[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-18。"],[[["\u003cp\u003eAccess Transparency logs are generated when Google personnel access your content in supported services, with specific exceptions.\u003c/p\u003e\n"],["\u003cp\u003eAccess is not logged if Google is legally prohibited from notifying you, as detailed in the Google Cloud Transparency Report.\u003c/p\u003e\n"],["\u003cp\u003eAccess by Google personnel granted through your Identity and Access Management (IAM) policy is logged in Cloud Audit Logs, not Access Transparency logs.\u003c/p\u003e\n"],["\u003cp\u003eAccess to data that isn't considered Customer Data, such as aggregated resource sizes, will not generate Access Transparency logs.\u003c/p\u003e\n"],["\u003cp\u003eAccess from Google's standard automated systems and code, verified through code authorization and security reviews, are excluded from Access Transparency logs.\u003c/p\u003e\n"]]],[],null,["# Access Transparency exclusions\n==============================\n\nAccess Transparency logs are generated when Google personnel access content that you've\nuploaded into an Access Transparency\n[supported service](/assured-workloads/access-transparency/docs/supported-services),\n**except** in the following scenarios:\n\n1. Google is legally prohibited from notifying you of the access. For details,\n refer to Google Cloud's\n [Transparency Report](https://transparencyreport.google.com/user-data/enterprise?enterprise_legal_process_breakdown=product:1;authority:;series:requests,accounts,compliance&lu=enterprise_legal_process_breakdown).\n\n2. You've granted the Google personnel access to your content by using your\n Identity and Access Management (IAM) policy; their activities are recorded in\n [Cloud Audit Logs](/logging/docs/audit) (when enabled), not Access Transparency logs.\n\n3. The access doesn't target [Customer Data](/terms/service-terms); for example,\n Google personnel querying for the average size of records in a database that\n contains content from multiple Google Cloud customers.\n\n4. The content in question is a public resource identifier or a\n [resource name](https://google.aip.dev/122). For example:\n\n - Google Cloud project IDs\n - Cloud Storage bucket names\n - Compute Engine VM names\n - Google Kubernetes Engine cluster names\n - BigQuery resource names (including datasets, tables, and reservations)\n5. The access originates from Google's standard automated systems and code.\n These system accesses are validated by code authorization, which verifies\n that the job originates from code that was checked into production and\n subject to a multi-party security and privacy review, including a verified\n source code owner.\n\nWhat's next\n-----------\n\n- Learn about the [services that Access Transparency supports](/assured-workloads/access-transparency/docs/supported-services)."]]