Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

China warns Google over porn links

Google promised to step up control of "vulgar" content in response

Google promised to step up control of "vulgar" online search results in China late Thursday, after a government-backed arbiter warned that its filtering of pornography was too weak.

"The Google China Web site has not done the work to filter pornographic material in accordance with China's laws and regulations," the China Internet Illegal Information Reporting Center said in a statement on its Web site Thursday.

The criticism follows an official campaign against online smut in China that has led to the shutdown of thousands of Web sites and warnings for many major Internet portals. China also recently demanded that porn filtering software be included with all PCs sold in the country starting next month.

The Chinese statement called for Google to erase all vulgar content and urged China's law enforcement to punish the company.

The center had already found problems with Google's blocking of pornographic search results twice this year, the statement said.

Google said it would strengthen efforts to control the content in a statement on its Chinese blog. The company has always worked to monitor vulgar online content, including content harmful to children, it said.

Google was attacked again later Thursday in news programs broadcast by state-run CCTV that showed Google searches returning links to porn.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: CTV, Google
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: search, Google, China, Filtering
Latest Blog Posts
Whitepapers
  • Siemens Redefines Efficiency with Pure Storage
    Challenges - Server consolidation stalled due to storage performance limits - IO-intensive Oracle database would not consolidate with other applications - Multiple instances of virtual applications plus the Oracle DB Results - Consolidated 30 servers to 5 - 23% increase in Oracle performance after virtualization - 6.7-to-1 data reduction - Provisioning time reduced by 4x - 2x increase in VMware snapshot release time
    Learn more »
  • The F5 DDoS Protection Reference Architecture part 1 of 3
    Distributed denial of service attacks (DDoS) attempt to make a machine or network resource unavailable to its intended users, with a wave of crippling attacks on enterprises since 2012. This whitepaper offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
    Learn more »
  • Using an Expert System for Deeper Vulnerability Scanning
    This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments