Gmail confirms private Gmail messages can be read by third parties
Google reassures users it's secure and within their best interests
Google has responded to The Wall Street Journal highlighting how common it is for third-party developers to view user Gmail messages.
The publication had previously reported that Google has a "dirty secret" by allowing developers to sift through Gmail due to users granting permission for third parties to do so.
Google said it makes it possible for applications from other developers to integrate with Gmail, such as email clients, trip planners and customer relationship management systems so that users have options around how they access and use email.
As a result of this, private messages in Gmail can be read not only by third-party systems but also by humans not intended to be the recipients of such emails.
The search giant stressed that it continuously works to vet developers and their apps that integrate with Gmail before it opens up them for general access. It said it also provides both enterprise admins and individual consumers transparency and control over how their data is used.
"A vibrant ecosystem of non-Google apps gives you choice and helps you get the most out of your email," said Suzanne Frey, Google Cloud's director of security, trust and privacy.
In order to pass Google's review process, non-Google apps must meet two key requirements. Firstly, apps should not misrepresent their identity and must be clear about how they are using your data and secondly, they must only request relevant data they need for their specific function, nothing more, and be clear about how they are using it.
The WSJ story did not unearth any wrongdoing from third-party apps or services using Gmail, but it has shone a light on a previously discreet industry practice that is under heavier scrutiny since Facebook's Cambridge Analytica data privacy scandal.
Google is now taking steps to actively defend its own data management and user privacy practices to convince users and businesses that is a responsible steward of sensitive user data.
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now