Evidence export Google Vault allows administrators to have the ability to export speciic— email,—on-the-record—chats—and—iles—to—standard—formats—for—additional— processing and review in a manner that supports legal matters while respecting chain of custody guidelines. Support for third-party email platforms The comprehensive mail storage setting ensures that a copy of all Administrators can enforce sent or received mail in your domain—including mail sent or received policies over mobile devices by non-Gmail mailboxes—is stored in the associated users’ Gmail mailboxes. For organizations that reroute mail to non-Gmail mail in their organization, encrypt servers, this setting also ensures storage of mail in Gmail mailboxes for data on devices, and perform archiving and eDiscovery purposes. actions like remotely wiping or Securing endpoints locking lost or stolen devices. Mobile device management (MDM) Mobile device management in G Suite eliminates the need for on-premises device or third-party management solutions. Administrators can enforce policies over mobile devices in their organization, encrypt data on devices, and perform actions like remotely wiping or locking lost or stolen devices. This type of control helps ensure the security of business data, even if employees choose to work on their personal phones and tablets. Mobile device management in G Suite works with Android, iOS, Windows Phone, and smartphones and tablets using Microsoft Exchange ActiveSync, such as BlackBerry 10. Policy-based Chrome browser security All of the tools and features in G Suite are best supported by Google Chrome. Administrators can apply security and usage policies across Windows, OSX, Linux, iOS, and Android. Chrome’s standard security features include Safe Browsing, sandboxing, and managed updates that protect users from malicious sites, viruses, malware, and phishing attacks. There are also measures in place to prevent cross- site scripting, which attackers can use to steal private data. G Suite administrators can deploy Google Chrome across their organization and customize it to meet their needs. 21

Google Cloud Security and Compliance Whitepaper - Page 25 Google Cloud Security and Compliance Whitepaper Page 24 Page 26