Handling Requirements

View single page version
  1. If your product is associated with a security vulnerability that could be exploited to compromise another application, service, browser, or system, we may remove your product from the Chrome Web Store and take other measures to protect users. In such an event, you may be contacted about remediation steps required to restore the product. Chrome extension security vulnerabilities can be reportedhere.

  2. If your product collects any user data, it must handle the user data securely, including transmitting it via modern cryptography.

  3. Don't publicly disclose financial or payment information.

  4. Keep authentication information secure. Don't publicly disclose authentication information.

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2022-11-01 UTC.