Handling Requirements

Published on

  1. If your product is associated with a security vulnerability that could be exploited to compromise another application, service, browser, or system, we may remove your product from the Chrome Web Store and take other measures to protect users. In such an event, you may be contacted about remediation steps required to restore the product. Chrome extension security vulnerabilities can be reported here.

  2. If your product collects any user data, it must handle the user data securely, including transmitting it via modern cryptography.

  3. Don't publicly disclose financial or payment information.

  4. Keep authentication information secure. Don't publicly disclose authentication information.

Published on Improve article

This site uses cookies to deliver and enhance the quality of its services and to analyze traffic. If you agree, cookies are also used to serve advertising and to personalize the content and advertisements that you see. Learn more about our use of cookies.