documents indiscriminately. Administrators can also choose to receive alerts when suspicious login activity occurs, indicating a possible security threat. Conclusion Data protection is more The protection of user data is a primary design consideration for all of than just security. Google Google’s infrastructure, applications and personnel operations. Protection of user data is far from being an afterthought or the focus of ofers—strong—contractual— occasional initiatives, it’s an integral part of what we do. We believe that commitments in our Data Google—can—ofer—a—level—of—protection—that—very—few—can—match.— Because protecting your data is part of our core business, Google can Processing Amendment to develop security innovations such as 2-step authentication and stronger make sure our customers encryption methods. We are able to make extensive investments in security,—resources—and—expertise—at—a—scale—that—few—can—aford.—Our—scale—of—maintain control over the operations and collaboration with the security research community enable data and how it is processed, Google to address vulnerabilities quickly or prevent them entirely. Google’s—security—and—operational—procedures—are—veriied—by—independent—including the assurance third-party auditors. that your data in the G Suite Data—protection—is—more—than—just—security,—Google—ofers—strong—contractual—Core Services is used for the commitments in our Data Processing Amendment to make sure our customers maintain control over the data and how it is processed, including purposes—speciied—in—your— the assurance that your data in the G Suite Core Services is used for the agreement, and not used in purposes—speciied—in—your—agreement,—and—not—used—for—advertising.——advertising. For these reasons and more over 5 million organizations across the globe, including 64 percent of the Fortune 500, trust Google with their most valuable asset: their information. Google will continue to invest in security, innovation—to—evolve—our—platform—to—allow—our—users—to—beneit—from—our— services in a secure and transparent manner. 23

Google Cloud Security and Compliance Whitepaper - Page 27 Google Cloud Security and Compliance Whitepaper Page 26