What happens if you share your google voice code

Our policies play an important role in maintaining a positive experience for our users. Please follow these policies when using Google Voice. When we identify a potential policy violation, we may review and take action, including limiting or terminating a user’s access to Google Voice.

  • Spam and Commercial Use

    Do not send or facilitate the transmission of spam, large numbers of commercial messages, or automated messages. Such activity includes, but is not limited to:
    • sending commercial or promotional messages to a large number of users, or sending messages in bulk;
    • sending messages via an automated process, such as a script;
    • sending unwanted or mass solicitation;
    • placing calls in violation of laws prohibiting unsolicited marketing calls (e.g., "do-not-call laws");
    • data mining any web property (including Google) to find phone numbers;
    • selling, exchanging, or distributing to a third party the phone numbers of any person without such person’s consent to such disclosure;
    • inflating call traffic (e.g., traffic pumping, international revenue share fraud).
  • Harassment and Bullying

    Do not use the Google Voice service to threaten, bully, or harass.
  • Violence

    Do not distribute depictions of graphic or gratuitous violence.
  • Child Safety

    Do not distribute content that may be harmful to minors. Do not distribute content that exploits children, such as child sexual abuse imagery or content that presents children in a sexual manner.
  • Impersonation

    Do not impersonate another person (via the use of a telephone number or otherwise) or otherwise misrepresent yourself or the source of any phone call.
  • Intellectual Property

    Do not infringe on the intellectual property of others (including patent, trademark, trade secret, copyright, and other proprietary rights), and do not encourage or induce infringement of intellectual property rights.
  • Privacy

    Do not distribute other people’s personal and confidential information, such as credit card numbers, confidential national ID numbers, or account passwords, without their permission.
  • Illegal Activities

    Do not use Google Voice to engage in or promote illegal activities.
  • Malicious Products

    Do not transmit viruses, malware, or any other malicious or destructive code. Do not use Google Voice in a way that harms or interferes with the operation of the networks, servers, or other infrastructure of Google or others.
  • System Interference and Abuse

    Do not abuse the Google Voice Service, and do not interfere with other Google Voice users’ enjoyment of the Google Voice Service. For example:
    • Do not use Google Voice to data mine phone numbers or other information.
    • Do not automate our system to place phone calls or send messages automatically.
    • Do not forward to phone numbers that aren’t your own or under your control.
    • Do not create multiple user accounts, and do not create user accounts by automated means or under false or fraudulent pretenses.
    • Do not sell, trade, resell or otherwise exploit for any unauthorized commercial purpose or transfer any Google Voice account or the Google Voice Service.
    • Do not modify, adapt, translate, or reverse engineer any portion of the Google Voice Service.
    • Do not remove any copyright, trademark, or other proprietary rights notices contained in or on the Google Voice Service.
    • Do not reformat or frame any portion of the web pages that are part of the Google Voice Service.
  • Account Inactivity

    Google may reclaim your Google Voice number (if you have one) if you have not placed or received calls, sent or received text messages for a period of 6 months. We will not reclaim numbers that have been ported in to Google Voice or made permanent.

2-Step Verification Basics

Why should I set up 2-Step Verification?

You should set up 2-step verification because doing so makes it very hard for anyone to take over your email account remotely. Without setting up 2-step verification, hackers could get into your account if they figured out your password. With 2-step verification enabled, they would need the password and physical control of your phone, your wallet or purse, or your actual computer. Here's why this matters: In most cases you would have no way of knowing whether someone somewhere else in the world had cracked your password and was rummaging through your account. This lets you know.

How do I turn on 2-Step Verification?

When you enable 2-Step Verification (also known as two-factor authentication), you add an extra layer of security to your account. You sign in with something you know (your password) and something you have (like a code sent to your phone).

To set up 2-Step Verification:

  • Go to your Google Account's 2-Step Verification page. You will be prompted to sign in to your SUSD Google Account.
  • Click Get started. (Have a phone or hardware key nearby.)
  • Follow the quick step-by-step setup process to use your phone, or select "Show more options" to select an alternate method. 

Once you're finished, you'll be taken to the 2-Step Verification settings page. Review your settings and add backup phone numbers. The next time you sign in, you'll receive a message with a verification code. You also have the option of using a Security Key for 2-Step Verification or a variety of other alternative second steps. We recommend you choose at least one alternative option.

How do I sign in with 2-Step Verification?

Signing in with 2-Step Verification is easy.

  • Go to the sign-in page of your mail or any other SUSD Google application that employs Google Single Sign-On, and enter your username and password like you normally do.
  • Every 30 days or every time you try logging into your SUSD Google Mail or any Google Single Sign On service on a new device, you’ll be sent a push notification to your phone, asked for a six-digit code (also sent to your phone), or prompted to insert your hardware key, depending on which option you chose during initial set-up. If you want, when you enter your verification, you can choose to trust your computer -- this means you won't be asked for a code again when you sign in from this computer. If you sign in from another computer, however, you’ll be asked for your 2nd form of verification.
  • After you turn on 2-Step Verification, non-browser applications and devices that use your Google Account (such as Outlook), may be unable to connect to your account. However, in a few steps, you can generate a special password called application-specific password to allow this application to connect to your account -- and don't worry, you'll only have to do this once for each device or application.

Alternate Methods

What if I don't want to use my phone?

Don’t want to use your phone? No problem. You’ll need a phone to set up 2-Step Verification at first, but you can then immediately change your second step. Here are some alternatives:

  • Sign in faster with 2-Step Verification phone prompts
  • Sign in using App Passwords
  • Sign in using backup codes
  • Sign in with a backup phone
  • Sign in with the free Google Authenticator app
  • Sign in with a security key

What is a security key? How do I use it?

A security key (also called a fob, or USB key), is a Fido U2F certified, read-only device that looks like a USB flash drive. When plugged in to your USB drive, it will generate a code for you, instead of you entering a code manually. Any device that is Fido U2F certified can be used with Google 2-Step Verification. Click here for more information on the IS-preferred security key, Thetis.

Are there limitations with security keys?

Yes, there are a few limitations to U2F security keys. They are:

  • You must be using a device with a USB port, and the USB port must not be disabled (some kiosks and computer labs disable USB ports for security reasons).
  • You must be using a supported browser.
  • Google Chrome supports U2F natively.

Can I use Google Voice to receive codes?

Using Google Voice is not recommended. If you use Google Voice to receive verification codes, you can easily create a situation where you’ve locked yourself out of your account. For example, if you are signed out of your Google Voice app, you might need a verification code to get back in. However, you won’t be able to receive this verification code because it will be sent to your Google Voice, which you can’t access.

What if my phone was lost or stolen?

If your phone was lost or stolen, we strongly recommend that you change your WFU Google Account password and revoke your App Passwords. This will help prevent others from accessing your WFU Google Account from your phone.  Learn more here.

What if I get a new phone after I’ve set up Google 2-Step Verification?

No problem.  Follow these instructions.

My Google Authenticator codes aren’t working (Android). What do I do?

This might be because the time on your Google Authenticator app is not synced correctly. To make sure that you have the correct time:

  •     Go to the main menu on the Google Authenticator app
  •     Tap More Settings
  •     Tap Time correction for codes
  •     Tap Sync Now

On the next screen, the app will confirm that the time has been synced, and you should now be able to use your verification codes to sign in. The sync will only affect the internal time of your Google Authenticator app, and will not change your device’s Date & Time settings.

I’m stuck and I need backup codes! Help!

If you are affiliated with Sylvan Union School District and none of your 2-Step options are working, you can call the Technology Department Monday through Friday, from 7:30am to 4:30pm, or send us an email to . 

What do I do if I’ve lost my backup codes, and want to revoke them?

If you lost the print-out of your backup codes, you can revoke them on your settings page. In the Backup codes section click Show codes, then click Get new codes. This will invalidate the previous set of backup codes and generate a new set.

I turned on 2-Step Verification and an app on my phone or computer stopped working. What now?

When you turn on 2-Step Verification, any apps that need access to your SUSD Google Account will stop working until you enter an App Password in place of your normal password. Common applications and devices that require an App Password include:

  • Old versions of email clients such as Outlook, Apple Mail and Thunderbird
  • The email app that comes with your phone (but is not made by Google)
  • Some chat, contacts and YouTube clients

Note: If you're running the latest operating system on your iPhone/iPad or Mac computer, you will no longer have to use App passwords to use 2-Step Verification. You do not need to memorize App Passwords because every App Password is only used once. You can generate a new App Password whenever you’re asked for one--even for a device or application you’ve authorized before.

Why does Google ask for verification every time I log in, even though I checked the box to ask every 30 days?

You most likely need to enable cookies in your browser, or your browser is set to automatically clear it's cache on exit.

Can't find what you're looking for?

Click Here to submit a ticket

What can someone do with your Google Voice verification code?

Google Voice Scams: What Can Someone Do With Your Google Voice Code?.
Commit crimes that can be traced back to you. ... .
Scam your friends and family using your phone number. ... .
Open new accounts in your name. ... .
Take over your online accounts using verification codes. ... .
Harvest more sensitive information to steal your identity..

What happens if I give someone my Google code?

If you give them the verification code, they'll try to use it to create a Google Voice number linked to your phone number. (Google Voice gives you a phone number that you can use to make calls or send text messages from a web browser or a mobile device.)

Is it safe to share Google Voice verification code?

Don't share your verification code with anyone To prevent unwanted access to your account, it's important you don't reply to any requests for your verification code. Google employees will never ask for this code. Remember that good security practices are critical to the integrity of your Google Account.

What can a scammer do with a verification code?

After requesting your cell phone number, the scammer sends a verification code by text message and asks that you send them the code to prove your identity. Once the code is provided, the scammer goes on to create a Google Voice number linked to your cell phone number, often to be used for additional scams.