Data processor mode is currently only available for users on managed ChromeOS devices in these countries.
Password Leak Detection provides users with alerts when any potentially compromised password use is detected. This article is intended for administrators and end users who want to learn about what data is collected by Password Leak Detection and how it’s processed by Google.
Related articles
This is an Essential Service under data processor mode and is on by default.
For more information, see How Chrome protects your passwords.
Data processed by this service
Data Type / Category
|
Description
|
Examples
|
Data Subject Rights supporting features
|
---|---|---|---|
The detected password leak information and the password itself | The information about the password leak includes the date when the password leak was detected and if password leak notifications have been sent. The password (stored on Google servers only when Password Sync is enabled) and its leaked information are stored in Chrome Sync. | The date when the password leak was detected, if the leak notification has been sent, date when the leaked password was being used last time, website url where the leaked password was used | See Chrome Sync |
Password leak check logs | The logs capture when password leak check is done for each user and user’s IP addresses. | User Gaia IDs, Users’ IP addresses, password leak detection methods, password leak check results. | — |
Purpose of processing the data
-
Abuse and security threat detection, prevention and protection (such as automatic scanning for and reporting of CSAM, scanning for viruses (to the extent permitted and/or required by applicable EU or EU member state law), phishing, malware and other indicators of security threats, that may affect any of Google’s services).
Google and related marks and logos are trademarks of Google LLC. All other company and product names are trademarks of the companies with which they are associated.