Data processor mode is currently only available for users on managed ChromeOS devices in these countries.
Location Services on Chromebook estimates a user’s geolocation. This is then used for tasks such as setting timezones, providing websites in the correct language, and alerting users to possible unauthorized log-ins. This article is for administrators and end users who want to learn about what data is collected by Location Services and how it’s processed by Google.
Configurations and related articles
This is an Essential Service under data processor mode and is on by default. You can toggle this service on or off by changing the location permissions in your browser.
For more information, see Understand & manage your location when you search on Chrome.
Data processed by this service
Data is collected for Location Services to provide users with helpful results according to their approximate location.
Data Type / Category
|
Description
|
Examples
|
Data Subject Rights supporting features
|
---|---|---|---|
Transactions of geolocation service being requested by Google products | Usage statistics and web address information | Includes cell tower IDs, wi-fi access points, MAC address, etc. (as applicable) | — |
Transactions of timezone services being requested by Google products | User identification and access control keys | Includes user IP addresses and HTTP header of the request, Apiary API key, or a client ID which identifies the application (but not an end-user) making the request | — |
Purpose of processing the data
- To provide, maintain, and improve the Essential Services.
- To identify, address and fix security threats, risks, bugs and other anomalies.
- To develop, deliver and install updates to the Essential Services subscribed to by Customer (including new functionality related to the Essential Services subscribed to by Customer).
- Improving and optimizing the performance and core functionality of accessibility, privacy, security and IT infrastructure efficiency of the Essential Services.
- Internal reporting, financial reporting, revenue planning, capacity planning and forecast modeling (including product strategy).
- Abuse and security threat detection, prevention and protection (such as automatic scanning for and reporting of CSAM, scanning for viruses (to the extent permitted and/or required by applicable EU or EU member state law), phishing, malware and other indicators of security threats, that may affect any of Google’s services).
Google and related marks and logos are trademarks of Google LLC. All other company and product names are trademarks of the companies with which they are associated.