Google Drive API policies

Stay organized with collections Save and categorize content based on your preferences.

As a developer using Google Drive API Services, you often collect and manage Drive user data. Please keep these key principles in mind:

  • Protect privacy: Don't use Drive user data for prohibited uses, we prohibit third parties from selling user data or using user data for advertising purposes.
  • Be transparent: Accurately represent and explain to your users what data you will collect, why you will collect it, and how you will use it.
  • Be respectful: Honor user requests to delete their data.
  • Be secure: Handle all user data securely and demonstrate you adhere to certain security practices.
  • Be specific: Don't request access to data that you don't need. All data access should only be to provide the user benefitting features of your application or service.

Google Drive API Services User Data Policy

The Google API Services User Data Policy governs the use of all Google API Services when you, the developer, request to access user data. This Google Drive API Services User Data Policy contains additional information that governs your use and access to Google Drive APIs when you request to access user data.

The Google APIs Terms of Service, Google Drive API Terms of Service, Google Drive Program Policies, Google Drive Developer Guide, and OAuth 2.0 Policies also govern your use of and access to Google Drive APIs and associated Drive user data. We also require that you comply with all applicable laws and regulations. Google from time to time, may issue updates or new policies, those also apply and we ask you keep yourself updated on such changes.

Please check back from time to time as these policies are occasionally updated. It is your responsibility to monitor and ensure your compliance with these policies on a regular basis. If, at any time, you cannot meet the requirements of our policies (or if there is a significant risk that you will not be able to meet them), please immediately stop using our services and reach out to us. We reserve the right to remove or restrict access to Google user data if you do not comply with this policy.

More information about the assessment requirements to obtain (or keep) access to Restricted Scopes is available in the OAuth Application Verification FAQ.

Appropriate access to and use of Google Drive APIs

Only request access to Google Drive APIs when your application or service meets one of our approved use cases.

Approved use cases for access to restricted Google Drive API scopes permissions are:

  1. Built-in and web apps that provide local sync or automatic backup of users' Drive files.
  2. Productivity and educational applications (such as task management, note taking, workgroup communications, and classroom collaboration applications) that only use Restricted Scopes to handle Drive files (or their metadata or permissions) via the application's user interface.
  3. Reporting and security applications that provide user or customer insight into how files are shared or accessed.

The Google Drive API is not allowed for certain use cases without Google's express prior written consent, including the following:

  • Backup of user or app content from a developer's app or project to Drive.
  • Cryptocurrency mining.
  • Broad video distribution or dissemination of copyrighted content without authorization.
  • Using Drive as a replacement for a large-scale content delivery network (CDN).
  • File cloning tools that enable sharding of user storage and/or circumvention of Drive storage limits.

Request the minimum relevant permissions

You may only request access to permissions that are critical to implementing your application or service's functionality. This means:

Don't request access to information that you don't need. Only request access to the permissions necessary to implement your application's features or services. If your application does not require access to specific permissions, then you must not request access to these permissions. Don't attempt to "future proof" your access to user data by requesting access to information that might benefit services or features that have not yet been implemented.

Request permissions in context where possible. Only request access to user data in context (via incremental auth) whenever you can, so that users understand why you need the data.

Be transparent about the data you access with clear and prominent privacy disclosures

You need to have a privacy policy that discloses how your application or web service collects, uses, and shares user data. This includes the types of parties to which any user data is shared, how you use the data, how you store and secure the data, and what happens to the data when an account is deactivated and/or deleted.

Applications and services must also request access to user data in context (via incremental auth when possible), so that users better understand what data will be provided, why you need the data, and how the data will be used. In addition to the requirements under applicable law, you must also adhere to the following requirements, which reflect our OAuth 2.0 and Google API Services User Data policies:

  1. You must provide a disclosure of your data access, collection, use, and sharing. The disclosure:
    1. Must accurately represent the identity of the application or service that seeks access to user data;
    2. Must be within the application itself if application-based or in a separate dialog window if web-based;
    3. Must be displayed in the normal usage of the application if application-based or website if web-based and not require the user to navigate into a menu or settings;
    4. Must provide clear and accurate information explaining the types of data being accessed, requested, and/or collected;
    5. Must explain how the data will be used and/or shared: if you request data for one reason, but the data will also be utilized for a secondary purpose, you must notify users of both use cases;
    6. Cannot be placed only in a privacy policy or terms of service; and,
    7. Cannot be included with other disclosures unrelated to personal and sensitive data collection.
  2. Your disclosure must accompany and immediately precede a request for user consent. You must not begin collection prior to obtaining affirmative consent. The request for consent:
    1. Must present the consent dialog in a clear and unambiguous way;
    2. Must require affirmative user action (for example, tap to accept, tick a check-box, a verbal command, etc.) in order to accept;
    3. Must not interpret navigation away from the disclosure (including tapping away or pressing the back or home button) as consent; and,
    4. Must not utilize auto-dismissing or expiring messages.
  3. You must provide user help documentation that explains how users can manage and delete their data from your app or service.

Limited use of user data

Upon accessing Google Drive APIs for an appropriate use, your use of the data obtained must comply with the below requirements. These requirements apply to data derived from both Sensitive and Restricted scopes.

  1. Limit your use of data to providing or improving your appropriate use case or features that are visible and prominent in the requesting application's user interface.
  2. Transfers of data are not allowed, except:
    1. To provide or improve your appropriate use case or user-facing features that are visible and prominent in the requesting application's user interface and only with the user's consent;
    2. For security purposes (for example, investigating abuse);
    3. To comply with applicable laws; or,
    4. As part of a merger, acquisition or sale of assets of the developer after obtaining explicit prior consent from the user.
  3. Do not allow humans to read user data, unless:
    1. You have obtained and documented the user's explicit consent to read specific data (for example, helping a user re-access the product or a service after having lost their password);
    2. The data (including derivations) is aggregated and anonymized and used for internal operations in accordance with applicable privacy and other jurisdictional legal requirements;
    3. It's necessary for security purposes (for example, investigating abuse); or,
    4. To comply with applicable laws.

All other transfers, uses, or sale of user data is completely prohibited, including:

  1. Transferring or selling user data to third parties like advertising platforms, data brokers, or any information resellers.
  2. Transferring, selling, or using user data for serving ads, including retargeting, personalized or interest-based advertising.
  3. Transferring, selling, or using user data to determine credit-worthiness or for lending purposes.

An affirmative statement that your use of the data complies with the Limited Use restrictions must be disclosed in your application or on a website belonging to your web-service or application; for example, a link on a homepage to a dedicated page or privacy policy noting: "The use of information received from Google Drive APIs will adhere to the Google User Data Policy, including the Limited Use requirements."

Maintain a secure operating environment

We expect all user data is secure in transit and at rest. Take reasonable and appropriate steps to protect all applications or systems that make use of the Google Drive API and any data derived from it against unauthorized or unlawful access, use, destruction, loss, alteration, or disclosure.

Applications accessing permissions must demonstrate that they adhere to certain security practices.

Recommended security practices include implementing and maintaining an Information Security Management System such as outlined in ISO/IEC 27001 and ensuring your application or web service is robust and free from common security issues as set out by the OWASP Top 10.

Required security measures include:

  1. Using an industry accepted encryption standard to encrypt user data that is:
    1. Stored on portable devices or portable electronic media;
    2. Maintained outside of Google's or your systems;
    3. Transferred across any external network not solely managed by you; and,
    4. At rest on your systems.
  2. Transmitting data using secure modern protocols (for example, over HTTPS).
  3. Keeping user data and credentials, specifically tokens such as OAuth access and refresh tokens, encrypted at rest.
  4. Ensuring keys and key material are managed appropriately, such as stored in a hardware security module or equivalent-strength key management system.

Required security measures for Restricted Scopes include following the Cloud Application Security Assessment (CASA). In addition, depending on the API being accessed and number of user grants or users, we will also require that your application or service undergo a periodic security assessment and obtain a Letter of Assessment from a Google-designated third party.

You agree to promptly notify Google at security@google.com of any known or suspected unauthorized access to your systems, networks, accounts, or other locations where Google Data is stored ("Security Breach"). You agree to cooperate fully with Google to correct any known or suspected Security Breach, and in any such event, to notify Google at security@google.com before you make any public statements regarding any known or suspected Security Breach.

Restricted scopes

Restricted scopes include:

  1. Any Google Drive API scope that permits an application to read, modify, or manage the content or metadata of a user's Drive files, without the user individually granting file-by-file access.

For more details, see the list of Restricted Scopes.