Home > Free Essays > Tech & Engineering > Internet > IT Security in Google
Cite this

IT Security in Google Report

The Google’s New Privacy Policy is just an attempt to ensure high-level security of an individual’s data and improvement in the search field. For instance, the data searches on Google are linked to other websites such as You Tube. This only shows that Google is tracking people’s activities over the internet. At present, people share their contacts across Docs, Gmail, and Calendar. Since the internet has so many players, it requires an all-inclusive approach that will help in maintaining trust from the public. This policy has not violated information sharing to a third party; it simply makes the data available everywhere (Gross & Perez, 2012). In addition, the policy is trying to minimize cyber crime cases by tracking people’s activities over the internet.

Organizations planning to use Google as their communication platform will experience a few challenges, that is, the policy is not meant to share the enterprise’s data with an employee’s data. Markedly, Google cannot detect the connection between a personal account and a user’s work or employment account. These two accounts remain autonomous from each other. On the other hand, organizations that use Google apps should ensure that they renew their contract with Google to avert situations of information leakage to third parties (Gross & Perez, 2012).

Some of the social media services from Google that my employees can use include Google Buzz and Google+. All these products are inbuilt in Gmail. Therefore, they are easily accessible under a single click. The employees must verify their email addresses in order to ensure high-level of privacy. Under Google+, employees will be able to learn how other firms operate in achieving their objectives. The company can opt to block employees’ personal accounts during their working time or within the organization. This policy will enable employees to remain focussed on meeting their goals, as there will be less obstruction at work.

Possible security risks that can emanate when using Google cloud services may prove impossible to control. For instance, the linking of people’s data to all websites will make it easier for cyber criminals or hackers to access these pieces of information at ago. Information storage in the cloud, clearly, allows hackers to delete or alter all information in a person’s accounts. A case example is Mat Honan who hackers got into his email and iCloud account. The hackers erased all back up information in the Cloud, information in his Apple phone, and even deleted his Twitter account (Fogarty, 2012).

The revelation of the illicit affair between former CIA director and Paula Broadwell shows how privacy policy can be used to track down individuals who use the internet to engage wrongful acts. A detailed analysis of this relationship reveals that the two had been using an email with a pseudonym to communicate via drafts, as they could access this email. Broadwell’s attempt to send emails from this Gmail account made the whole affair to become known.

From this point, electronic data can be used as evidence in a court of law even though they are highly prone to distortion (Cyber Forensics, n.d.). Data privacy in this digital era needs info security professionals who ensure that there is no access by third parties. Further, data are always stored in computers as caches or in the internet. Therefore, data exchanges over the internet are easily tracked as history and can be used as evidence against an individual. People should be very cautious with the manner in which they handle their information over the internet.


Cyber Forensics. (n.d.). Cyber Forensics. Web.

Fogarty, K. (2012, August 10). The Biggest Cloud Computing Security Risk Is Impossible to Eliminate. Network Computing. Retrieved from

Gross, G., & Perez, J. C. (2012, February 24). Google: New privacy policy to have little impact on enterprise – Computerworld. Computerworld – IT news, features, blogs, tech reviews, career advice. Retrieved from

This report on IT Security in Google was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.
Removal Request
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda.
Request the removal

Need a custom Report sample written from scratch by
professional specifically for you?

Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar

301 certified writers online

Cite This paper

Select a referencing style:


IvyPanda. (2019, June 13). IT Security in Google. Retrieved from https://ivypanda.com/essays/it-security-in-google/

Work Cited

"IT Security in Google." IvyPanda, 13 June 2019, ivypanda.com/essays/it-security-in-google/.

1. IvyPanda. "IT Security in Google." June 13, 2019. https://ivypanda.com/essays/it-security-in-google/.


IvyPanda. "IT Security in Google." June 13, 2019. https://ivypanda.com/essays/it-security-in-google/.


IvyPanda. 2019. "IT Security in Google." June 13, 2019. https://ivypanda.com/essays/it-security-in-google/.


IvyPanda. (2019) 'IT Security in Google'. 13 June.

More related papers
Pss... Stuck with your
assignment? 😱
Pss... Stuck with your assignment? 😱
Do you need an essay to be done?
What type of assignment 📝 do you need?
How many pages (words) do you need? Let's see if we can help you!