Google Workspace user
- Users can paste to and from any Workspace app, but not to any other website.
- You enforce the use of the electronic privacy screen and block taking screenshots or printing for work.
- When a user tries to share their screen for work, it is reported back to the admin.
Rule: Safeguard Workspace by locking down corporate email and docs
Set URLs and destinations
- Source urls: mail.google.com, docs.google.com
- Destination urls: *
Note: * also includes URLs opened in an Incognito window - Other destinations: Play apps and Files, Linux, Parallels, and OneDrive
Set actions
- Copy and paste: Block
- Electronic privacy screen: Enforce
- Printing: Block
- Screencast: Report
- Screenshot: Block
- Files: Block
Rule: Enable clipboard within Workspace
Set URLs and destinations
- Source urls: mail.google.com, docs.google.com
- Destination urls: mail.google.com, docs.google.com
Set actions
- Copy and paste: Allow
- Electronic privacy screen: No policy set
- Printing: No policy set
- Screencast: No policy set
- Screenshot: No policy set
- Files: No policy set
VDI and Gmail users
Users are allowed to copy information from a Virtual desktop infrastructure (VDI) to a corporate GMail account. This helps to protect the privacy of patient data in hospitals.
Rule: Safeguard VDI by locking down GMail and VDI
Set URLs and destinations
- Source urls: mail.google.com, chrome-extension//[vdi app id]
- Destination urls: *
- Other destinations: Play apps and Files, Linux, Parallels, and OneDrive
Set actions
- Copy and paste: Block
- Electronic privacy screen: Enforce
- Printing: Block
- Screencast: Report
- Screenshot: Block
- Files: Block
Rule: Enable clipboard between GMail and VDI
Set URLs and destinations
- Source urls: mail.google.com, chrome-extension//[vdi app id]
- Destination urls: mail.google.com, chrome-extension//[vdi app id]
Set actions
- Copy and paste: Allow
- Electronic privacy screen: No policy set
- Printing: No policy set
- Screencast: No policy set
- Files: No policy set