join or add google drve
by daisy pickess
this flyer is to prove that google drive is acceptabe for you to use
google drive is great to use. Google Drive is a file storage and synchronization service provided by Google, released on April 24, 2012, which enables user cloud storage, file sharing and collaborative editing. Google Drive is now the home of Google Docs, a suite of productivity applications, that offer collaborative editing on documents, spreadsheets, presentations, and more. Rumors about Google Drive began circulating as early as March 2006. Files shared publicly on Google Drive can be searched with web search engines.
google drive mobile access
The Android Google Drive app, which is available for free on Google Play, allows users to view, edit, and create Google Docs documents, spreadsheets, and presentations. The Android Google Docs app can also take a photo of a document, sign, or other text and use Optical Character Recognition to convert to text that can be edited. The iPhone Safari Browser also allows users to view documents, spreadsheets, and presentation and to edit and create Google Docs documents and spreadsheets. Furthermore, the Google App for iPhone allows users to view and edit Google Docs. Most other mobile devices can also view and edit Google Docs documents and spreadsheets using a mobile browser. PDF files can be viewed but not edited.
A common problem with Google Docs is the inability to create or edit files without internet access. This has rendered the service useless for office work and note taking on the go where internet access may not be available
safty on google drive
In a cloud environment, data security issues and national interests mean that on-line document storage (e.g. electronic mail), and processing (e.g. Gmail) can be unsuitable for use by governments or commercial organizations. Especially so where sensitive data (e.g. electronic mail) or confidential data is being stored, edited or shared on systems and infrastructure that are outsourced (e.g. by senior US government officials to Google) and shared with many other organizations, individuals, users. (e.g. the Internet.)
- In a mid-2011 attack on Google from Jinan, China, (a city with a military command center), the passwords were stolen for the Gmail accounts of hundreds of senior US government officials. The Gmail address and password would have given the attackers the ability to access other areas of Google for these user accounts (Apps, Docs, etc.,) Other systems where the username and password pair were the same could also have been accessed. Also, some systems using a password recovery feature could be accessed. (If a password is forgotten a new one is sent to the registered email address. See Password notification email.)
- On 10 March 2009, Google reported that a bug in Google Docs had allowed unintended access to some private documents. Google believed that 0.05% of all documents stored via the service were affected by the bug, and claims the issue has now been fixed.
- Google has a close relationship with the US intelligence agencies and provides information to intelligence agencies around the world upon request via established protocols (e.g. RIPA in the UK). Google is primarily a US company, and therefore, to protect national interests, some non-US citizens may have their safety or privacy compromised as a result of using Google Drive and other Google services.
Some of the issues that have to be considered to see if Google Drive is "enterprise-ready" include
- Encryption of data in transit and storage
- Service Level Agreements (regarding electronic discovery and incident management)
- Audit trails for users and administrators
- Data Segregation and Data Isolation
Google provides optional free two-factor authentication for greater account security. To log in, users must provide a short random code sequence sent to their phones via SMS or generated by the Google Authenticator app for Android or iOS. In addition, Google has switched to using secure sockets layer communication (HTTPS) by default, preventing common man-in-the-middle attacks