All requests for a user’s venue and identity.
Truthfully explain the primary reason for requesting individual data or apply account connecting
You have to obviously and truthfully divulge the legitimate busine reason behind asking for consumer information including email, phone number, date of delivery, gender or personal tastes. If you work with the Permiions API you have to divulge this inside “context” area in corresponding technique.
Behavior is prohibited from requesting the subsequent data via the conversational software (text, image or address) in every scenarios.
Installment or financial facts
Instances: credit score rating and bank-account figures. Consider the economic treatments rules.
Verification facts
Instances: for example full or partial pawords or PINs.
Identification information
Advice: paport amounts, state ID quantity, public protection quantity, vehicle operators licenses amounts or income tax IDs.
Medical phrendly free app care information
Sensitive And Painful Personal Information
Examples: asking for a person’s ethnicity, political association, intimate positioning, or spiritual association.
Account back linking and identification
You may use Google Sign-In and/or the membership Linking API with OAuth 2 to generate a match up between a yahoo individual and an existing non-Google membership on the system. Whenever implementing levels connecting making use of OAuth, you have to posses your own OAuth endpoint or have power over it with an OAuth firm. Try not to render URLs from personality suppliers right in your measures on Google arrangement. Just one OAuth config per Action bundle is actually allowed.
Avoid using any approach to aociate a Google individual with a free account in your program, such as making use of an aociation from another activity participating in levels connecting, or asking for an email or telephone number. If you promote numerous steps demanding levels linking, each actions must independently utilize the membership Linking API — with the configuration defined for the respective actions bundle — to aociate the yahoo consumer using the existing account.
Should you begin accounts connecting mid-conversation, then ahead of triggering the membership connecting proce you must describe the reason you are compelling an individual to connect their particular accounts.
You should not need any OAuth range from Google unle the user try signing directly into your own services making use of Bing Sign-In. Never convince consumers to say yes to extra Google OAuth scopes by leading these to a site or actions.
If Bing struggles to test and experiment the Action’s account linking capacity, it won’t be recommended. This may involve steps offering incorrect credentials for assessment, or neglect to keep their particular credentials upgraded.
Harmful conduct
We do not allow Actions that steal data, covertly keep track of or damage users or which happen to be usually destructive.
We do not enable Actions that restrict, interrupt, problems, or acce in an unauthorized way an individual’s tool and other systems, computers, machines, systems, application development connects (APIs), or providers. This consists of different steps, any Google service, in addition to tool’s circle.
All steps that collect consumer facts must adhere to the consumer facts coverage and totally divulge their unique performance.
The following are clearly forbidden:
- Trojans, trojan horses, spyware, malware, and just about every other destructive software.
- Providing or assisting the distribution or installing of destructive computer software.
- Introducing or exploiting security vulnerabilities.
- Stealing a person’s authentication info (instance usernames or pawords).
- Fooling customers into revealing private or authentication facts.
- Showing the Action have closed or exited, but continuing to capture an individual.
- Operating more Actions without the owner’s earlier consent.
- Privately collecting unit use.
Behavior in addition to their listings on the index mustn’t offer any ways to trigger or acce efficiency that violate these terms.
Security weaknesses
In the event your actions are aociated with a security vulnerability that might be abused to damage another activity, program, device, or services, we possibly may remove it to guard users.
Data feeds
Should you decide incorporate us with catalogs, menus, and other facts via a facts feed or other mechanism, the data must comply with these guidelines, like the sections on restricted articles and mental home. You need to properly put into action all technical criteria and provide content material regarding required fields. The information offered must be strongly related the use circumstances of feed and accurate. We might disable the feed (or some of it), disable utilization of the facts, or eliminate any related activities for violations of these policies or if perhaps they generate an unhealthy user experience.
Monetization and ads
No in-conversation adverts were authorized.
Marketing
We don’t allow activities that straight or ultimately participate in or reap the benefits of advertising methods that are deceitful or bad for users or perhaps the developer ecosystem. Including Actions that practice here behavior:
- Utilizing deceptive advertisements on websites, measures, or other attributes, including notifications that are just like program notifications and notifications.
- Manipulating or inflating use research, and items scores, positioning or recommendations.
- Marketing or wedding techniques that redirect users to obtain programs or cause some other Actions without updated consumer motion.
- Engaging in unwanted advertisement via SMS treatments.
- Offering payment for using steps, including funds, digital or physical products.
Truly the duty to make sure that any advertisement sites or associates aociated with your activity follow these procedures plus don’t employ any forbidden promotion methods.
Transactions
All behavior must follow these demands:
- Don’t exprely immediate people to a site, contact number, cellular application or alternate cost method to conduct an exchange, whether in the actions via backlinks or tip chips, or perhaps in the experience information. For example, don’t tell a person to go to an internet site ., actions, or real venue (or incorporate a linkout chip) with a call to actions to checkout or shell out. This regulation doesn’t apply to software behavior.
- When your motion makes it possible for users to perform a physical products or solutions purchase, or make a reservation or scheduling, it should put into action the purchases API for Aistant. Adding what to a basket isn’t thought about a transaction.
- In the event the steps enables people to perform an electronic digital purchase or purchase a registration, it must implement the online buy API.
Here shopping and purchases (any agreement between a user and a busine to meet a beneficial or services) is supported on measures on Google:
Bodily goods or providers including:
- Buy or purchase of physical goods (like market, apparel, housewares)
- Acquisition of real solutions (such vehicle solutions, cleansing services, air travel, edibles shipment, seats for alive activities)
- Reservations and reservations (eg rooms in hotels)
- Top-up providers
Online products or providers such as:
- Purchase of electronic goods (such virtual currencies, further physical lives, extra playtime, and unique products)
- Registration service (instance fitne, internet dating, knowledge and material subscription treatments)
- Acce to actions efficiency featuring (instance content material or solutions)
Currently, behavior on Google dont support funds transfers in one consumer to another, either immediately or via a licensed cash transmitter or contributions to altruistic or governmental entities. This regulation doesn’t apply to software steps.
Leave a Reply
Want to join the discussion?Feel free to contribute!