All demands for a person’s venue and identity.

All demands for a person’s venue and identity.

Truthfully explain the cause of asking for user data or implement levels linking

You need to plainly and precisely reveal the genuine busine basis for asking for consumer data such as email, telephone number, date of delivery, sex or private choice. If you work with the Permiions API it is vital that you divulge this in the “context” area in the matching approach.

Measures is prohibited from asking for the following information through the conversational screen (text, graphics or address) in every scenarios.

Installment or economic facts

Examples: credit and banking account rates. Reference the monetary treatments policy.

Verification data

Advice: this consists of full or partial pawords or PINs.

Identification facts

Instances: paport amounts, National ID quantity, personal protection amounts, vehicle operators licenses quantity or Tax IDs.

Health care data

Sensitive Personal Data

Examples: asking for an individual’s ethnicity, governmental association, sexual positioning, or religious association.

Levels connecting and identification

You might use Bing Sign-In and/or the Account back linking API with OAuth 2 generate a connection between a Bing user and a current non-Google accounts in your program. When applying profile linking using OAuth, you should run their OAuth endpoint or bring power over it with an OAuth vendor. Don’t offer URLs from identification suppliers right inside steps online setting. One OAuth config per Action bundle are allowed.

Don’t use any other solution to aociate a Google user with an account on the system, including using an aociation from another activity doing accounts linking, or requesting a contact or contact number. If your promote several activities demanding levels connecting, each Action must by themselves use the Account connecting API — using the setup defined in particular activity bundle — to aociate the yahoo individual utilizing the current account.

If you initiate account linking mid-conversation, after that just before triggering the account connecting proce it is vital that you explain the reason you are prompting the user to connect their account.

You shouldn’t ask any OAuth extent from Bing unle the consumer is actually finalizing into the services making use of yahoo Sign-In. Never motivate consumers to accept further Bing OAuth scopes by pointing these to a webpage or activity.

If Google cannot review and check the Action’s account linking ability, it will not be accepted. For example steps that provides incorrect credentials for evaluating, or don’t keep their unique credentials up-to-date.

Malicious behavior

We don’t allow steps that steal facts, secretly watch or hurt users or which are or else harmful.

Do not enable activities that hinder, affect, harm, or acce in an unauthorized means the user’s device or other equipment, personal computers, hosts, networks, software development interfaces (APIs), or solutions. For example additional steps, any Google provider, in addition to device’s network.

All measures that collect consumer information must conform to an individual facts coverage and completely reveal their unique functions.

The following are clearly restricted:

  • Trojans, trojan horses, malware, malware, and every other harmful computer software.
  • Advertising or assisting the circulation or installing of harmful pc software.
  • Introducing or exploiting protection vulnerabilities.
  • Taking a user’s verification info (eg usernames or pawords).
  • Deceiving consumers into revealing personal or verification ideas.
  • Indicating the Action possess shut or exited, but continuing to report the user.
  • Working different measures without any user’s previous consent.
  • Privately collecting unit practices.

Measures as well as their listings throughout the Directory should never provide any ways to stimulate or acce efficiency that break these terms and conditions.

Protection vulnerabilities

In the event your actions is aociated with a protection vulnerability that would be exploited to compromise another Action, software, unit, or service, we might remove it to safeguard people.

Data feeds

Should you decide offer you with catalogs, menus, and other facts via a data feed or other procedure, the information must follow these policies, like the sections on Prohibited material and mental homes. You need to properly apply all technical specifications and provide contents for several needed areas. The information provided must be strongly related the use case of feed and precise. We might disable the feed (or a percentage from it), disable utilization of the information, or pull any associated behavior for violations of the policies or if perhaps they generate a poor user experience.

Monetization and advertisements

No in-conversation advertising are allowed.

Publicity

We don’t allow behavior that right or ultimately engage in or benefit from promotional tactics being misleading or damaging to users or the designer environment. This consists of activities that practice the next attitude:

  • Making use of misleading adverts on websites online, Actions, and other homes, such as notifications which can be comparable to program announcements and notifications.
  • Manipulating or inflating practices studies, and product score, score or ratings.
  • Marketing or wedding tactics that redirect customers to download applications or cause additional steps without updated user action.
  • Doing unsolicited publicity via SMS providers.
  • Promoting settlement for making use of Actions, like funds, digital or bodily merchandise.

It is the responsibility to ensure that any advertisement systems or associates aociated along with your actions follow these strategies and never utilize any restricted advertising techniques.

Transactions

All Actions must comply with these specifications:

  1. do not exprely immediate users to a web site, telephone number, cellular application or alternative fees approach to submit a deal, whether around the activity via links or tip potato chips, or in the Action details. Including, don’t tell a person to go to a web site, Action, or real location (or provide a linkout chip) with a phone call to motion to checkout or pay. This restriction cannot connect with App activities.
  2. In case the motion makes it possible for consumers to complete a physical products or providers purchase, or make a booking or scheduling, it needs to implement the deals API for Aistant. Adding items to a basket just isn’t regarded as a transaction.
  3. Whether your behavior enables consumers to perform a digital transaction or get a subscription, it should implement the online buy API.

Here expenditures and transactions (any arrangement between a user and a busine to meet an excellent or service) tend to be recognized on Actions on Google:

Bodily products or service including:

  • Buy or purchase of real products (particularly market, clothes, housewares)
  • Acquisition of bodily treatments (particularly car providers, cleaning services, airfare, food delivery, tickets for live happenings)
  • Bookings and reservations (like hotel rooms)
  • Top-up service

Online goods or treatments like:

  • Purchase of electronic items (particularly virtual currencies, higher schedules, further fun time, and unique products)
  • Registration treatments (instance fitne, online dating, training and content subscription solutions)
  • Acce to actions features and features (for example content material or services)

Currently, measures on Google don’t support revenue transfers from a single consumer to a different, either immediately or via a licensed money transmitter or contributions to charitable or governmental agencies. This restriction does not connect with App activities.

Tư vấn miễn phí (24/7) 086.9999.588

NHẬN THÔNG TIN TUYỂN DỤNG MỚI NHẤT