As a developer using Gmail API Services, you often collect and manage Gmail user data. Please keep these key principles in mind:
- Protect privacy: Don't use Gmail user data for prohibited uses, we prohibit third parties from selling user data or using user data for advertising purposes.
- Be transparent: Accurately represent and explain to users what data you will collect, why you will collect it, and how you will use it.
- Be respectful: Honor user requests to delete their data.
- Be secure: Handle all user data securely and demonstrate you adhere to certain security practices.
- Be specific: Don't request access to data that you don't need. All data access should only be to provide the user benefitting features of your application or service.
Gmail API Services User Data Policy
The Google API Services User Data Policy governs the use of all Google API Services when you, the developer, request to access user data. This Gmail API Services User Data and Developer Policy contains additional information that governs your use and access to Gmail APIs when you request to access user data.
The Google APIs Terms of Service, Gmail Program Policies, Gmail Developer Guide, and OAuth 2.0 Policies also govern your use of and access to Gmail APIs and associated Gmail user data. We also require that you comply with all applicable laws and regulations. Google may issue updates or new policies, those also apply and we ask you keep yourself updated on such changes.
Please check back from time to time as these policies are occasionally updated. It is your responsibility to monitor and ensure your compliance with these policies on a regular basis. If, at any time, you cannot meet the requirements of our policies (or if there is a significant risk that you will not be able to meet them), please immediately stop using our services and reach out to us. We reserve the right to remove or restrict access to Google user data if you do not comply with this policy.
More information about the assessment requirements to obtain (or keep) access to Restricted Scopes is available in the OAuth Application Verification FAQ.
Appropriate access to and use of Google Gmail APIs
Only request access to Google Gmail APIs when your application or service meets one of our approved use cases.
Approved use cases for access to restricted Gmail API scopes permissions are:
- Built-in and web email clients that allow users to compose, send, read, and process email via a user interface.
- Applications that automatically backup email
- Applications that enhance the email experience for productivity purposes (such as applications for customer relationship management, delayed sending of email, or mail merge)
- Applications that use information from emails to provide reporting or monitoring services for the benefit of users (such as applications that automate travel itineraries or track flights or package delivery statuses)
The following application types are examples of apps that are not approved to access Gmail restricted API scopes. These include, but are not limited to:
- Mobile keyboards.
- Applications that export email on a one-time or manual basis.
- Applications that store or backup data other than email messages in Gmail.
- Applications that use multiple accounts to abuse Google policies, bypass Gmail account limitations, circumvent filters and spam, or otherwise subvert restrictions.
- Applications that distribute spam or unsolicited commercial mail. For example, applications that send bulk commercial mail, such as customer relationship management, are approved as long as the user consented to receive emails.
Request the minimum relevant permissions
You may only request access to permissions that are critical to implementing your application or service's functionality. This means:
Don't request access to information that you don't need. Only request access to the permissions necessary to implement your application's features or services. If your application does not require access to specific permissions, then you must not request access to these permissions. Don't attempt to "future proof" your access to user data by requesting access to information that might benefit services or features that have not yet been implemented.
Request permissions in context where possible. Only request access to user data in context (via incremental auth) whenever you can, so that users understand why you need the data.
Transparent and accurate notice and control
Applications and services must also request access to user data in context (via incremental auth when possible), so that users better understand what data will be provided, why you need the data, and how the data will be used. In addition to the requirements under applicable law, you must also adhere to the following requirements, which reflect our OAuth 2.0 and Google API Services User Data policies:
- You must provide a disclosure of your data access, collection, use, and
sharing. The disclosure:
- Must accurately represent the identity of the application or service that seeks access to user data;
- Must be within the application itself if application-based or in a separate dialog window if web-based;
- Must be displayed in the normal usage of the application if application-based or website if web-based and not require the user to navigate into a menu or settings;
- Must provide clear and accurate information explaining the types of data being accessed, requested, and/or collected;
- Must explain how the data will be used and/or shared: if you request data for one reason, but the data will also be utilized for a secondary purpose, you must notify users of both use cases;
- Cannot be included with other disclosures unrelated to personal and sensitive data collection.
- Your disclosure must accompany and immediately precede a request for user
consent. You must not begin collection prior to obtaining affirmative
consent. The request for consent:
- Must present the consent dialog in a clear and unambiguous way;
- Must require affirmative user action (for example, tap to accept, tick a check-box, a verbal command, etc.) in order to accept;
- Must not interpret navigation away from the disclosure (including tapping away or pressing the back or home button) as consent; and,
- Must not utilize auto-dismissing or expiring messages.
- You must provide user help documentation that explains how users can manage and delete their data from your app or service.
Limited use of user data
Upon accessing Gmail APIs for an appropriate use, your use of the data obtained must comply with the below requirements. These requirements apply to data derived from both Sensitive and Restricted scopes.
- Limit your use of data to providing or improving your appropriate use case or features that are visible and prominent in the requesting application's user interface.
- Transfers of data are not allowed, except:
- To provide or improve your appropriate use case or user-facing features that are visible and prominent in the requesting application's user interface and only with the user's consent;
- For security purposes (for example, investigating abuse);
- To comply with applicable laws and/or regulations; or,
- As part of a merger, acquisition or sale of assets of the developer after obtaining explicit prior consent from the user.
- Do not allow humans to read user data, unless:
- You have obtained and documented the user's explicit consent to read specific data (for example, helping a user re-access the product or a service after having lost their password);
- The data (including derivations) is aggregated and anonymized and used for internal operations in accordance with applicable privacy and other jurisdictional legal requirements;
- It's necessary for security purposes (for example, investigating abuse); or,
- To comply with applicable laws and/or regulations.
All other transfers, uses, or sale of user data is completely prohibited, including:
- Transferring or selling user data to third parties like advertising platforms, data brokers, or any information resellers.
- Transferring, selling, or using user data for serving ads, including retargeting, personalized or interest-based advertising.
- Transferring, selling, or using user data to determine credit-worthiness or for lending purposes.
Maintain a secure operating environment
Treat all user data securely in transit and at rest. Take reasonable and appropriate steps to protect all applications or systems that make use of the Gmail API and any data derived from it against unauthorized or unlawful access, use, destruction, loss, alteration, or disclosure.
Applications accessing Restricted Scopes must demonstrate that they adhere to certain security practices.
Recommended security practices include implementing and maintaining an Information Security Management System such as outlined in ISO/IEC 27001 and ensuring your application or web service is robust and free from common security issues as set out by the OWASP Top 10.
Required security measures include:
- Using an industry accepted encryption standard to encrypt user data that is:
- Stored on portable devices or portable electronic media;
- Maintained outside of Google's or your systems;
- Transferred across any external network not solely managed by you; and,
- At rest on your systems.
- Transmitting data using secure modern protocols (for example, over HTTPS).
- Keeping user data and credentials, specifically tokens such as OAuth access and refresh tokens, encrypted at rest.
- Ensuring keys and key material are managed appropriately, such as stored in a hardware security module or equivalent-strength key management system.
Required security measures for Restricted Scopes also include following the Cloud Application Security Assessment (CASA). In addition, depending on the API being accessed and number of user grants or users, we may also require that your application or service undergo a periodic security assessment and obtain a Letter of Assessment from a Google-designated third party.
Restricted scopes include any Gmail API scope that permits an application to:
- Read, create, or modify message bodies (including attachments), metadata, or headers; or
- Control mailbox access, email forwarding, or admin settings.
For more details, see the list of Restricted Scopes.