About DLP for Calendar (beta)

Supported editions for this feature: Frontline Standard and Frontline Plus; Enterprise Standard and Enterprise Plus; Education Fundamentals, Education Standard, and Education Plus; Enterprise Essentials; Cloud Identity Premium. Compare your edition

Using data loss prevention (DLP) for Calendar, you can create data protection rules to manage sensitive content that your users share in Google Calendar events. Use DLP for Calendar to protect your organization's data and prevent data leaks.

On this page

How does DLP for Calendar work?

When a user creates or modifies a calendar event, DLP scans the event for sensitive content. If the event content violates a rule, the action defined in the rule is applied to the event.

You can create data protection rules specifically for Calendar or for Calendar and other Google Workspace services, such as Google Drive or Gmail. You can apply rules to everyone in your organization or to specific organizational units or groups.

DLP for Calendar flow

  1. You create data protection rules that define sensitive content and the action to take on events with sensitive content.
  2. When a user saves a Calendar event (the trigger), DLP scans the event title, description, and location. You can also specify conditions that determine what gets scanned.
  3. If a rule is matched, DLP applies the action defined in the rule.
  4. You can review the details of events and incidents in Rule log events.

Attached files are subject to any rules you set up for Google Drive. For details, go to About DLP for Drive.

Understand triggers

Before defining what content your rule should look for, you specify the trigger that initiates the scanning process. With DLP for Calendar, scanning starts when a user saves an event.

Understand DLP actions

When sensitive content is found, your rule can enforce an action in the following table.

If you have similar rules with different response actions, the stricter action prevails. For example, if one rule warns users when a Social Security Number (SSN) is found and another rule blocks the user from using SSNs, the user cannot save the event (SSNs are blocked).

Action Description
Block

Blocks the creation or modification of a Calendar event. If the user is using Calendar on a web browser, they get a notification. If they're using the Calendar app, they get an email notification. Optionally, you can add a custom message for users.

The event is logged.

Warn

Allows the user to proceed after a warning message. Optionally, you can add a custom warning message for users.

The user's choice to proceed is recorded in the log events.

Audit only

Allows the user to proceed without interruption and logs the event.

Understand DLP conditions

When you create a data protection rule, you can specify conditions that define what content or activity to scan for. You can use predefined data types. Or, create your own custom content detectors. You can also combine multiple conditions using AND, OR, or NOT operators.

For details, go to How to use predefined content detectors, Create a custom detector, and Examples of rules with nested condition operators.

Content type to scan What to scan for Details & use
All content

Matches predefined data type

Contains text string

Matches regular expression

Matches words from word list

Scans the title, description, and location of Calendar events. Takes action if sensitive information is found that matches one of the following:

  • A predefined data type, such as Global - Email Address or United States - Social Security Number
  • A specified text string
  • Patterns defined by a regular expression
  • Words from a custom list

Create a rule

After you determine what you want your rule to do, you create the rule. For details, go to Create data protection rules.

Common use cases

The following table provides examples of how to combine a trigger (what the user does), conditions (what is checked), and a specific action (the enforcement) to define your DLP policy. To use this table, you must:

  1. Select a trigger.
  2. Map condition values to the corresponding options.
  3. Select an action.

Changes can take up to 24 hours but typically happen more quickly. Learn more

Use case Trigger Condition Action
Block sharing of Calendar events that contain a credit card number Google Calendar and then Event saved

Content type: All content

Match: Matches predefined data type

Data Type: Global - Credit Card Number

Likelihood Threshold: High

Minimum unique matches: 1

Minimum match count: 1

Block
Warn users when sharing a Calendar event that contains the project code name or acronym Google Calendar and then Event saved

Condition 1:

Match: Contains text string

Value: SpiderWeb

OR

Condition 2:

Match: Contains text string

Value: SpdW

Warn

Review, monitor & investigate alerts