A Missing Page from Google's Transparency Report

By

In an effort to mollify critics of its privacy and transparency policies, Google has introduced a new tool called The Transparency Report, at google.com/transparencyreport/. It shows where governments are demanding Google to remove content and where Google services are being blocked. For instance, the U.S. has made the largest number of data requests while YouTube has been inaccessible in Iran since the contested presidential election in June 2009.

This isn’t the first time Google has taken steps towards greater transparency. Earlier this year, the Mountain View, California search and advertising giant launched its Government Requests map, which displays each time a government asked Google to take down, censor or release user data, and how often Google complied with these requests. The map is now a part of the Transparency Report and will be updated every six months.

In addition, Google’s interactive Traffic graphs shows historic traffic patterns for a given country and service. Visitors can discover the location of outages, whether they have been caused by a government blocking information or cable being cut out (although Google doesn’t differentiate between the two).

On its site, Google states: “Transparency is a core value at Google. As a company we feel it is our responsibility to ensure that we maximize transparency around the flow of information related to our tools and services. We believe that more information means more choice, more freedom and ultimately more power for the individual.

There is, however, one glaring omission from The Transparency Report: China is missing from the government requests tool because Chinese authorities consider censorship demands to be state secrets that cannot be published, according to Google. In fact, clicking on that country on the map brings up a message from Google: “Chinese officials consider censorship demands to be state secrets, so we cannot disclose that information at this time.”




Edited by Erin Harrison
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

TechZone360 Contributing Editor

SHARE THIS ARTICLE
Related Articles

Can Science Outsmart Deepfake Deceivers? Klick Labs Proposes an Emerging Solution

By: Alex Passett    3/25/2024

Researchers at Klick Labs were able to identify audio deepfakes from authentic audio recordings via new vocal biomarker technology (alongside AI model…

Read More

Top 5 Best Ways to Integrate Technology for Successful Project-Based Learning

By: Contributing Writer    3/19/2024

Project-based learning, also popularly known as the PBL curriculum, emphasizes using and integrating technology with classroom teaching. This approach…

Read More

How to Protect Your Website From LDAP Injection Attacks

By: Contributing Writer    3/12/2024

Prevent LDAP injection attacks with regular testing, limiting access privileges, sanitizing user input, and applying the proper encoding functions.

Read More

Azure Cost Optimization: 5 Things You Can Do to Save on Azure

By: Contributing Writer    3/7/2024

Azure cost optimization is the process of managing and reducing the overall cost of using Azure. It involves understanding the resources you're using,…

Read More

Massive Meta Apps and Services Outage Impacts Users Worldwide

By: Alex Passett    3/5/2024

Meta's suite of apps and services are experiencing major global outages on Super Tuesday 2024.

Read More