Google opens talks with China over censorhip

Internet search firm Google has begun talks with the Chinese government about plans to stop censoring...

Internet search firm Google has begun talks with the Chinese government about plans to stop censoring search results after the company was targeted by cyber attacks traced to China.

The company has revealed that its internal systems were broken into by hackers looking for information about human rights activists who subscribe to Google's free e-mail service.

Google has threatened to pull out of the country if it is unable to reach an agreement with Chinese authorities to continue operations in the country without censorship.

Since its inception in 2006, Google's service in China has filtered search results to comply with the Chinese government's rules that restrict access to "inappropriate" information.

Google has announced that as discussions with the Chinese authorities continue, its Google.cn Chinese-language site is still operating in compliance with local regulations, according to Bloomberg.

Analysts predict Google could shut down operations as soon as February if the company fails to reach an agreement over censorship soon.

But that will effectively exclude Google from the world's biggest internet market, which is expected to grow to 840 million users by 2013.

Chinese search engine Baidu, which already has 60% of the local search business, is expected to take over most of Google's business if it is forced to pull out of China.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on E-commerce technology

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close