{"id":13586,"date":"2018-09-21T12:28:58","date_gmt":"2018-09-21T12:28:58","guid":{"rendered":"http:\/\/6623f3cc-373e-41a7-a21d-feb287873196"},"modified":"2018-09-21T12:28:58","modified_gmt":"2018-09-21T12:28:58","slug":"google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/","title":{"rendered":"Google to lawmakers: Yep, Gmail data is still open to app developers"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2017\/11\/10\/22ab2e3d-9bd3-42bd-893d-bc2607162f75\/thumbnail\/770x578\/4251efd87ec672033a9d8666d2e30d9b\/gmail.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">Featured stories<\/span><\/h3>\n<\/div>\n<p>Google has responded to questions from senior Republican senators about how it monitors and controls app developers&#8217; access to Gmail content.<\/p>\n<p>The Republican Senate Commerce Committee chairman <a href=\"https:\/\/www.commerce.senate.gov\/public\/_cache\/files\/01e9888e-b6f8-498c-93b7-6057f04d9af5\/7B82248213F1599486A7DEA83E644927.jrt-moran-wicker-letter-to-google-07.10.2018.pdf?mod=article_inline\" target=\"_blank\" rel=\"noopener noreferrer\">fired off a letter to Google<\/a> in July after being alarmed by a <a href=\"https:\/\/www.zdnet.com\/article\/whos-reading-your-gmail-not-us-says-google-and-we-vet-3rd-party-apps-that-do\/\">report<\/a> that it is common for employees of third-party app developers to access Gmail content.<\/p>\n<p>The revelation prompted concerns about whether Google is adequately monitoring misuse of Gmail user data to ensure its users aren&#8217;t exposed in the same way Facebook&#8217;s lack of developer oversight allowed political consultancy Cambridge Analytica to acquire millions of Facebook users&#8217; data through a third-party app developer.<\/p>\n<p>&#8220;Though no allegations of misuse of personal email data akin to the Cambridge Analytica case have surfaced, the reported lack of oversight from Google to ensure that Gmail data is properly safeguarded is a cause for concern,&#8221; they wrote.<\/p>\n<p>The senators asked whether Google was aware of &#8220;any instances of an app developer sharing Gmail user data with a third party for any purpose&#8221;.<\/p>\n<p>Susan Molinari, vice president of Google&#8217;s America public policy and government affairs, <a href=\"https:\/\/thehill.com\/policy\/technology\/407636-google-says-it-continues-to-allow-apps-to-access-gmail-user-data-report\" target=\"_blank\" rel=\"noopener noreferrer\">said<\/a> the company&#8217;s developer policies allow for this type of sharing.<\/p>\n<p>&#8220;Developers may share data with third parties so long as they are transparent with the users about how they are using the data,&#8221; Molinari <a href=\"https:\/\/www.scribd.com\/document\/389081432\/Molinari-Response-to-Thune-Wicker-Moran-Letter-Re-WSJ-Article#from_embed\" target=\"_blank\" rel=\"noopener noreferrer\">wrote<\/a>.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Molinari said developers must gain consent from the user to access their data and must have a privacy policy if they intend on accessing sensitive data detailing how the app interacts with the data. Developers also need to tell users if the app changes how it uses the data.<\/p>\n<p>The senators wanted more answers about Google&#8217;s claim that it reviews and enforces each app&#8217;s compliance with its policies.<\/p>\n<p>Molinari replied that following an approval under Google&#8217;s manual developer verification process, it uses machine learning to monitor approved apps.<\/p>\n<p>&#8220;If we detect significant changes in the behavior of the app after it has been approved, we will once again manually review the app,&#8221; she wrote.<\/p>\n<p>If an app is found to have violated Google&#8217;s terms, it will display an &#8216;unverified app&#8217; warning on it.<\/p>\n<p>These days, Google displays an &#8216;unverified app&#8217; warning for all apps that haven&#8217;t been verified &#8212; a change it introduce after someone last year <a href=\"https:\/\/www.zdnet.com\/article\/gmail-fake-docs-attack-now-google-tightens-oauth-rules-to-block-phishing\/\">tricked millions of Gmail users<\/a> into granting access to a bogus Google Docs apps.<\/p>\n<p>Molinari reiterated Google&#8217;s <a href=\"https:\/\/www.blog.google\/technology\/safety-security\/ensuring-your-security-and-privacy-within-gmail\/\" target=\"_blank\" rel=\"noopener noreferrer\">comments in a July blogpost<\/a> that its employees can read Gmail users&#8217; email content but that it restricts access to cases where a user has given consent, or when it needs to inspect content to investigate a bug or abuse.<\/p>\n<p>She also said Google restricts this type of access to a &#8220;very limited number of individuals&#8221;, requires documentation of when access is granted, and routinely audits access.<\/p>\n<p>A Senate Commerce hearing next Wednesday is expected to be attended by privacy officials from Google, Apple, Twitter, AT&amp;T and Charter Communications.<\/p>\n<h3>Previous and related coverage<\/h3>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/whos-reading-your-gmail-not-us-says-google-and-we-vet-3rd-party-apps-that-do\/\"><strong>Who&#8217;s reading your Gmail? Not us, says Google, and we vet 3rd-party apps that do<\/strong><\/a><\/p>\n<p>Google says it doesn&#8217;t get paid for giving third-party apps access to Gmail and checks them thoroughly.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/gmail-now-lets-you-send-self-destructing-confidential-mode-emails-from-your-phone\/\"><strong>Gmail now lets you send self-destructing &#8216;confidential mode&#8217; emails from your phone<\/strong><\/a><\/p>\n<p>Gmail&#8217;s not entirely confidential &#8216;confidential mode&#8217; expiry-date email feature is now available on mobile apps.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/google-pledges-to-foil-phishing-attacks-with-new-titan-security-key\/\"><strong>Google pledges to foil phishing attacks with new Titan Security Key<\/strong><\/a><\/p>\n<p>If you trust Google, this is the second-factor security key for you.<\/p>\n<p><strong><a href=\"https:\/\/www.techrepublic.com\/article\/gmail-confidential-mode-misleading-users-with-security-claims-eff-says\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gmail Confidential Mode misleading users with security claims, EFF says<\/a> TechRepublic<\/strong><\/p>\n<p>Even though users can set an expiration date for emails, the EFF said that Google can still access the message data.<\/p>\n<p><strong><a href=\"https:\/\/www.cnet.com\/news\/10-percent-of-all-gmails-are-written-by-google-robots\/\" target=\"_blank\" rel=\"noopener noreferrer\">10 percent of all Gmails are written by Google robots<\/a> CNET<\/strong><\/p>\n<p>The Smart Reply feature is apparently catching on.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google says third-party developers can access users&#8217; Gmail, but it manually vets them first and uses machine learning to monitor apps.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":13587,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-13586","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google to lawmakers: Yep, Gmail data is still open to app developers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google to lawmakers: Yep, Gmail data is still open to app developers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-21T12:28:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google to lawmakers: Yep, Gmail data is still open to app developers\",\"datePublished\":\"2018-09-21T12:28:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/\"},\"wordCount\":645,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/\",\"name\":\"Google to lawmakers: Yep, Gmail data is still open to app developers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers.png\",\"datePublished\":\"2018-09-21T12:28:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google to lawmakers: Yep, Gmail data is still open to app developers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google to lawmakers: Yep, Gmail data is still open to app developers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/","og_locale":"en_US","og_type":"article","og_title":"Google to lawmakers: Yep, Gmail data is still open to app developers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-09-21T12:28:58+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google to lawmakers: Yep, Gmail data is still open to app developers","datePublished":"2018-09-21T12:28:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/"},"wordCount":645,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/","url":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/","name":"Google to lawmakers: Yep, Gmail data is still open to app developers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers.png","datePublished":"2018-09-21T12:28:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-to-lawmakers-yep-gmail-data-is-still-open-to-app-developers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Google to lawmakers: Yep, Gmail data is still open to app developers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/13586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=13586"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/13586\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/13587"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=13586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=13586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=13586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}