Product Security: G Suite G Suite customers can leverage product features and configurations to further protect personal data against unauthorised or unlawful processing: • 2-step verification greatly reduces the risk of unauthorized access by asking users for additional proof of identity when signing in. Security key enforcement offers another layer of security for user accounts by requiring a physical key. • Suspicious Login Monitoring helps detect suspicious logins using robust machine learning capabilities. • Enhanced email security requires email messages to be signed and encrypted using Secure/ Multipurpose Internet Mail Extensions (S/MIME). • Data loss prevention protects sensitive information within Gmail and Drive from unauthorized sharing. Learn more in our DLP Whitepaper. • Information rights management in Drive allows you to disable downloading, printing, and copying of files from the advanced sharing menu, and to set expiration dates on file access. • Mobile device management offers continuous system monitoring and alerts in case of suspicious device activity. To learn more, please visit this website Product Security: GCP GCP customers can leverage product features and configurations to further protect personal data against unauthorised or unlawful processing: • 2 step verification greatly reduces the risk of unauthorized access by asking users for additional proof of identity when signing in. Security key enforcement offers another layer of security for user accounts by requiring a physical key. • Google Cloud Identity and Access Management (Cloud IAM) allows you to create and manage fine- grained access and modification permissions for Google Cloud Platform resources. • Data Loss Prevention API helps to identify and monitor the processing of special categories of personal data in order to implement adequate controls. • Stackdriver Logging and Stackdriver Monitoring integrate logging, monitoring, alerting, and anomaly detection systems into Google Cloud Platform. • Cloud Identity-Aware Proxy (Cloud IAP) controls access to cloud applications running on Google Cloud Platform. • Cloud Security Scanner scans for and detects common vulnerabilities in Google App Engine applications. To learn more, please visit this website PAGE 6
Google Cloud & GDPR Page 5 Page 7