

Or a Google Workspace super admin within the Google admin console can see the audit event logs. Any user who appears as a Manager, Content Manager, Owner, Contributor on a file or folder will be able to see the event logs.Event logs or as Google calls them audit event logs are kept for 6 months.But they are also found on the activity tab of any file or folder within a user’s Google Drive app. Event logs are found within the Google Workspace Admin console.

Now you might be wondering where this event log is? For how long it is stored before being deleted? Who has access to it? This event log is really helpful to see changes made to files and folders and what those changes were. Within the Google Workspace Google Drive, as your users interact with files or folders and collaborate with other users, they are generating a log of events. If you submit this form with a request for removal. If you are seeking removal simply because you no longer want an item available via search queries on Drive (and it does not otherwise violate our terms, policies or privacy), please use the following link. For example, the content may be in violation of one of our Google policies including violations related to harassment/hate speech content or deceptive practices. Be aware that we will not grant access or remove information if there is a possibility for risk of financial harm, potential violation of applicable law or these Terms and Conditions, or any other possible situation where disclosure could lead to undesirable outcomes. If you want to remove entries from your activity log related to one or several specific items, please reach out directly via with details about what needs to be removed and allow up to two weeks for us to perform an internal review before granting access or rejection of disclosure request. Complete removal of your Google Account is also an option however this may have an adverse effect on all other linked services as well as possible third party services. This will enable us to fully investigate and take any necessary action. In the event that you are a victim of data theft, we strongly recommend that you follow the steps outlined in our Data Theft Resolution Process.
