Control who and what can access your data
You are your best protector. Make sure you know who and what can access your data.
Features are subject to availability. The steps may look different depending on your device.
Appropriate security
When setting up security, it’s important to match the strength of your security measures to the value you’re protecting.
Your Google Account has built-in security tools optimized for the potential risk of any action. Setting up your account properly and adding authentication steps will ensure Google can provide you with the highest level of security.
In the same way that an expensive necklace might be kept in a hidden, locked safe, adding security measures increases the protection of your sensitive information. Additional security steps may add a few seconds when logging in, but will greatly increase the safety of your data.
Privacy
Security measures provide privacy from the prying eyes of bad actors who want to access your personal data. However, “privacy” also refers to how you share data with Google, in order to personalize your experience.
Account settings provide you as much transparency as possible over what data you share with Google. You can always adjust your privacy settings.
Managing your data
You can control what data is saved by Google, and delete data from your account any time.
Sites like takeout.google.com, where you can export a copy of your data, and myactivity.google.com, where you can view and delete your activity, give you the tools to manage your information.
Know your weak points
If you use your Google Account with any third-party applications, you can keep a close eye on what access they have to your data, you can review their level of access to your data and the actions they can take. Third-party products to be aware of include web browser extensions and apps with access to data on your device.
Managing third-party apps or services that have access to your Google Account can be done easily from your Security page at myaccount.google.com.
Learn more about how to review and revoke third-party access.
Related lessons
Learn the basics of online security
Learn about "authentication", what it means for your safety, and the inherent balance between accessing your account easily and keeping security tight enough to keep hijackers out.
Begin lessonGet to know common security threats
Get to know the most common types of security threats, and how you can avoid them.
Begin lessonDevice prompts and sign-in challenges
Google will sometimes use prompts during sign-in to verify your identity. Learn why this happens and what you can expect.
Begin lesson