All demands for a person’s location and term.

All demands for a person’s location and term.

Precisely explain the reason behind asking for user facts or apply account connecting

You have to demonstrably and accurately reveal the legitimate busine reason for asking for consumer data like email, phone number, big date of beginning, sex or personal needs. If you use the Permiions API you must divulge this in the “context” area inside the corresponding method.

Steps is prohibited from requesting this amazing facts via the conversational interface (text, image or address) throughout scenarios.

Fees or economic facts

Examples: credit and banking account figures. Relate to the monetary solutions policy.

Verification information

Examples: this includes complete or partial pawords or PINs.

Personality information

Advice: paport amounts, nationwide ID number, public safety numbers, Drivers licenses wide variety or taxation IDs.

Health facts

Painful And Sensitive Personal Information

Examples: requesting an individual’s ethnicity, governmental association, sexual direction, or spiritual affiliation.

Profile connecting and personality

You might use yahoo Sign-In and/or the levels connecting API with OAuth 2 generate a connection between a Google user and a current non-Google accounts in your system. When applying accounts connecting using OAuth, you must own your OAuth endpoint or has control over it with an OAuth firm. You should never offer URLs from character Providers straight in your Actions online configuration. Singular OAuth config per actions bundle is allowed.

Avoid using any kind of approach to aociate a Google individual with a free account on the program, like utilizing an aociation from another Action engaging in profile connecting, or requesting a contact or telephone number. Assuming your supply numerous measures demanding levels linking, each actions must on their own use the levels Linking API — utilizing the arrangement explained into the particular motion package — to aociate the Bing individual because of the present account.

Should you decide initiate membership linking mid-conversation, after that just before inducing the levels connecting proce it is vital that you explain the reason you are prompting the consumer to link their membership.

Don’t ask any OAuth extent from yahoo unle the consumer are signing in to their service making use of Bing Sign-In. You should not encourage users to say yes to added yahoo OAuth scopes by pointing them to a website or Action.

If yahoo is not able to test and experiment the Action’s fund connecting potential, it won’t be authorized. This consists of Actions which offer incorrect recommendations for evaluating, or are not able to keep their particular qualifications upgraded.

Destructive actions

We don’t let behavior that take facts, secretly supervise or harm people or being usually destructive.

We do not let behavior that interfere with, disrupt, harm, or acce in an unauthorized manner the user’s tool or other equipment, personal computers, machines, sites, application programs connects (APIs), or service. For example other steps, any Google service, while the unit’s circle.

All measures that collect individual data must adhere to the consumer data policy and totally disclose their particular functionality.

Listed below are explicitly prohibited:

  • Malware, trojan ponies, malware, malware, and just about every other destructive program.
  • Advertising or assisting the circulation or installation of harmful computer software.
  • Introducing or exploiting safety weaknesses.
  • Stealing a user’s authentication ideas (like usernames or pawords).
  • Deceiving users into exposing private or authentication details.
  • Suggesting the experience provides sealed or exited, but continuing to capture the consumer.
  • Running some other steps minus the user’s prior permission.
  • Privately collecting equipment usage.

Actions in addition to their listing regarding directory site should never incorporate any method for activate or acce features that violate these terminology.

Safety weaknesses

If for example the activity are aociated with a safety vulnerability which can be exploited to compromise another actions, application, device, or solution, we may remove it to protect users.

Information feeds

In the event that you provide all of us with catalogs, menus, or other information via an information feed and other process, the data must adhere to these plans, like the parts on restricted information and Intellectual homes. You need to precisely carry out all technical requirements and offer information regarding required areas. The data supplied must certanly be strongly related the employment situation of feed and precise. We could possibly disable the feed (or some from it), disable utilization of the information, or eliminate any relevant measures for violations among these policies or if perhaps they create a poor user experience.

Monetization and advertisements

No in-conversation advertising become allowed.


We don’t enable activities that straight or indirectly engage in or benefit from advertising methods which can be deceitful or bad for users and/or designer ecosystem. This consists of Actions that take part in this amazing behavior:

  • Using deceitful advertisements online, measures, or any other characteristics, such as announcements being similar to system notifications and alerts.
  • Manipulating or mydirtyhobby reviews inflating usage statistics, and items reviews, positioning or evaluations.
  • Marketing or involvement techniques that redirect users to install software or trigger some other Actions without informed consumer activity.
  • Doing unsolicited promotion via SMS services.
  • Offer compensation for making use of steps, including cash, electronic or actual merchandise.

It really is their responsibility to make sure that any ad communities or associates aociated along with your activity adhere to these procedures and don’t employ any restricted marketing methods.


All activities must adhere to these specifications:

  1. do not exprely immediate people to an online site, number, cellular software or alternate cost way to finalize a transaction, whether around the activity via hyperlinks or tip chips, or perhaps in the experience outline. Including, don’t inform a user to check out a web page, motion, or physical place (or incorporate a linkout chip) with a phone call to actions to checkout or shell out. This limitation cannot apply at App behavior.
  2. Whether your Action makes it possible for consumers to accomplish a physical products or providers purchase, or make a booking or reservation, it ought to implement the deals API for Aistant. Including items to a basket just isn’t regarded as a transaction.
  3. Should your behavior allows consumers to perform an electronic purchase or buy a membership, it should implement the Digital acquisition API.

These expenditures and transactions (any arrangement between a person and a busine to meet an excellent or solution) are backed on steps on Google:

Bodily goods or services like:

  • Purchase or purchase of actual merchandise (particularly food, clothes, housewares)
  • Purchase of actual providers (like vehicles service, cleanup treatments, plane tickets, foods shipping, tickets for live events)
  • Reservations and reservations (like hotel rooms)
  • Top-up providers

Digital products or service including:

  • Purchase of digital products (for example virtual currencies, extra schedules, extra fun time, and unique products)
  • Membership treatments (for example fitne, online dating, knowledge and content membership providers)
  • Acce to Action usability and features (eg material or treatments)

Presently, measures on Google never support money exchanges in one consumer to another, either directly or via a licensed money transmitter or donations to non-profit or governmental organizations. This limitation does not apply at application measures.