policy, and then statements for each application.


  • Is my data safe from your other customers when it is running on the same servers?
    Yes. Data is virtually protected as if it were on its own server. Your competitors cannot access your data, and vice versa. In fact, all user accounts are protected via this virtual lock and key that ensures that one user cannot see another user's data. This is similar to how customer data is segmented in other shared infrastructures such as online banking applications.
  • How do you protect your infrastructure against hackers and other threats?
    Google, being one of the world's largest providers of web-based services has gone to great lengths to protect against threats.Google runs its data centers using custom hardware running a custom OS and filesystem.  Each of these systems has been optimized for security and performance. The Google Security Team is working with external parties to constantly test and enhance security infrastructure to ensure it is impervious to external attackers.  And because Google controls the entire stack running our systems, we are able to quickly respond to any threats or weaknesses that may emerge.
  • How do you prevent and resolve security flaws in your applications?
    Google products and services are required to go through security review as part of the launch process. If a security flaw is found in an application or infrastructure component, the security team is called on to resolve the issue. Because we are hosting the applications in our data centers, we can quickly deploy these fixes to all our systems without requiring any action on your part.
  • How do you protect against machine failures or natural disaster?
    The application and network architecture run by Google is designed for maximum reliability and uptime. Google's computing platform assumes ongoing hardware failure, and robust software fail-over withstands this disruption. All Google systems are inherently redundant by design, and each subsystem is not dependent on any particular physical or logical server for ongoing operation. Data is replicated multiple times across Google's clustered active servers, so, in the case of a machine failure, data will still be accessible through another system. We also replicate data to secondary data centers to ensure safety from data center failures.
  • Is it safe to access my data over the internet?
    All Google Apps services provide the ability to access all data using encryption and customers can choose to require this option for their users. This helps ensure that no one except the user has access to his or her data. This is true for access to our mail, calendar, and chat data via our web applications. The mobile email client also uses encrypted access to ensure the privacy of communications. We do not offer encryption on the Start Page service at this time. We also require encryption for access to your mail data by third party clients.
  • How do you protect me against spam, viruses and phishing attacks?
    Google has one of the best spam blockers in the business, and it's integrated into Google Apps. Spam is purged every 30 days. We have built in virus checking, and we enforce checking of documents before allowing a user to download any message. Most computer viruses are contained in executable files, so standard virus detectors scan messages for executable files that appear to be viruses. Google blocks viruses in the most direct possible way: by not allowing users to receive executable files (such as files ending in .exe) that could contain damaging executable code; even if they are sent in a compressed (.zip, .tar, .tgz, .taz, .z, .gz) format.