Government and public sector organizations manage data across disparate sources and modalities. Google Cloud Platform’s and Google Workspace’s world-class security capabilities can help you meet your organization’s technical needs. And our certifications, technical capabilities, guidance documents, and legal commitments support your compliance.Read guide
How Google Cloud enables your compliance
Security & privacy
Google Cloud is committed to protecting our customers’ privacy and security needs. Our data processing terms for Google Workspace and GCP articulate how we help you meet your specific compliance requirements.
We automatically encrypt your data both in transit outside of physical boundaries not controlled by Google and at rest by default and provide numerous ways for you to control your own encryption keys and data access.
Google Cloud services are available in multiple locations worldwide. For select services and for data at rest, choose which facilities best meet your specific latency, availability, and durability requirements.
Google’s industry-leading data security practices specify a rigorous process for dealing with any incident that might impact your data’s confidentiality, integrity, or availability.
Depending on the service, your organization can securely download a copy of its data from Google Workspace or Google Cloud.
Data confidentiality is a priority at Google Cloud. Our products undergo regular third-party audits to ensure we maintain industry-leading certifications and protections.
Google Workspace and GCP undergo several independent third-party audits on a regular basis to ensure that we can assist with your compliance journey. Here are some of the relevant standards, regulations, and certifications that we support or are certified against.
Work with Google
Tell us about your business, and our experts will help you build the right solution for your needs.
Work with a partner
Choose one of our global partners to integrate our services with your current security operations, add functionality and specific expertise in data protection, identity and user protection, infrastructure security, scanning, monitoring, logging, and more.