Have you accepted our GDPR-updated Data Processing Amendment for G Suite and Data Processing and Security Terms for Google Cloud Platform? If not, read the instructions or watch this video for G Suite and read the instructions here for Google Cloud Platform.

Relevant Products & Services

Explore some of our product capabilities and services that may assist in your GDPR compliance plan.

GCP

2-Step Verification|Security Key Enforcement

Prevent abuse, unauthorized access, or transfer of data by implementing 2-step verification, which greatly reduces the risk of unauthorized access by asking users for additional proof of identity when signing in. Security key enforcement also offers another layer of security for user accounts by requiring a physical key.

Data Loss Prevention API

Our DLP API discovers, classifies, and de-identifies your data to help meet the principles of data protection by design and by default.

Stackdriver Logging|Stackdriver Monitoring

Logging, monitoring, alerting, and anomaly detection systems are integrated into Google Cloud Platform and give you the information necessary to assist with your GDPR needs.

Access Transparency

We provide you with near real-time logs when Google Cloud Platform administrators access your content.

Cloud Security Scanner

We scan for and detect common vulnerabilities in Google App Engine applications to prevent potential threats to the ongoing confidentiality, integrity, availability, and resilience of your applications.

Cloud Security Command Center

View and monitor an inventory of your cloud assets, scan storage systems for sensitive data, detect common web vulnerabilities, and review access rights to your critical resources from a single, centralized dashboard.

G Suite

2-Step Verification|Security Key Enforcement

Add an extra layer of security to your users’ managed Google accounts by implementing 2-step verification, which greatly reduces the risk of unauthorized access by asking users for additional proof of identity when signing in. With security key enforcement, you add the security of 2-step verification without users needing to re-type codes from their phones.

Suspicious Login Monitoring

We help prevent and protect against unauthorized access by detecting suspicious logins using robust machine learning capabilities.

Enhanced Email Security

Require email messages to be signed and encrypted using Secure/Multipurpose Internet Mail Extensions (S/MIME), ensuring appropriate security, confidentiality, and integrity of personal data.

Data Loss Prevention

DLP protects sensitive information within Gmail and Drive from unauthorized sharing.

Mobile Device Management

Continuous system monitoring and alerts in case of suspicious device activity help maintain the ongoing confidentiality, integrity, and availability of your data.