Data processor mode is currently only available for users on managed ChromeOS devices in these countries.
The Google Tasks Integration syncs users’ Google Tasks lists across their ChromeOS devices, allowing them to add, edit and mark important to-dos as complete, when and where it’s convenient. This article is for administrators and end users who want to learn about what data is collected by the Tasks Integration and how it’s processed by Google.
Configurations and related articles
This is an Essential Service under data processor mode and is on by default.
For more information, see Set the date, time & find your calendar..
Data processed by this service
Data Type / Category
|
Description
|
Examples
|
Data Subject Rights supporting features
|
---|---|---|---|
User identifier keyed tasks and task lists | Signed-in user identifier keyed tasks and task lists with details e.g. title, task status (completed, deleted). | Task ID, task list ID, task completion status, deletion status, task title, task list title. | Takeout Customer Data, Delete User Data |
User identifier keyed operations | For every edit sent to the service, the operations are temporarily stored to correctly apply task editing actions when multiple edits are applied by a user. |
Timestamp, user ID. Whether a task was created, deleted or modified. Task title after a change. Which task fields have been changed by a user. |
Download Service Data |
Per-request service metadata logs | For each request to use the service, usage of the service is logged, e.g. what type of changes have been made if any, properties of the task(s) being changed, timestamp of when the task was updated, user ID making the change. |
Timestamp, user ID. Whether a task's title or its description has changed. Whether a task was created, deleted or modified. List of task fields that are set when a task is created/deleted. |
Download Service Data |
Purpose of processing the data
- To provide, maintain, and improve the Essential Services.
- To identify, address and fix security threats, risks, bugs and other anomalies.
- Improving and optimizing the performance and core functionality of accessibility, privacy, security and IT infrastructure efficiency of the Essential Services.
- Abuse and security threat detection, prevention and protection (such as automatic scanning for and reporting of CSAM, scanning for viruses (to the extent permitted and/or required by applicable EU or EU member state law), phishing, malware and other indicators of security threats, that may affect any of Google’s services).
- Complying with legal obligations.
Google and related marks and logos are trademarks of Google LLC. All other company and product names are trademarks of the companies with which they are associated.