<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Google Data &#187; Google Public Policy Blog</title>
	<atom:link href="/author/google-public-policy-blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://googledata.org</link>
	<description>Everything Google: News, Products, Services, Content, Culture</description>
	<lastBuildDate>Wed, 18 Mar 2015 18:30:00 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.7.5</generator>
	<item>
		<title>A Small Rule Change That Could Give the U.S. Government Sweeping New Warrant Power</title>
		<link>https://googledata.org/google-public-policy/a-small-rule-change-that-could-give-the-u-s-government-sweeping-new-warrant-power/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-small-rule-change-that-could-give-the-u-s-government-sweeping-new-warrant-power</link>
		<comments>https://googledata.org/google-public-policy/a-small-rule-change-that-could-give-the-u-s-government-sweeping-new-warrant-power/#comments</comments>
		<pubDate>Wed, 18 Feb 2015 17:45:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=7ef76dc8680ce834d788884e0069b9fa</guid>
		<description><![CDATA[<div dir="ltr"><div><span><span>Posted by Richard Salgado, Legal Director, Law Enforcement and Information Security</span></span></div><div><b><span><br /></span></b></div><div><span><span>At the request of the Department of Justice, a little-known body -- the Advisory Committee on the Rules of Criminal Procedure -- is proposing a significant change to procedural rules that could have profound implications for the privacy rights and security interests of everyone who uses the Internet. &#160;Last week, </span><a href="http://www.regulations.gov/#!documentDetail;D=USC-RULES-CR-2014-0004-0029"><span>Google filed comments</span></a><span> opposing this change.</span></span></div><div><b><span><br /></span></b></div><div><span><span>It starts with the Federal Rule of Criminal Procedure 41, an arcane but important procedural rule on the issuance of search warrants. &#160;Today, Rule 41 prohibits a federal judge from issuing a search warrant outside of the judge&#8217;s district, with some exceptions. &#160;The Advisory Committee&#8217;s proposed change would significantly expand those exceptions in cases involving computers and networks. &#160;The proposed change would allow the U.S. government to obtain a warrant to conduct &#8220;remote access&#8221; searches of electronic storage media if the physical location of the media is &#8220;concealed through technological means,&#8221; or to facilitate </span><a href="http://en.wikipedia.org/wiki/Botnet"><span>botnet</span></a><span> investigations in certain circumstances. &#160;</span></span></div><div><b><span><br /></span></b></div><div><span><span>The implications of this expansion of warrant power are significant, and are better addressed by Congress. &#160;</span></span></div><div><b><span><br /></span></b></div><div><span><span>First, in setting aside the traditional limits under Rule 41, the proposed amendment would likely end up being used by U.S. authorities to directly search computers and devices around the world. &#160;Even if the intent of the proposed change is to permit U.S. authorities to obtain a warrant to directly access and retrieve data only from computers and devices within the U.S., there is nothing in the proposed change to Rule 41 that would prevent access to computers and devices worldwide.</span></span></div><div><b><span><br /></span></b></div><div><span><span>The U.S. has </span><a href="http://www.state.gov/j/inl/rls/nrcrpt/2012/vol2/184110.htm"><span>many diplomatic arrangements</span></a><span> in place with other countries to cooperate in investigations that cross national borders, including Mutual Legal Assistance Treaties (MLATs). &#160;Google supports ongoing efforts to improve cooperation among governments, and we are concerned that the proposed change to Rule 41 could undermine those efforts. &#160;The significant foreign relations issues associated with the proposed change to Rule 41 should be addressed by Congress and the President, not the Advisory Committee.</span></span></div><div><b><span><br /></span></b></div><div><span><span>Second, the proposed change threatens to undermine the privacy rights and computer security of Internet users. &#160;For example, the change would excuse territorial limits on the use of warrants to conduct &#8220;remote access&#8221; searches where the physical location of the media is &#8220;concealed through technological means.&#8221; &#160;The proposed change does not define what a &#8220;remote search&#8221; is or under what circumstances and conditions a remote search can be undertaken; it merely assumes such searches, whatever they may be, are constitutional and otherwise legal. &#160;It carries with it the specter of government hacking without any Congressional debate or democratic policymaking process. &#160;</span></span></div><div><b><span><br /></span></b></div><div><span><span>Likewise, the change seemingly means that the limit on warrants is excused in any instance where a Virtual Private Network (VPN) is set up. &#160;Banks, online retailers, communications providers and other businesses around the world commonly use VPNs to help keep their networks and users&#8217; information secure. &#160;A VPN can obscure the actual location of a network, however, and thus could be subject to a remote search warrant where it would not have been otherwise. &#160;&#160;</span></span></div><div><span><span> &#160;</span></span></div><div><span><span>The Advisory Committee is entertaining a dramatic change to electronic surveillance rules. &#160;Congress is the proper body to determine whether such changes are warranted, and we urge the Committee to respect Congress&#8217; traditional role in prescribing the substantive rules governing electronic surveillance.</span></span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: white; line-height: 1.38; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Posted by Richard Salgado, Legal Director, Law Enforcement and Information Security</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">At the request of the Department of Justice, a little-known body -- the Advisory Committee on the Rules of Criminal Procedure -- is proposing a significant change to procedural rules that could have profound implications for the privacy rights and security interests of everyone who uses the Internet. &nbsp;Last week, </span><a href="http://www.regulations.gov/#!documentDetail;D=USC-RULES-CR-2014-0004-0029" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google filed comments</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> opposing this change.</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">It starts with the Federal Rule of Criminal Procedure 41, an arcane but important procedural rule on the issuance of search warrants. &nbsp;Today, Rule 41 prohibits a federal judge from issuing a search warrant outside of the judge’s district, with some exceptions. &nbsp;The Advisory Committee’s proposed change would significantly expand those exceptions in cases involving computers and networks. &nbsp;The proposed change would allow the U.S. government to obtain a warrant to conduct “remote access” searches of electronic storage media if the physical location of the media is “concealed through technological means,” or to facilitate </span><a href="http://en.wikipedia.org/wiki/Botnet" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">botnet</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> investigations in certain circumstances. &nbsp;</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">The implications of this expansion of warrant power are significant, and are better addressed by Congress. &nbsp;</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">First, in setting aside the traditional limits under Rule 41, the proposed amendment would likely end up being used by U.S. authorities to directly search computers and devices around the world. &nbsp;Even if the intent of the proposed change is to permit U.S. authorities to obtain a warrant to directly access and retrieve data only from computers and devices within the U.S., there is nothing in the proposed change to Rule 41 that would prevent access to computers and devices worldwide.</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The U.S. has </span><a href="http://www.state.gov/j/inl/rls/nrcrpt/2012/vol2/184110.htm" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">many diplomatic arrangements</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> in place with other countries to cooperate in investigations that cross national borders, including Mutual Legal Assistance Treaties (MLATs). &nbsp;Google supports ongoing efforts to improve cooperation among governments, and we are concerned that the proposed change to Rule 41 could undermine those efforts. &nbsp;The significant foreign relations issues associated with the proposed change to Rule 41 should be addressed by Congress and the President, not the Advisory Committee.</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Second, the proposed change threatens to undermine the privacy rights and computer security of Internet users. &nbsp;For example, the change would excuse territorial limits on the use of warrants to conduct “remote access” searches where the physical location of the media is “concealed through technological means.” &nbsp;The proposed change does not define what a “remote search” is or under what circumstances and conditions a remote search can be undertaken; it merely assumes such searches, whatever they may be, are constitutional and otherwise legal. &nbsp;It carries with it the specter of government hacking without any Congressional debate or democratic policymaking process. &nbsp;</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Likewise, the change seemingly means that the limit on warrants is excused in any instance where a Virtual Private Network (VPN) is set up. &nbsp;Banks, online retailers, communications providers and other businesses around the world commonly use VPNs to help keep their networks and users’ information secure. &nbsp;A VPN can obscure the actual location of a network, however, and thus could be subject to a remote search warrant where it would not have been otherwise. &nbsp;&nbsp;</span></span></div><div style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"> &nbsp;</span></span></div><div style="text-align: left;"><span style="background-color: white; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">The Advisory Committee is entertaining a dramatic change to electronic surveillance rules. &nbsp;Congress is the proper body to determine whether such changes are warranted, and we urge the Committee to respect Congress’ traditional role in prescribing the substantive rules governing electronic surveillance.</span></span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/a-small-rule-change-that-could-give-the-u-s-government-sweeping-new-warrant-power/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>The Impacts of Data Localization on Cybersecurity</title>
		<link>https://googledata.org/google-public-policy/the-impacts-of-data-localization-on-cybersecurity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-impacts-of-data-localization-on-cybersecurity</link>
		<comments>https://googledata.org/google-public-policy/the-impacts-of-data-localization-on-cybersecurity/#comments</comments>
		<pubDate>Fri, 13 Feb 2015 21:39:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=7bb83b3d3dba761eb0e230489820fbe8</guid>
		<description><![CDATA[<div dir="ltr"><div dir="ltr"><span>Earlier this week, </span><a href="http://www.leviathansecurity.com/"><span>Leviathan Security</span></a><span> released their latest piece of research, called the </span><a href="http://www.leviathansecurity.com/cloudsecurity/"><span>Value of Cloud Security</span></a><span>. This research takes a close look at cloud infrastructure security and how it's impacted by forced data localization. Google commissioned the study and discussed the results with Leviathan, but Leviathan alone is responsible for the analysis and conclusions. </span></div><b><br /></b><br /><div dir="ltr"><span>When companies take advantage of cloud services, they get more secure systems as a result. Many countries, however, have proposed laws requiring that companies keep the data of that country&#8217;s users within national borders. This idea, known as &#8220;data localization,&#8221; purports to keep citizen users safer and out of the hands of spying governments and hackers. The report found that forced data localization actually undermines many of the benefits that come from cloud services: </span></div><b><br /></b><br /><ul><li><div dir="ltr"><span>Cloud services provide much better resiliency and redundancy than local services in the face of disasters of all sizes, from small transformer explosions that affect 30,000 users up to superstorms the size of Thaiphoon Haiyan that can interrupt entire countries. If data has to stay in one place by law, that redundancy is lost.</span><span><br /></span></div></li><li><div dir="ltr"><span>Security expertise is in short supply and tends to congregate in large organizations and sharing what expertise there is is better for everyone as a whole. E.g. - There are currently over a million unfilled security positions open worldwide and all of the GCHQ-led cybersecurity programs together will graduate just 66 PhD's per year starting in 2017. Small companies that are forced to host their own data will find it hard to compete to hire qualified security engineers.</span></div></li></ul><br /><div dir="ltr"><span>If policymakers are thinking about the perceived benefits of datalocalization, they should carefully examine this study and take into account the cybersecurity of their country&#8217;s enterprises.You can check out &#160;the full studies on </span><a href="https://www.leviathansecurity.com/blog/the-value-of-cloud-security/"><span>Leviathan&#8217;s blog</span></a><span>.</span></div><div dir="ltr"></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Earlier this week, </span><a href="http://www.leviathansecurity.com/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Leviathan Security</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> released their latest piece of research, called the </span><a href="http://www.leviathansecurity.com/cloudsecurity/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Value of Cloud Security</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. This research takes a close look at cloud infrastructure security and how it's impacted by forced data localization. Google commissioned the study and discussed the results with Leviathan, but Leviathan alone is responsible for the analysis and conclusions. </span></div><b id="docs-internal-guid-c01c9718-84e4-e6dc-0101-a39e90822a35" style="font-weight: normal;"><br /></b><br /><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">When companies take advantage of cloud services, they get more secure systems as a result. Many countries, however, have proposed laws requiring that companies keep the data of that country’s users within national borders. This idea, known as “data localization,” purports to keep citizen users safer and out of the hands of spying governments and hackers. The report found that forced data localization actually undermines many of the benefits that come from cloud services: </span></div><b style="font-weight: normal;"><br /></b><br /><ul style="margin-bottom: 0pt; margin-top: 0pt;"><li dir="ltr" style="background-color: white; color: #212121; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.7999999999999998; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #212121; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Cloud services provide much better resiliency and redundancy than local services in the face of disasters of all sizes, from small transformer explosions that affect 30,000 users up to superstorms the size of Thaiphoon Haiyan that can interrupt entire countries. If data has to stay in one place by law, that redundancy is lost.</span><span style="background-color: white; color: #212121; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span></div></li><li dir="ltr" style="background-color: white; color: #212121; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.7999999999999998; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #212121; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Security expertise is in short supply and tends to congregate in large organizations and sharing what expertise there is is better for everyone as a whole. E.g. - There are currently over a million unfilled security positions open worldwide and all of the GCHQ-led cybersecurity programs together will graduate just 66 PhD's per year starting in 2017. Small companies that are forced to host their own data will find it hard to compete to hire qualified security engineers.</span></div></li></ul><br /><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">If policymakers are thinking about the perceived benefits of datalocalization, they should carefully examine this study and take into account the cybersecurity of their country’s enterprises.You can check out &nbsp;the full studies on </span><a href="https://www.leviathansecurity.com/blog/the-value-of-cloud-security/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Leviathan’s blog</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">.</span></div><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/the-impacts-of-data-localization-on-cybersecurity/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Apply for a 2015 North America Google Policy Fellowship</title>
		<link>https://googledata.org/google-public-policy/apply-for-a-2015-north-america-google-policy-fellowship/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=apply-for-a-2015-north-america-google-policy-fellowship</link>
		<comments>https://googledata.org/google-public-policy/apply-for-a-2015-north-america-google-policy-fellowship/#comments</comments>
		<pubDate>Wed, 11 Feb 2015 20:37:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=619ac1e5f8031cf280b0ba381f479b48</guid>
		<description><![CDATA[<div dir="ltr">Last summer, students from all over the US and Canada gathered to explore pressing questions at the intersection of technology and policy. Whether working on data security standards at the National Consumers League or innovation economy issues at the R Street Institute, students gained hands-on experience tackling critical technology policy questions.<div><br />2015 is just beginning, but these issues show no signs of slowing down. We&#8217;re excited to announce the 8th annual Google Policy Fellowship, which connects students interested in emerging technology policy issues with leading nonprofits, think tanks, and advocacy groups.</div><div><br />Applications are open today for North America, and students of all levels and disciplines are welcome to apply before Thursday, March 12th.<div><br /></div><div>This year&#8217;s organizations include:&#160;</div><div><ul><li>American Association of People with Disabilities</li><li>American Enterprise Institute</li><li>American Library Association</li><li>Center for Democracy and Technology</li><li>Center for Data Innovation</li><li>Electronic Frontier Foundation</li><li>Engine</li><li>Future of Music Coalition</li><li>Georgetown Center on Privacy &#38; Technology</li><li>Global Network Initiative</li><li>Internet Education Foundation</li><li>Internet Keep Safe Coalition</li><li>Mercatus</li><li>National Consumers League</li><li>National Hispanic Media Coalition</li><li>Open Technology Institute, New America Foundation</li><li>Public Knowledge</li><li>R Street Institute</li><li>Samuelson-Glushko Canadian Internet Policy &#38; Public Interest Clinic</li><li>TechFreedom</li><li>Technology Policy Institute</li><li>The Citizen Lab</li><li>US Hispanic Chamber of Commerce</li></ul><span><div><span><br /></span></div>More fellowship opportunities in Asia, Africa, and Europe will be coming soon. You can learn about the </span><a href="http://www.google.com/policyfellowship/faq.html">program</a><span>, application process and </span><a href="http://www.google.com/policyfellowship/hosts.html">host organizations</a><span> on the </span><a href="http://www.google.com/policyfellowship/index.html">Google Public Policy Fellowship website</a><span>.</span></div></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on">Last summer, students from all over the US and Canada gathered to explore pressing questions at the intersection of technology and policy. Whether working on data security standards at the National Consumers League or innovation economy issues at the R Street Institute, students gained hands-on experience tackling critical technology policy questions.<div><br />2015 is just beginning, but these issues show no signs of slowing down. We’re excited to announce the 8th annual Google Policy Fellowship, which connects students interested in emerging technology policy issues with leading nonprofits, think tanks, and advocacy groups.</div><div><br />Applications are open today for North America, and students of all levels and disciplines are welcome to apply before Thursday, March 12th.<div><br /></div><div>This year’s organizations include:&nbsp;</div><div><ul style="text-align: left;"><li>American Association of People with Disabilities</li><li>American Enterprise Institute</li><li>American Library Association</li><li>Center for Democracy and Technology</li><li>Center for Data Innovation</li><li>Electronic Frontier Foundation</li><li>Engine</li><li>Future of Music Coalition</li><li>Georgetown Center on Privacy &amp; Technology</li><li>Global Network Initiative</li><li>Internet Education Foundation</li><li>Internet Keep Safe Coalition</li><li>Mercatus</li><li>National Consumers League</li><li>National Hispanic Media Coalition</li><li>Open Technology Institute, New America Foundation</li><li>Public Knowledge</li><li>R Street Institute</li><li>Samuelson-Glushko Canadian Internet Policy &amp; Public Interest Clinic</li><li>TechFreedom</li><li>Technology Policy Institute</li><li>The Citizen Lab</li><li>US Hispanic Chamber of Commerce</li></ul><span style="line-height: 1.2;"><div><span style="line-height: 1.2;"><br /></span></div>More fellowship opportunities in Asia, Africa, and Europe will be coming soon. You can learn about the </span><a href="http://www.google.com/policyfellowship/faq.html" style="line-height: 1.2;">program</a><span style="line-height: 1.2;">, application process and </span><a href="http://www.google.com/policyfellowship/hosts.html" style="line-height: 1.2;">host organizations</a><span style="line-height: 1.2;"> on the </span><a href="http://www.google.com/policyfellowship/index.html" style="line-height: 1.2;">Google Public Policy Fellowship website</a><span style="line-height: 1.2;">.</span></div></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/apply-for-a-2015-north-america-google-policy-fellowship/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>The House of Representatives steps up the fight against human trafficking</title>
		<link>https://googledata.org/google-public-policy/the-house-of-representatives-steps-up-the-fight-against-human-trafficking/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-house-of-representatives-steps-up-the-fight-against-human-trafficking</link>
		<comments>https://googledata.org/google-public-policy/the-house-of-representatives-steps-up-the-fight-against-human-trafficking/#comments</comments>
		<pubDate>Wed, 28 Jan 2015 16:32:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=8cbb9ace161a1f621e93385c916078e6</guid>
		<description><![CDATA[<div dir="ltr"><div dir="ltr"><span><span>Posted by Susan Molinari, Vice President of Government Affairs and Public Policy </span></span></div><b><span><br /></span></b><div dir="ltr"><span><span>There are few issues more horrifying than human slavery and trafficking. Yesterday, the House of Representatives took important steps to address these issues by passing </span><a href="http://docs.house.gov/floor/"><span>twelve bills</span></a><span> aimed at helping the victims and calling attention to these criminal acts. We are encouraged by the actions taken yesterday and applaud the House&#8217;s leadership.</span></span></div><b><span><br /></span></b><div dir="ltr"><span><span>We recently heard about a number of these bills from Members of both the House and Senate at an event Google hosted with the </span><a href="http://www.mccaininstitute.org/"><span>McCain Institute</span></a><span> and </span><a href="http://www.rights4girls.org/"><span>Rights4Girls</span></a><span>. In addition to the launch of the </span><a href="https://www.change.org/p/stop-using-the-term-child-prostitute"><span>No Such Thing campaign</span></a><span> to eradicate the term &#8220;child prostitute,&#8221; we heard from organizations on the frontlines of the modern anti-trafficking movement, including the </span><a href="http://www.missingkids.com/home"><span>National Center for Missing and Exploited Children</span></a><span> (NCMEC), </span><a href="http://www.polarisproject.org/"><span>Polaris</span></a><span>, and </span><a href="http://www.wearethorn.org/"><span>Thorn: Digital Defenders of Children</span></a><span>, about how they are using technology to stop human trafficking and help those who have been trafficked. </span><span>You can watch the event</span><a href="https://www.youtube.com/watch?v=PsEDCXM0ajg&#38;list=UUvslhrSkrrkLifb9d1V1OEA"><span> </span><span>here</span></a><span> and</span><a href="https://www.youtube.com/watch?v=k31YgYsrWzw"><span> </span><span>here</span></a><span>. </span></span></div><b><span><br /></span></b><div dir="ltr"><span><span>Collaboration and technology are key weapons in the fight. That&#8217;s why Google </span><a href="http://googlepublicpolicy.blogspot.com/2015/01/update-helping-human-trafficking-and.html"><span>recently launched a new feature</span></a><span> in our search results with Polaris, connecting victims of human trafficking with organizations who can help. We </span><a href="http://googlepublicpolicy.blogspot.com/2013/04/fighting-human-trafficking_3969.html"><span>also worked with</span></a><span> </span><span>Polaris, La Strada International, and Liberty Asia to launch the Global Human Trafficking Hotline Network, to connect global hotlines and better help victims and prevention efforts. </span><span>Google also has a zero-tolerance policy for any ads for paid sex acts, and we work around the clock to fight illegal content and abuse on our platforms.</span></span></div><span><br /></span><div dir="ltr"><span><span>Fighting human slavery and trafficking is not a partisan issue. The more voices who say it is morally unacceptable to enslave and exploit humans, the more we can reduce the demand and help the victims. There&#8217;s more work to be done, so let&#8217;s keep going &#8212; together.</span></span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; line-height: 1.15; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Posted by Susan Molinari, Vice President of Government Affairs and Public Policy </span></span></div><b id="docs-internal-guid-32385422-3161-cc40-c96a-7a9df0d4dfd0" style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">There are few issues more horrifying than human slavery and trafficking. Yesterday, the House of Representatives took important steps to address these issues by passing </span><a href="http://docs.house.gov/floor/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">twelve bills</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> aimed at helping the victims and calling attention to these criminal acts. We are encouraged by the actions taken yesterday and applaud the House’s leadership.</span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">We recently heard about a number of these bills from Members of both the House and Senate at an event Google hosted with the </span><a href="http://www.mccaininstitute.org/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">McCain Institute</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> and </span><a href="http://www.rights4girls.org/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Rights4Girls</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. In addition to the launch of the </span><a href="https://www.change.org/p/stop-using-the-term-child-prostitute" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">No Such Thing campaign</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to eradicate the term “child prostitute,” we heard from organizations on the frontlines of the modern anti-trafficking movement, including the </span><a href="http://www.missingkids.com/home" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">National Center for Missing and Exploited Children</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (NCMEC), </span><a href="http://www.polarisproject.org/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Polaris</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, and </span><a href="http://www.wearethorn.org/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Thorn: Digital Defenders of Children</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, about how they are using technology to stop human trafficking and help those who have been trafficked. </span><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">You can watch the event</span><a href="https://www.youtube.com/watch?v=PsEDCXM0ajg&amp;list=UUvslhrSkrrkLifb9d1V1OEA" style="text-decoration: none;"><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: white; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">here</span></a><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> and</span><a href="https://www.youtube.com/watch?v=k31YgYsrWzw" style="text-decoration: none;"><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: white; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">here</span></a><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. </span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Collaboration and technology are key weapons in the fight. That’s why Google </span><a href="http://googlepublicpolicy.blogspot.com/2015/01/update-helping-human-trafficking-and.html" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">recently launched a new feature</span></a><span style="background-color: white; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> in our search results with Polaris, connecting victims of human trafficking with organizations who can help. We </span><a href="http://googlepublicpolicy.blogspot.com/2013/04/fighting-human-trafficking_3969.html" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">also worked with</span></a><span style="background-color: white; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Polaris, La Strada International, and Liberty Asia to launch the Global Human Trafficking Hotline Network, to connect global hotlines and better help victims and prevention efforts. </span><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Google also has a zero-tolerance policy for any ads for paid sex acts, and we work around the clock to fight illegal content and abuse on our platforms.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Fighting human slavery and trafficking is not a partisan issue. The more voices who say it is morally unacceptable to enslave and exploit humans, the more we can reduce the demand and help the victims. There’s more work to be done, so let’s keep going — together.</span></span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/the-house-of-representatives-steps-up-the-fight-against-human-trafficking/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>UPDATE: Helping Human Trafficking and Modern Day Slavery Victims Around the World</title>
		<link>https://googledata.org/google-public-policy/update-helping-human-trafficking-and-modern-day-slavery-victims-around-the-world/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=update-helping-human-trafficking-and-modern-day-slavery-victims-around-the-world</link>
		<comments>https://googledata.org/google-public-policy/update-helping-human-trafficking-and-modern-day-slavery-victims-around-the-world/#comments</comments>
		<pubDate>Mon, 12 Jan 2015 20:14:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>
		<category><![CDATA[search]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=e619541191622df734dd78cf117ebe51</guid>
		<description><![CDATA[According to the U.S. Trafficking In Persons Report, there may be more than 20 million trafficking victims at any time in the world, but only about 40,000 victims are identified each year. To connect victims of human trafficking to the organizations wh...]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="vertical-align: baseline; white-space: pre-wrap;">According to the </span><a href="http://www.state.gov/j/tip/rls/tiprpt/" style="line-height: 1.15; text-decoration: none;"><span style="color: #1155cc; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">U.S. Trafficking In Persons Report</span></a><span style="vertical-align: baseline; white-space: pre-wrap;">, there may be more than 20 million trafficking victims at any time in the world, but only about 40,000 victims are identified each year. To connect victims of human trafficking to the organizations who can help them, we recently launched a new feature that displays human trafficking hotline numbers when users type in </span><a href="https://www.google.com/#q=boyfriend+tries+pimp+me+out" style="line-height: 1.15; text-decoration: none;"><span style="color: #1155cc; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">relevant keywords in search</span></a><span style="vertical-align: baseline; white-space: pre-wrap;">. </span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">In July 2014, we launched this feature for the U.S., Japan and South Korea and today we are making it available in 9 more countries in 14 different languages. From working with our partners across the globe, we know that these hotlines play an indispensable role in the fight against human trafficking. Victims may be unfamiliar with support agencies or organizations in their area or unaware there is help available at all. </span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">These hotlines can make life-changing connections to services like crisis response, emergency housing, counseling, and legal aid at the moment victims need them. Confidential hotlines make certain victims receive the anonymity and protection they need to stay safe.</span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span id="docs-internal-guid-71dda903-dfc6-2750-7bf8-d7a37e5c2476"><span style="background-color: white; vertical-align: baseline;"><span style="font-family: Arial, Helvetica, sans-serif;"><img height="345px;" src="https://lh3.googleusercontent.com/6NetrkzcuMm7kcbIxqyinP4rV-xDV69mTu3JrXkSfmGUI9370TLTudnf05mzGBFzR2M7QT3lPKpfeBcbxNODp3MwPWo4UM7THrdZmiv_sv5U8fwqqRNemD1kvIGWVkF3Wg" style="-webkit-transform: rotate(0rad); border: none;" width="183px;" /></span></span></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">This search feature was made possible because of the work the following organizations do every day to fight human trafficking around the world: </span><a href="http://www.polarisproject.org/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Polaris</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (US), </span><a href="http://lhj.jp/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Lighthouse Support Center for Human Trafficking Victims</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (Japan), </span><a href="http://www.dasi.or.kr/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Dasi Hamkke Center</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (South Korea), </span><a href="http://www.twrf.org.tw/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Taipei Women's Rescue Foundation</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (Taiwan), </span><a href="http://lastradainternational.org/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">La Strada</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (Bulgaria, Czech Republic, Moldova, Poland and Ukraine), </span><a href="http://www.1109.gr/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">The A21 Campaign</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (Greece), </span><a href="http://www.astra.org.rs/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">ASTRA Anti-Trafficking Action</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (Serbia), and </span><a href="http://www.turkey.iom.int/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">International Organization for Migration</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (Turkey). </span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><b id="docs-internal-guid-71dda903-dfc6-7da9-aacb-fe93d3c42686" style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Since the launch, this feature has already helped </span><a href="http://www.traffickingresourcecenter.org/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">National Human Trafficking Resource Center</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to identify at least 25 human trafficking cases in the U.S. We hope that many more human trafficking victims and potential victims will be able to discover the help that they need when they need it. </span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Posted by Kasumi Widner, Program Manager, Social Impact and Chris Busselle, Principal, Google.org</span></span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/update-helping-human-trafficking-and-modern-day-slavery-victims-around-the-world/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Transparency Report: New numbers and a new look for government requests</title>
		<link>https://googledata.org/google-public-policy/transparency-report-new-numbers-and-a-new-look-for-government-requests/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=transparency-report-new-numbers-and-a-new-look-for-government-requests</link>
		<comments>https://googledata.org/google-public-policy/transparency-report-new-numbers-and-a-new-look-for-government-requests/#comments</comments>
		<pubDate>Mon, 22 Dec 2014 15:26:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=30843de18d5308ba255580e9d57d73f5</guid>
		<description><![CDATA[Posted by: Trevor Callaghan, Director, Legal<br /><br />We <a href="http://googleblog.blogspot.com/2010/04/greater-transparency-around-government.html">launched</a> the <a href="http://www.google.com/transparencyreport/">Transparency Report</a> in 2010 to show how laws and policies affect access to information online, including law enforcement orders for user data and government requests to remove information. Since then, many other companies have <a href="https://www.accessnow.org/blog/2014/11/19/disclose-all-the-things-access-launches-transparency-reporting-index">launched their own transparency reports</a>, and we&#8217;ve been excited to see our industry come together around transparency.<br /><br />After doing things the same way for nearly five years, we thought it was time to give the Transparency Report an update. So today, as we release data about <a href="http://www.google.com/transparencyreport/removals/government/">requests from governments to remove content</a> from our services for the ninth time, we&#8217;re doing it with a new look and some new features that we hope will make the information more meaningful, and continue to push the envelope on the story we can tell with this kind of information. <br /><br />More about that shortly&#8212;first, the data highlights. From June to December 2013, we received 3,105 government requests to remove 14,637 pieces of content. You may notice that this total decreased slightly from the first half of 2013; this is due to a spike in requests from Turkey during that period, which has since returned to lower levels. Meanwhile, the number of requests from Russia increased by 25 percent compared to the last reporting period. Requests from Thailand and Italy are on the rise as well. In the second half of 2013, the top three products for which governments requested removals were Blogger (1,066 requests), Search (841 requests) and YouTube (765 requests). In the second half of 2013, 38 percent of government removal requests cited defamation as a reason for removal, 16 percent cited obscenity or nudity, and 11 percent cited privacy or security. <br /><br />As for the redesign, we&#8217;ve worked with our friends at Blue State Digital on a more interactive Transparency Report that lets us include additional information&#8212;like explanations of our process&#8212;and highlight stats. We&#8217;ve also added examples of nearly 30 actual requests we&#8217;ve received from governments around the world. For example, we have an annotation that gives a bit of descriptive information about our first government request from Kosovo, when law enforcement requested the removal of two YouTube videos showing minors fighting. If you&#8217;re looking for details on the content types and reasons for removal, use the Country explorer to dig into those details for each of the listed countries.*<br /><br />Our Transparency Report is certainly not a comprehensive view of censorship online. However, it does provide a lens on the things that governments and courts ask us to remove, underscoring the importance of transparency around the processes governing such requests. We hope that you'll take the time to explore the new report to learn more about the government removals across Google.<br /><br /><b><i>*Update</i> Jan 16:</b> We updated the 'Country Explorer' section of the Transparency Report on January 16, 2015 to correct inaccuracies in the initially reported Government Requests figures.]]></description>
				<content:encoded><![CDATA[Posted by: Trevor Callaghan, Director, Legal<br /><br />We <a href="http://googleblog.blogspot.com/2010/04/greater-transparency-around-government.html">launched</a> the <a href="http://www.google.com/transparencyreport/">Transparency Report</a> in 2010 to show how laws and policies affect access to information online, including law enforcement orders for user data and government requests to remove information. Since then, many other companies have <a href="https://www.accessnow.org/blog/2014/11/19/disclose-all-the-things-access-launches-transparency-reporting-index">launched their own transparency reports</a>, and we’ve been excited to see our industry come together around transparency.<br /><br />After doing things the same way for nearly five years, we thought it was time to give the Transparency Report an update. So today, as we release data about <a href="http://www.google.com/transparencyreport/removals/government/">requests from governments to remove content</a> from our services for the ninth time, we’re doing it with a new look and some new features that we hope will make the information more meaningful, and continue to push the envelope on the story we can tell with this kind of information. <br /><br />More about that shortly—first, the data highlights. From June to December 2013, we received 3,105 government requests to remove 14,637 pieces of content. You may notice that this total decreased slightly from the first half of 2013; this is due to a spike in requests from Turkey during that period, which has since returned to lower levels. Meanwhile, the number of requests from Russia increased by 25 percent compared to the last reporting period. Requests from Thailand and Italy are on the rise as well. In the second half of 2013, the top three products for which governments requested removals were Blogger (1,066 requests), Search (841 requests) and YouTube (765 requests). In the second half of 2013, 38 percent of government removal requests cited defamation as a reason for removal, 16 percent cited obscenity or nudity, and 11 percent cited privacy or security. <br /><br />As for the redesign, we’ve worked with our friends at Blue State Digital on a more interactive Transparency Report that lets us include additional information—like explanations of our process—and highlight stats. We’ve also added examples of nearly 30 actual requests we’ve received from governments around the world. For example, we have an annotation that gives a bit of descriptive information about our first government request from Kosovo, when law enforcement requested the removal of two YouTube videos showing minors fighting. If you’re looking for details on the content types and reasons for removal, use the Country explorer to dig into those details for each of the listed countries.*<br /><br />Our Transparency Report is certainly not a comprehensive view of censorship online. However, it does provide a lens on the things that governments and courts ask us to remove, underscoring the importance of transparency around the processes governing such requests. We hope that you'll take the time to explore the new report to learn more about the government removals across Google.<br /><br /><b><i>*Update</i> Jan 16:</b> We updated the 'Country Explorer' section of the Transparency Report on January 16, 2015 to correct inaccuracies in the initially reported Government Requests figures.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/transparency-report-new-numbers-and-a-new-look-for-government-requests/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Powerful new tools in Arabic and English for constitution drafters and citizens</title>
		<link>https://googledata.org/google-public-policy/powerful-new-tools-in-arabic-and-english-for-constitution-drafters-and-citizens/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=powerful-new-tools-in-arabic-and-english-for-constitution-drafters-and-citizens</link>
		<comments>https://googledata.org/google-public-policy/powerful-new-tools-in-arabic-and-english-for-constitution-drafters-and-citizens/#comments</comments>
		<pubDate>Mon, 15 Dec 2014 16:18:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=1f4a03cd27b2d1c332e5e83ffc5ca1fa</guid>
		<description><![CDATA[<div dir="ltr"><div dir="ltr"><span><span>Those who write (and re-write) national constitutions naturally learn and draw from the work of other drafters. </span><a href="http://constituteproject.org/"><span>Constitute</span></a><span>, </span><span>a website that </span><span>digitizes and indexes the world&#8217;s constitutions which Google Ideas launched in 2013 with </span><span>the </span><a href="http://comparativeconstitutionsproject.org/"><span>Comparative Constitutions Project</span></a><span>, has made this process </span><a href="http://googleblog.blogspot.com/2013/09/explore-worlds-constitutions-with-new.html"><span>even easier</span></a><span>.</span></span></div><b><span><br /></span></b><div dir="ltr"><span><span>Today marks the launch of </span><a href="https://www.constituteproject.org/?lang=ar"><span>Constitute in Arabic</span></a><span>, which promises to make the process of constitutional drafting and analysis more accessible across the Arab world. The site now provides Arabic translations of some of the world&#8217;s most-cited constitutions, coupled with powerful analytical tools. </span></span></div><b><span><br /></span></b><div dir="ltr"><span><span>We&#8217;re also introducing new, powerful features across the English and Arabic versions of the site. A new &#8220;compare&#8221; functionality lets you view two constitutions side-by-side, inviting an entirely different perspective. Curious how the Japanese Constitution of 1946, drafted under U.S. occupation, compares to that of the U.S.? &#160;View them </span><a href="https://www.constituteproject.org/search?compare=Japan_1946&#38;compare=United_States_of_America_1992"><span>side-by-side</span></a><span> and compare them provision by provision (for example, on the topic of </span><a href="https://www.constituteproject.org/search?key=evidence"><span>search and seizure</span></a><span> rights) in a clean, easy-to-read layout. </span></span></div><div dir="ltr"><span><span> </span></span></div><div dir="ltr"><span><span><img alt="Screen Shot 2014-12-09 at 3.27.57 PM.png" height="348" src="https://lh3.googleusercontent.com/AvKV094pXJFMpmMyvJDAeuVmKx67MXrAaaNK1-qh9dTNY8EWXz7nl1rkJtiu4kkJFzOTJZG0MPtrrBi-GHPDiqKNF_FZmukOuNu8D6l8tGkFnxDSy31EDxc2HNH9W3GYKQ" width="640"></span></span></div><b><span><br /></span></b><div dir="ltr"><span><span>Constitute also includes new options for saving and sharing content. You can now pin constitutional excerpts, comparisons and entire searches, and export the results to for easy collaborative drafting, reading or analysis. You can also share to social media, or send links to specific locations in any of the documents&#8212;for example, </span><a href="https://www.constituteproject.org/search?key=equalgr1&#38;region=Africa"><span>explore</span></a><span> which African constitutions have provisions on gender equality.&#160;</span></span></div><div dir="ltr"><span><br /></span></div><div dir="ltr"><span>Finally, developers and data enthusiasts&#8212;and their machine counterparts&#8212;will be able to build upon Constitute&#8217;s underlying data through an </span><a href="https://www.constituteproject.org/ontology"><span>open data portal</span></a><span> which includes access to Constitute&#8217;s API.</span></div><b><span><br /></span></b><div dir="ltr"><span><span>On average, five new constitutions are written every year and even more are amended. Creating a document to serve as the bedrock of one&#8217;s society is a huge undertaking, which is why Google Ideas collaborated with the </span><a href="http://comparativeconstitutionsproject.org/"><span>Comparative Constitutions Project</span></a><span> to seed Constitute in 2013. </span><span>We hope today&#8217;s additions to Constitute will help </span><span>equip constitutional drafters and citizens of every country with the remarkable power of knowledge. </span></span></div><span><br /></span><div dir="ltr"><span><span>Posted by Brett Perlmutter, Special Projects Lead, Google Ideas</span></span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="vertical-align: baseline; white-space: pre-wrap;">Those who write (and re-write) national constitutions naturally learn and draw from the work of other drafters. </span><a href="http://constituteproject.org/" style="line-height: 1.15; text-decoration: none;"><span style="color: #1155cc; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Constitute</span></a><span style="color: #222222; vertical-align: baseline; white-space: pre-wrap;">, </span><span style="vertical-align: baseline; white-space: pre-wrap;">a website that </span><span style="color: #222222; vertical-align: baseline; white-space: pre-wrap;">digitizes and indexes the world’s constitutions which Google Ideas launched in 2013 with </span><span style="vertical-align: baseline; white-space: pre-wrap;">the </span><a href="http://comparativeconstitutionsproject.org/" style="line-height: 1.15; text-decoration: none;"><span style="color: #1155cc; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Comparative Constitutions Project</span></a><span style="color: #222222; vertical-align: baseline; white-space: pre-wrap;">, has made this process </span><a href="http://googleblog.blogspot.com/2013/09/explore-worlds-constitutions-with-new.html" style="line-height: 1.15; text-decoration: none;"><span style="color: #1155cc; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">even easier</span></a><span style="color: #222222; vertical-align: baseline; white-space: pre-wrap;">.</span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Today marks the launch of </span><a href="https://www.constituteproject.org/?lang=ar" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Constitute in Arabic</span></a><span style="background-color: transparent; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, which promises to make the process of constitutional drafting and analysis more accessible across the Arab world. The site now provides Arabic translations of some of the world’s most-cited constitutions, coupled with powerful analytical tools. </span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">We’re also introducing new, powerful features across the English and Arabic versions of the site. A new “compare” functionality lets you view two constitutions side-by-side, inviting an entirely different perspective. Curious how the Japanese Constitution of 1946, drafted under U.S. occupation, compares to that of the U.S.? &nbsp;View them </span><a href="https://www.constituteproject.org/search?compare=Japan_1946&amp;compare=United_States_of_America_1992" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">side-by-side</span></a><span style="background-color: transparent; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> and compare them provision by provision (for example, on the topic of </span><a href="https://www.constituteproject.org/search?key=evidence" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">search and seizure</span></a><span style="background-color: transparent; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> rights) in a clean, easy-to-read layout. </span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"> </span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><span style="background-color: transparent; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><img alt="Screen Shot 2014-12-09 at 3.27.57 PM.png" height="348" src="https://lh3.googleusercontent.com/AvKV094pXJFMpmMyvJDAeuVmKx67MXrAaaNK1-qh9dTNY8EWXz7nl1rkJtiu4kkJFzOTJZG0MPtrrBi-GHPDiqKNF_FZmukOuNu8D6l8tGkFnxDSy31EDxc2HNH9W3GYKQ" style="-webkit-transform: rotate(0rad); border: none;" width="640" /></span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Constitute also includes new options for saving and sharing content. You can now pin constitutional excerpts, comparisons and entire searches, and export the results to for easy collaborative drafting, reading or analysis. You can also share to social media, or send links to specific locations in any of the documents—for example, </span><a href="https://www.constituteproject.org/search?key=equalgr1&amp;region=Africa" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">explore</span></a><span style="background-color: transparent; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> which African constitutions have provisions on gender equality.&nbsp;</span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="color: #222222; font-family: Arial, Helvetica, sans-serif; line-height: 1.15; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="color: #222222; font-family: Arial, Helvetica, sans-serif; line-height: 1.15; vertical-align: baseline; white-space: pre-wrap;">Finally, developers and data enthusiasts—and their machine counterparts—will be able to build upon Constitute’s underlying data through an </span><a href="https://www.constituteproject.org/ontology" style="font-family: Arial, Helvetica, sans-serif; line-height: 1.15; text-decoration: none;"><span style="color: #1155cc; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">open data portal</span></a><span style="color: #222222; font-family: Arial, Helvetica, sans-serif; line-height: 1.15; vertical-align: baseline; white-space: pre-wrap;"> which includes access to Constitute’s API.</span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">On average, five new constitutions are written every year and even more are amended. Creating a document to serve as the bedrock of one’s society is a huge undertaking, which is why Google Ideas collaborated with the </span><a href="http://comparativeconstitutionsproject.org/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Comparative Constitutions Project</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to seed Constitute in 2013. </span><span style="background-color: transparent; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">We hope today’s additions to Constitute will help </span><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">equip constitutional drafters and citizens of every country with the remarkable power of knowledge. </span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Posted by Brett Perlmutter, Special Projects Lead, Google Ideas</span></span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/powerful-new-tools-in-arabic-and-english-for-constitution-drafters-and-citizens/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Tackling Teen Substance Abuse: New Online Tools for Families Seeking Answers</title>
		<link>https://googledata.org/google-public-policy/tackling-teen-substance-abuse-new-online-tools-for-families-seeking-answers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=tackling-teen-substance-abuse-new-online-tools-for-families-seeking-answers</link>
		<comments>https://googledata.org/google-public-policy/tackling-teen-substance-abuse-new-online-tools-for-families-seeking-answers/#comments</comments>
		<pubDate>Thu, 20 Nov 2014 21:09:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[advertising]]></category>
		<category><![CDATA[adwords]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=7eceda78a8f1146ef52f90df2d5f0984</guid>
		<description><![CDATA[<div dir="ltr"><div dir="ltr"><span>Earlier this year, we began working with the Partnership for Drug-Free Kids to help people find helpful information about substance abuse online. &#160;This is a guest post from their President and CEO, Steve Pasierb, describing our efforts together and the organization&#8217;s ongoing work to keep teens safe. -Ed</span></div><b><br /></b><br /><div dir="ltr"><span>The </span><a href="http://www.drugfree.org/"><span>Partnership for Drug-Free Kids</span></a><span> is dedicated to reducing teen substance abuse and helping families impacted by addiction. We are the only family-focused nonprofit that provides resources and direct support to help families prevent and cope with teen drug and alcohol abuse. </span></div><b><br /></b><br /><div dir="ltr"><span>The modern path to substance abuse looks very different than it did when today's parents were teens themselves. As we all know, people are spending more of their time online, across a variety of connected devices. &#160;As a result, it&#8217;s increasingly important for our information to be accessible anytime, on the web and in mobile apps.</span></div><b><br /></b><br /><div dir="ltr"><span>Thanks to a recent donation from Google, we&#8217;ve created innovative new content and tools that will help countless families find answers in the midst of a crisis, or before one ever happens. </span></div><b><br /></b><br /><div dir="ltr"><span>Since beginning our work together in April, Google has funded search advertising campaigns, helped develop a mobile app with substance abuse-related information, improved our </span><a href="http://www.drugfree.org/"><span>website</span></a><span>, and plans to revamp our YouTube channel. &#160;All of this is complemented by their ongoing efforts to </span><a href="http://googlepublicpolicy.blogspot.com/2013/06/combating-rogue-online-pharmacies.html"><span>fight rogue online pharmacies</span></a><span> &#8212;&#160;Google has removed more than 7 million ads for these outfits this year alone. This work makes it harder for people to buy controlled substances online without a valid prescription, thereby reducing illicit access to these medications and reducing abuse. &#160;</span></div><b><br /></b><div dir="ltr"><span><img height="181px;" src="https://lh6.googleusercontent.com/KHhPxpVAYeuY6Jbnlg5LGRM2dZBNrjVRoSDl8tWxkVQJqKPCMhEUAAQIDe9KJOj3tpAU5H_7lBUw2CllhM4TR9LUTVuQi7P0Md0YNfC9czlngd60RJG0kBjzPaQENCHBhA" width="624px;"></span></div><div dir="ltr"><span><span>Search advertising campaigns funded by Google</span></span></div><b><br /></b><br /><div dir="ltr"><span><img alt="D1.png" height="428px;" src="https://lh3.googleusercontent.com/-CJA0nWPsSny7_rHnWz_W0sgcbSp0e3dq1zWawbILTwZqfmQz8b3TAZ8LV-MExtlk81veb1-r9Pr6K4WzYWobNqY8-pXw0eF6VBDfT1bp-6_epqYE7Tr7rwO3_hDzVe1xg" width="253px;"></span><span> </span><span><img alt="D2.png" height="429px;" src="https://lh4.googleusercontent.com/JIWsMe-TEbdO0lPf988Gw9wL48rABhsEzkF--4nCSxnKTnG9idK_9bPlbgktVgS8IGXCJ4FFCQZbFr24Y_o36-uZDGKBA0GZmMn-r-BTSav5NIaH3nOfJR3hCUFYMI2f6Q" width="252px;"></span></div><div dir="ltr"><span>Users will be able to find information about substance-abuse including: images, common slang terms, short- and long-term effects of each drug, and how to get help in our upcoming mobile app</span></div><br /><div dir="ltr"><span>Our national action campaign, the </span><a href="http://medicineabuseproject.org/"><span>Medicine Abuse Project</span></a><span>, is rallying parents, educators, health care providers, communities, and law enforcement to collectively help prevent half a million teens from abusing prescription drugs and over-the-counter cough medicine. &#160;Thanks to invaluable partners like Google, we are able to expand our reach, sharpen our tools and help parents navigate the teen years with help at their fingertips.</span></div><div dir="ltr"><br /></div><div dir="ltr"><span>Posted by Steve Pasierb, President and CEO, Partnership for Drug-Free Kids</span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #262626; font-family: Arial; font-style: italic; line-height: 1.8; white-space: pre-wrap;">Earlier this year, we began working with the Partnership for Drug-Free Kids to help people find helpful information about substance abuse online. &nbsp;This is a guest post from their President and CEO, Steve Pasierb, describing our efforts together and the organization’s ongoing work to keep teens safe. -Ed</span></div><b style="font-weight: normal;"><br /></b><br /><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The </span><a href="http://www.drugfree.org/" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Partnership for Drug-Free Kids</span></a><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> is dedicated to reducing teen substance abuse and helping families impacted by addiction. We are the only family-focused nonprofit that provides resources and direct support to help families prevent and cope with teen drug and alcohol abuse. </span></div><b style="font-weight: normal;"><br /></b><br /><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The modern path to substance abuse looks very different than it did when today's parents were teens themselves. As we all know, people are spending more of their time online, across a variety of connected devices. &nbsp;As a result, it’s increasingly important for our information to be accessible anytime, on the web and in mobile apps.</span></div><b style="font-weight: normal;"><br /></b><br /><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Thanks to a recent donation from Google, we’ve created innovative new content and tools that will help countless families find answers in the midst of a crisis, or before one ever happens. </span></div><b style="font-weight: normal;"><br /></b><br /><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Since beginning our work together in April, Google has funded search advertising campaigns, helped develop a mobile app with substance abuse-related information, improved our </span><a href="http://www.drugfree.org/" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">website</span></a><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, and plans to revamp our YouTube channel. &nbsp;All of this is complemented by their ongoing efforts to </span><a href="http://googlepublicpolicy.blogspot.com/2013/06/combating-rogue-online-pharmacies.html" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">fight rogue online pharmacies</span></a><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> —&nbsp;Google has removed more than 7 million ads for these outfits this year alone. This work makes it harder for people to buy controlled substances online without a valid prescription, thereby reducing illicit access to these medications and reducing abuse. &nbsp;</span></div><b style="font-weight: normal;"><br /></b><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><span style="background-color: transparent; color: black; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><img height="181px;" src="https://lh6.googleusercontent.com/KHhPxpVAYeuY6Jbnlg5LGRM2dZBNrjVRoSDl8tWxkVQJqKPCMhEUAAQIDe9KJOj3tpAU5H_7lBUw2CllhM4TR9LUTVuQi7P0Md0YNfC9czlngd60RJG0kBjzPaQENCHBhA" style="-webkit-transform: rotate(0.00rad); border: none; transform: rotate(0.00rad);" width="624px;" /></span></div><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><span style="background-color: white; color: #333333; font-family: Arial; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-size: x-small;">Search advertising campaigns funded by Google</span></span></div><b style="font-weight: normal;"><br /></b><br /><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><img alt="D1.png" height="428px;" src="https://lh3.googleusercontent.com/-CJA0nWPsSny7_rHnWz_W0sgcbSp0e3dq1zWawbILTwZqfmQz8b3TAZ8LV-MExtlk81veb1-r9Pr6K4WzYWobNqY8-pXw0eF6VBDfT1bp-6_epqYE7Tr7rwO3_hDzVe1xg" style="-webkit-transform: rotate(0.00rad); border: none; transform: rotate(0.00rad);" width="253px;" /></span><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><img alt="D2.png" height="429px;" src="https://lh4.googleusercontent.com/JIWsMe-TEbdO0lPf988Gw9wL48rABhsEzkF--4nCSxnKTnG9idK_9bPlbgktVgS8IGXCJ4FFCQZbFr24Y_o36-uZDGKBA0GZmMn-r-BTSav5NIaH3nOfJR3hCUFYMI2f6Q" style="-webkit-transform: rotate(0rad); border: none;" width="252px;" /></span></div><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Users will be able to find information about substance-abuse including: images, common slang terms, short- and long-term effects of each drug, and how to get help in our upcoming mobile app</span></div><br /><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Our national action campaign, the </span><a href="http://medicineabuseproject.org/" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Medicine Abuse Project</span></a><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, is rallying parents, educators, health care providers, communities, and law enforcement to collectively help prevent half a million teens from abusing prescription drugs and over-the-counter cough medicine. &nbsp;Thanks to invaluable partners like Google, we are able to expand our reach, sharpen our tools and help parents navigate the teen years with help at their fingertips.</span></div><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;"><br /></div><div dir="ltr" style="line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #1b1b1b; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Posted by Steve Pasierb, President and CEO, Partnership for Drug-Free Kids</span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/tackling-teen-substance-abuse-new-online-tools-for-families-seeking-answers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Investigathon: Helping investigative journalists access information through the Investigative Dashboard</title>
		<link>https://googledata.org/google-public-policy/investigathon-helping-investigative-journalists-access-information-through-the-investigative-dashboard/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=investigathon-helping-investigative-journalists-access-information-through-the-investigative-dashboard</link>
		<comments>https://googledata.org/google-public-policy/investigathon-helping-investigative-journalists-access-information-through-the-investigative-dashboard/#comments</comments>
		<pubDate>Wed, 12 Nov 2014 15:43:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=761a61d2c9a1c2665fc104cedb2dae01</guid>
		<description><![CDATA[<div dir="ltr"><div><span>As the old saying goes, &#8220;News is something somebody wants to suppress. All the rest is advertising.&#8221; We agree: Investigative journalism is a</span><a href="http://impact.gijn.org/"><span><span> </span></span><span>crucial pillar</span></a><span> </span><span>of free societies. That&#8217;s why we&#8217;re holding an &#8220;Investigathon&#8221; in New York City to share and practice new ways to make investigations more powerful.</span></div><div><b><br /></b></div><div dir="ltr"><span><span>It all starts with data. With the Organized Crime and Corruption Reporting Project, we&#8217;ve built the</span><a href="http://investigativedashboard.org/"><span><span> </span></span><span>Investigative Dashboard</span></a><span> </span><span>to help investigators trace shell company ownership around the world. At the Investigathon, 100 investigators of all stripes will spend the afternoon learning to use the Dashboard and other datasets to trace Eastern European money laundering activities. So many public records are already available to search, sometimes it&#8217;s just a question of knowing how to look. </span></span></div><div><b><br /></b></div><div dir="ltr"><span><span>Data only goes so far without tools. That&#8217;s why we&#8217;ve also been working with</span><a href="http://overviewproject.org/"><span><span> </span></span><span>Overview Project</span></a><span> </span><span>to make it easier to sift through huge volumes of business records. The world doesn&#8217;t need more isolated platforms, so Overview Project will soon have standardized APIs to integrate directly into the Investigative Dashboard,</span><a href="http://vis.occrp.org/"><span> </span><span>Visual Investigative Scenarios</span></a><span>, and beyond.</span></span></div><div><b><br /></b></div><div dir="ltr"><span><span>Finally, knowledge spreads through personal relationships based on trust, so we&#8217;re hoping to play a small role in strengthening the investigative journalism community on the East Coast. When we held our inaugural Investigathon in London, there was so much enthusiasm that</span><a href="http://hackshackers.com/"><span> </span><span>Hacks/Hackers</span></a><span>,</span><a href="https://www.bellingcat.com/"><span> </span><span>Bellingcat</span></a><span>, and OCCRP decided to run six-month series of follow-up workshops and convenings to support the work we started there. </span></span></div><div><b><br /></b></div><div dir="ltr"><span>The challenges of investigative journalists are immense, and the forces arranged against them are formidable. But if people are to have free and open access to the truths about their societies, investigators must stay one step ahead of those who would want to suppress that information. We aim to help, one step at a time.</span></div><div><span><br /><span>Posted by Justin Kosslyn, Product Manager, Google Ideas</span></span></div><br /></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; font-family: Arial; vertical-align: baseline; white-space: pre-wrap;">As the old saying goes, “News is something somebody wants to suppress. All the rest is advertising.” We agree: Investigative journalism is a</span><a href="http://impact.gijn.org/" style="background-color: white; line-height: 1.15; text-decoration: none;"><span style="font-family: Arial; vertical-align: baseline; white-space: pre-wrap;"><span style="color: black;"> </span></span><span style="color: #1155cc; font-family: Arial; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">crucial pillar</span></a><span style="background-color: white; color: #3a4953; font-family: Arial; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: white; font-family: Arial; vertical-align: baseline; white-space: pre-wrap;">of free societies. That’s why we’re holding an “Investigathon” in New York City to share and practice new ways to make investigations more powerful.</span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b style="background-color: white; font-weight: normal;"><br /></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white;"><span style="font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">It all starts with data. With the Organized Crime and Corruption Reporting Project, we’ve built the</span><a href="http://investigativedashboard.org/" style="text-decoration: none;"><span style="font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="color: black;"> </span></span><span style="color: #1155cc; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Investigative Dashboard</span></a><span style="color: #3a4953; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">to help investigators trace shell company ownership around the world. At the Investigathon, 100 investigators of all stripes will spend the afternoon learning to use the Dashboard and other datasets to trace Eastern European money laundering activities. So many public records are already available to search, sometimes it’s just a question of knowing how to look. </span></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b style="background-color: white; font-weight: normal;"><br /></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white;"><span style="font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Data only goes so far without tools. That’s why we’ve also been working with</span><a href="http://overviewproject.org/" style="text-decoration: none;"><span style="font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="color: black;"> </span></span><span style="color: #1155cc; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Overview Project</span></a><span style="color: #3a4953; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">to make it easier to sift through huge volumes of business records. The world doesn’t need more isolated platforms, so Overview Project will soon have standardized APIs to integrate directly into the Investigative Dashboard,</span><a href="http://vis.occrp.org/" style="text-decoration: none;"><span style="color: #3a4953; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Visual Investigative Scenarios</span></a><span style="font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, and beyond.</span></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b style="background-color: white; font-weight: normal;"><br /></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white;"><span style="font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Finally, knowledge spreads through personal relationships based on trust, so we’re hoping to play a small role in strengthening the investigative journalism community on the East Coast. When we held our inaugural Investigathon in London, there was so much enthusiasm that</span><a href="http://hackshackers.com/" style="text-decoration: none;"><span style="color: #3a4953; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Hacks/Hackers</span></a><span style="color: #3a4953; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">,</span><a href="https://www.bellingcat.com/" style="text-decoration: none;"><span style="color: #3a4953; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Bellingcat</span></a><span style="font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, and OCCRP decided to run six-month series of follow-up workshops and convenings to support the work we started there. </span></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b style="background-color: white; font-weight: normal;"><br /></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The challenges of investigative journalists are immense, and the forces arranged against them are formidable. But if people are to have free and open access to the truths about their societies, investigators must stay one step ahead of those who would want to suppress that information. We aim to help, one step at a time.</span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white;"><br /><span style="color: #3a4953; font-family: Arial; vertical-align: baseline; white-space: pre-wrap;">Posted by Justin Kosslyn, Product Manager, Google Ideas</span></span></div><br /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/investigathon-helping-investigative-journalists-access-information-through-the-investigative-dashboard/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>It’s time to extend the US Privacy Act to EU citizens</title>
		<link>https://googledata.org/google-public-policy/its-time-to-extend-the-us-privacy-act-to-eu-citizens/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=its-time-to-extend-the-us-privacy-act-to-eu-citizens</link>
		<comments>https://googledata.org/google-public-policy/its-time-to-extend-the-us-privacy-act-to-eu-citizens/#comments</comments>
		<pubDate>Wed, 12 Nov 2014 13:07:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=983693045b5abeb8d20429033d0a0f5b</guid>
		<description><![CDATA[<div dir="ltr"><i>Cross-posted from the <a href="http://googlepolicyeurope.blogspot.be/2014/11/its-time-to-extend-us-privacy-act-to-eu.html">Google Europe Blog</a>&#160;</i><br /><br />  Last summer&#8217;s Snowden revelations not only highlighted the urgent need for surveillance reform but also severely damaged relations between the US and Europe.<br /><br />Google and many other technology companies have urged the US to take the lead and <a href="http://googlepublicpolicy.blogspot.be/2014/02/its-time-to-reform-government.html">introduce reforms</a> that ensure government surveillance activity is clearly restricted by law, proportionate to the risks, transparent and subject to independent oversight.  Sadly, we&#8217;ve seen little serious reform to date.   <br /><br />However, the US Government can signal a new attitude when representatives of the European Commission visit Washington DC tomorrow.  Right now, European citizens do not have the right to challenge misuse of their data by the US government in US courts -- even though American citizens already enjoy this right in most European countries.  It&#8217;s why Google supports legislation to extend the US Privacy Act to EU citizens.  The Obama Administration has <a href="http://www.theguardian.com/world/2014/jun/25/us-privacy-protection-rights-europe">already pledged</a> its support for this change and we look forward to to working with Congress to try and make this happen.<br /><br />We understand that governments have a duty to protect their citizens.  The emergence of ISIS and other new threats have reminded us all of the dangers we face.  But the balance in the US and many other countries has tipped too far in favour of the state and away from the rights of the individual &#8212; rights that are enshrined in the Universal Declaration of Human Rights.<br /><br />As President Obama recently <a href="http://www.whitehouse.gov/sites/default/files/docs/2014sigint_mem_ppd_rel.pdf">instructed</a> his Intelligence agencies:  &#8220;<i>All persons should be treated with dignity and respect, regardless of their nationality or wherever they might reside, and that all persons have legitimate privacy interests in the handling of their personal information</i>.&#8221;<br /><br />Posted by David Drummond Chief Legal Officer, Google</div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><i>Cross-posted from the <a href="http://googlepolicyeurope.blogspot.be/2014/11/its-time-to-extend-us-privacy-act-to-eu.html">Google Europe Blog</a>&nbsp;</i><br /><br />  Last summer’s Snowden revelations not only highlighted the urgent need for surveillance reform but also severely damaged relations between the US and Europe.<br /><br />Google and many other technology companies have urged the US to take the lead and <a href="http://googlepublicpolicy.blogspot.be/2014/02/its-time-to-reform-government.html">introduce reforms</a> that ensure government surveillance activity is clearly restricted by law, proportionate to the risks, transparent and subject to independent oversight.  Sadly, we’ve seen little serious reform to date.   <br /><br />However, the US Government can signal a new attitude when representatives of the European Commission visit Washington DC tomorrow.  Right now, European citizens do not have the right to challenge misuse of their data by the US government in US courts -- even though American citizens already enjoy this right in most European countries.  It’s why Google supports legislation to extend the US Privacy Act to EU citizens.  The Obama Administration has <a href="http://www.theguardian.com/world/2014/jun/25/us-privacy-protection-rights-europe">already pledged</a> its support for this change and we look forward to to working with Congress to try and make this happen.<br /><br />We understand that governments have a duty to protect their citizens.  The emergence of ISIS and other new threats have reminded us all of the dangers we face.  But the balance in the US and many other countries has tipped too far in favour of the state and away from the rights of the individual — rights that are enshrined in the Universal Declaration of Human Rights.<br /><br />As President Obama recently <a href="http://www.whitehouse.gov/sites/default/files/docs/2014sigint_mem_ppd_rel.pdf">instructed</a> his Intelligence agencies:  “<i>All persons should be treated with dignity and respect, regardless of their nationality or wherever they might reside, and that all persons have legitimate privacy interests in the handling of their personal information</i>.”<br /><br />Posted by David Drummond Chief Legal Officer, Google</div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/its-time-to-extend-the-us-privacy-act-to-eu-citizens/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Continued progress on fighting piracy</title>
		<link>https://googledata.org/google-public-policy/continued-progress-on-fighting-piracy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=continued-progress-on-fighting-piracy</link>
		<comments>https://googledata.org/google-public-policy/continued-progress-on-fighting-piracy/#comments</comments>
		<pubDate>Fri, 17 Oct 2014 14:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=09a7cc918156051f6862f23811618c50</guid>
		<description><![CDATA[<div dir="ltr"><div dir="ltr"><span>Today we&#8217;re publishing a refreshed </span><span><a href="https://drive.google.com/file/d/0BwxyRPFduTN2NmdYdGdJQnFTeTA/view?usp=sharing">How Google Fights Piracy</a></span><span> report, which explains how we combat piracy across our services. This new version updates many of the numbers from the 2013 version and lists a few other developments in the past year:</span></div><ul><li><div dir="ltr"><span>Ad formats.</span><span> We&#8217;ve been testing new ad formats in search results on queries related to music and movies that help people find legitimate sources of media. For the relatively </span><a href="https://www.google.com/trends/explore#q=star%20trek%20into%20darkness%2C%20watch%20star%20trek%20into%20darkness%2C%20download%20star%20trek%20into%20darkness%2C%20free%20star%20trek%20into%20darkness&#38;date=today%2012-m&#38;cmpt=q"><span>small number</span></a><span> of queries for movies that include terms like &#8220;download,&#8221; &#160;&#8220;free,&#8221; or &#8220;watch,&#8221; we&#8217;ve begun to show the following:</span></div></li></ul><div dir="ltr"><span><img alt="Screen Shot 2014-10-10 at 10.58.15 AM.png" height="175" src="https://lh3.googleusercontent.com/HpZIEVfIEhy-NCiQjz_mKwYK3U4bWkCB1DTzCXBGSaBJ3AVFCT23l2wrQ9ANUpj3dpc4V2UJPtaicmeseix_x9TOYwLxXwpLBWIuUXtTvznHZr7DrKU-t8qWexIc7YcdgA" width="400"></span></div><div dir="ltr"><span>We&#8217;re also testing other ways of pointing people to legitimate sources of music and movies, including in the right-hand panel on the results page:</span></div><div dir="ltr"><span><img alt="Screen Shot 2014-10-16 at 7.21.39 PM (1).png" height="241px;" src="https://lh4.googleusercontent.com/2kKAyiMlq6HZ47vSLnmq7Bvgjd7Y-9ZAn8Zq5uf_f3dnT2CB5-Gem4NJyyr3klxvEQoMCNfpdUODE5-c4HWduGrKUkNO--cFfy8WKAEqBJ3FyJrg2PiiwDCeqFNgT3J5tA" width="258px;"></span></div><div dir="ltr"><span>These results show in the U.S. only, but we plan to continue investing in this area and plan to expand internationally.</span></div><ul><li><div dir="ltr"><span>An improved DMCA demotion signal in Search.</span><span> In August 2012 we first </span><a href="http://insidesearch.blogspot.com/2012/08/an-update-to-our-search-algorithms.html"><span>announced</span></a><span> that we would downrank sites for which we received a large number of valid DMCA notices. We&#8217;ve now refined the signal in ways we expect to visibly affect the rankings of some of the most notorious sites. This update will roll out globally starting next week.</span></div></li><li><div dir="ltr"><span>Removing more terms from autocomplete, based on DMCA removal notices.</span><span> We&#8217;ve begun demoting autocomplete predictions that return results with many DMCA demoted sites.</span></div></li></ul><div dir="ltr"><b><br /></b></div><div dir="ltr"><span>Every day our partnership with the entertainment industry deepens. Just this month we launched a </span><a href="https://interstellar.withgoogle.com/"><span>collaboration</span></a><span> with Paramount Pictures to promote their upcoming film &#8220;Interstellar&#8221; with an interactive website. And </span><a href="https://support.google.com/youtube/answer/2797370?hl=en"><span>Content ID</span></a><span> (our system for rightsholders to easily identify and manage their content on YouTube) recently hit the milestone of enabling more than </span><a href="http://qz.com/281013/youtube-is-making-itself-increasingly-indispensable-to-the-music-industry/"><span>$1 billion in revenue</span></a><span> to the content industry.</span></div><div dir="ltr"><b><br /></b></div><div dir="ltr"><span>In addition to strengthening these relationships, we continue to invest in combating piracy across all our services.</span></div><div dir="ltr"><span><br /></span></div><div dir="ltr"><span>Posted by Katherine Oyama, Sr. Copyright Policy Counsel</span></div><div><span><br /></span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;">Today we’re publishing a refreshed </span><span style="font-family: Arial; font-size: 15px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"><a href="https://drive.google.com/file/d/0BwxyRPFduTN2NmdYdGdJQnFTeTA/view?usp=sharing">How Google Fights Piracy</a></span><span style="font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;"> report, which explains how we combat piracy across our services. This new version updates many of the numbers from the 2013 version and lists a few other developments in the past year:</span></div><ul style="margin-bottom: 0pt; margin-top: 0pt;"><li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 10pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Ad formats.</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> We’ve been testing new ad formats in search results on queries related to music and movies that help people find legitimate sources of media. For the relatively </span><a href="https://www.google.com/trends/explore#q=star%20trek%20into%20darkness%2C%20watch%20star%20trek%20into%20darkness%2C%20download%20star%20trek%20into%20darkness%2C%20free%20star%20trek%20into%20darkness&amp;date=today%2012-m&amp;cmpt=q" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">small number</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> of queries for movies that include terms like “download,” &nbsp;“free,” or “watch,” we’ve begun to show the following:</span></div></li></ul><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 10pt; text-align: center;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><img alt="Screen Shot 2014-10-10 at 10.58.15 AM.png" height="175" src="https://lh3.googleusercontent.com/HpZIEVfIEhy-NCiQjz_mKwYK3U4bWkCB1DTzCXBGSaBJ3AVFCT23l2wrQ9ANUpj3dpc4V2UJPtaicmeseix_x9TOYwLxXwpLBWIuUXtTvznHZr7DrKU-t8qWexIc7YcdgA" style="-webkit-transform: rotate(0rad); border: none;" width="400" /></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-left: 36pt; margin-top: 10pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">We’re also testing other ways of pointing people to legitimate sources of music and movies, including in the right-hand panel on the results page:</span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-left: 36pt; margin-top: 10pt; text-align: center;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><img alt="Screen Shot 2014-10-16 at 7.21.39 PM (1).png" height="241px;" src="https://lh4.googleusercontent.com/2kKAyiMlq6HZ47vSLnmq7Bvgjd7Y-9ZAn8Zq5uf_f3dnT2CB5-Gem4NJyyr3klxvEQoMCNfpdUODE5-c4HWduGrKUkNO--cFfy8WKAEqBJ3FyJrg2PiiwDCeqFNgT3J5tA" style="-webkit-transform: rotate(0rad); border: none;" width="258px;" /></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-left: 36pt; margin-top: 10pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">These results show in the U.S. only, but we plan to continue investing in this area and plan to expand internationally.</span></div><ul style="margin-bottom: 0pt; margin-top: 0pt;"><li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 10pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">An improved DMCA demotion signal in Search.</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> In August 2012 we first </span><a href="http://insidesearch.blogspot.com/2012/08/an-update-to-our-search-algorithms.html" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">announced</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> that we would downrank sites for which we received a large number of valid DMCA notices. We’ve now refined the signal in ways we expect to visibly affect the rankings of some of the most notorious sites. This update will roll out globally starting next week.</span></div></li><li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 10pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Removing more terms from autocomplete, based on DMCA removal notices.</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> We’ve begun demoting autocomplete predictions that return results with many DMCA demoted sites.</span></div></li></ul><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b style="font-weight: normal;"><br /></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Every day our partnership with the entertainment industry deepens. Just this month we launched a </span><a href="https://interstellar.withgoogle.com/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">collaboration</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> with Paramount Pictures to promote their upcoming film “Interstellar” with an interactive website. And </span><a href="https://support.google.com/youtube/answer/2797370?hl=en" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Content ID</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (our system for rightsholders to easily identify and manage their content on YouTube) recently hit the milestone of enabling more than </span><a href="http://qz.com/281013/youtube-is-making-itself-increasingly-indispensable-to-the-music-industry/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">$1 billion in revenue</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to the content industry.</span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b style="font-weight: normal;"><br /></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">In addition to strengthening these relationships, we continue to invest in combating piracy across all our services.</span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Posted by Katherine Oyama, Sr. Copyright Policy Counsel</span></div><div><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/continued-progress-on-fighting-piracy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Launching YouTube for Government</title>
		<link>https://googledata.org/youtube/launching-youtube-for-government/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=launching-youtube-for-government</link>
		<comments>https://googledata.org/youtube/launching-youtube-for-government/#comments</comments>
		<pubDate>Thu, 02 Oct 2014 14:06:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[Youtube]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=98a70654d97a508f3e018004aa52fd13</guid>
		<description><![CDATA[<div dir="ltr"><span><i><span>Cross-posted from the <a href="https://googlepolitics.blogspot.com/b/post-preview?token=0PLi0kgBAAA.Ma9S7S_wmmlkzy_XrZcbig.LPs5cLoVt-K-9VVrEoMkwA&#38;postId=8106479408597665278&#38;type=POST#!/2014/10/launching-youtube-for-government.html">Google Politics &#38; Elections Blog </a></span></i></span></div><div dir="ltr"><span><i><span><br /></span></i></span></div><div dir="ltr"><span><span>Posted by Brandon Feldman, YouTube News &#38; Politics</span></span></div><b><span><br /></span></b><br /><div dir="ltr"><span><span>From live streams of the </span><a href="https://www.youtube.com/watch?v=arhBRouSmWs"><span>State of the Union</span></a><span> and </span><a href="http://www.youtube.com/watch?v=6PqwQktSEFQ"><span>legislative hearings</span></a><span>, to </span><a href="https://www.youtube.com/watch?v=58ivO5ioq3M&#38;"><span>explainer videos</span></a><span> on important issues and </span><a href="http://www.youtube.com/watch?v=q-DtmzmFbro"><span>Hangouts</span></a><span> with constituents, YouTube has become an important platform where citizens engage with their governments and elected officials.</span></span></div><b><span><br /></span></b><br /><div dir="ltr"><span><span>In order to help government officials get a better idea of what YouTube can do, we are launching <a href="http://youtube.com/government101">youtube.com/government101</a>, a one-stop shop where government officials can learn how to get the most out of YouTube as a communication tool.</span></span></div><b><span><br /></span></b><br /><div><b><span><a href="http://youtube.com/government101"><img height="404px;" src="https://lh3.googleusercontent.com/JZzuMcShDNxbnNb4MP88Wz7sUX3Tk_FXZfHwFTwGLabeJMpCGT-Wo0ll5V6nHSpzZf0NisyTcuwlFQKrmW0u25YV_hqOTJb_3gK4n3hYViUFY_uKeB6ZAdmZNXbFKXlnuA" width="346px;"></a></span></b></div><b><span><br /></span></b><div dir="ltr"><span><span>The site offers a broad range of YouTube advice, from the basics of creating a channel to in-depth guidance on features like live streaming, annotations, playlists and more. We&#8217;ve also featured case studies from government offices around the world that are using YouTube in innovative ways. </span></span></div><span><br /></span><br /><div dir="ltr"><span><span>If you're a government official, whether you are looking for an answer to a quick question or need a full training on YouTube best practices, we hope this resource will help you engage in a rich dialogue with your constituents and increase transparency within your community. </span></span></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="line-height: 1.15; white-space: pre-wrap;"><i><span style="font-family: Arial, Helvetica, sans-serif;">Cross-posted from the <a href="https://googlepolitics.blogspot.com/b/post-preview?token=0PLi0kgBAAA.Ma9S7S_wmmlkzy_XrZcbig.LPs5cLoVt-K-9VVrEoMkwA&amp;postId=8106479408597665278&amp;type=POST#!/2014/10/launching-youtube-for-government.html">Google Politics &amp; Elections Blog </a></span></i></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="line-height: 1.15; white-space: pre-wrap;"><i><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></i></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="line-height: 1.15; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Posted by Brandon Feldman, YouTube News &amp; Politics</span></span></div><b id="docs-internal-guid-908dbe8d-d12c-f4d1-6349-c4d35834a1ac" style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">From live streams of the </span><a href="https://www.youtube.com/watch?v=arhBRouSmWs" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">State of the Union</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> and </span><a href="http://www.youtube.com/watch?v=6PqwQktSEFQ" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">legislative hearings</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, to </span><a href="https://www.youtube.com/watch?v=58ivO5ioq3M&amp;" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">explainer videos</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> on important issues and </span><a href="http://www.youtube.com/watch?v=q-DtmzmFbro" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Hangouts</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> with constituents, YouTube has become an important platform where citizens engage with their governments and elected officials.</span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">In order to help government officials get a better idea of what YouTube can do, we are launching <a href="http://youtube.com/government101">youtube.com/government101</a>, a one-stop shop where government officials can learn how to get the most out of YouTube as a communication tool.</span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><br /><div style="text-align: center;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><a href="http://youtube.com/government101"><img height="404px;" src="https://lh3.googleusercontent.com/JZzuMcShDNxbnNb4MP88Wz7sUX3Tk_FXZfHwFTwGLabeJMpCGT-Wo0ll5V6nHSpzZf0NisyTcuwlFQKrmW0u25YV_hqOTJb_3gK4n3hYViUFY_uKeB6ZAdmZNXbFKXlnuA" style="-webkit-transform: rotate(0rad); border: none;" width="346px;" /></a></span></b></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">The site offers a broad range of YouTube advice, from the basics of creating a channel to in-depth guidance on features like live streaming, annotations, playlists and more. We’ve also featured case studies from government offices around the world that are using YouTube in innovative ways. </span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">If you're a government official, whether you are looking for an answer to a quick question or need a full training on YouTube best practices, we hope this resource will help you engage in a rich dialogue with your constituents and increase transparency within your community. </span></span></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/youtube/launching-youtube-for-government/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Fighting Online Hate Speech</title>
		<link>https://googledata.org/google-public-policy/fighting-online-hate-speech/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fighting-online-hate-speech</link>
		<comments>https://googledata.org/google-public-policy/fighting-online-hate-speech/#comments</comments>
		<pubDate>Tue, 23 Sep 2014 18:03:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=c80ed36c0baaf32f94124f71efd7aa2d</guid>
		<description><![CDATA[<div dir="ltr"><div dir="ltr"><span><span><i>Posted by Christine Y. Chen, Senior Manager, Public Policy</i></span></span></div><div dir="ltr"><span><br /></span></div><div dir="ltr"><span>Earlier today, the Anti-Defamation League (ADL) </span><a href="http://www.adl.org/press-center/press-releases/discrimination-racism-bigotry/adl-releases-best-practices-challenging-cyberhate.html#.VCGg9S5dV9n"><span>released</span></a><span> its &#8220;</span><a href="http://www.adl.org/combating-hate/cyber-safety/best-practices/"><span>Best Practices for Responding to Cyberhate</span></a><span>.&#8221; For two years, Google has participated in an industry working group convened by the ADL where, together with several other companies, other NGOs, and academics, we have exchanged insights and ideas on how to balance the need for responsible discourse with the principles of free expression. The best practices set forth by the ADL grew out of these conversations and we are excited to see them being shared with the wider Internet community.</span></div><b><br /></b><br /><div dir="ltr"><span>In line with the practices set forth by the ADL, we work hard at Google to combat the spread of hateful content in order to maintain safe and vibrant communities on platforms like YouTube, Blogger, and Google+. </span><span>We don&#8217;t allow content that promotes or condones violence or that has the primary purpose of inciting hatred on the basis of race or ethnic origin, religion, disability, gender, sexual orientation or gender identity, age, nationality, or veteran status. </span></div><b><br /></b><br /><div dir="ltr"><span>To make sure these communities stay vibrant, we also depend on our users to let us know when they see content that violates our policies. The </span><a href="http://www.google.com/safetycenter/tools/"><span>Google Safety Center</span></a><span> gives an overview of the tools that people can use to report content that violates our user policies on different products. </span></div><b><br /></b><br /><div dir="ltr"></div><b><br /></b><br /><div dir="ltr"><span>Here are more details about some of our content policies and how to flag violations:</span></div><b><br /></b><br /><ul><li><div dir="ltr"><span>YouTube:</span><span> If you see videos that run afoul of our </span><a href="https://www.youtube.com/t/community_guidelines"><span>Community Guidelines</span></a><span>, you can report it by clicking on the flag icon below the video player. Then click on the reason &#8212; such as &#8220;hateful or abusive content&#8221; &#8212; that best fits the violation for the video, and add any additional information that will help our reviewers make a decision. We have teams around the world reviewing content flagged by users 24 hours a day, 7 days a week, and they will remove any videos that violate our guidelines. </span></div></li></ul><b><br /></b><br /><ul><li><div dir="ltr"><span>Blogger</span><span>: Our </span><a href="http://www.blogger.com/content.g"><span>content policies</span></a><span> describe what kinds of content are and are not allowed in blog posts. If you&#8217;re on a blog that seems problematic, click the &#8220;More&#8221; drop-down at the top of the page, then click on &#8220;Report abuse&#8221; and follow the prompts to alert us about any policy violations. If the blog owner has hidden that link, you can still report it by going to this </span><a href="https://support.google.com/blogger/answer/76315"><span>Help Center</span></a><span> page. &#160;Select the type of content policy violation you&#8217;re reporting&#8212;such as &#8220;hate speech&#8221; or &#8220;harassment&#8221;&#8212;and click through to enter the URL of the blog in question. </span></div></li></ul><b><br /></b><br /><ul><li><div dir="ltr"><span>Google+</span><span>: Our</span><span> </span><a href="https://www.google.com/intl/en-US/+/policy/content.html"><span>user content policy</span></a><span> outlines how we want to ensure a positive experience for our users. If you see inappropriate content, this </span><a href="https://support.google.com/plus/answer/1253377"><span>Help Center</span></a><span> page explains what to do. In a Google+ post, click the arrow in the upper right of the post, then click on &#8220;Report this post&#8221; to get to a pop-up where you can select the reason&#8212;like &#8220;hateful, harrassing or bullying&#8221;&#8212;for your report. To report a Google+ comment for a policy violation, click on the gray flag next to the comment. </span></div></li></ul><b><br /></b><br /><div dir="ltr"><span>These reporting systems operate much like an online neighborhood watch. </span><span>We ask your help in maintaining a community that provides a positive and respectful experience for everyone. The Internet has enabled anyone to become an artist, a writer, or a creator by simply using a keyboard and few clicks to reach out to the rest of the world. The release of the ADL&#8217;s best practices are a good reminder that we must all work together to keep the Internet a safe and open place to exchange information and ideas, where people can connect and engage with each other in unprecedented ways.</span></div><br /><div dir="ltr"><br /></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;"><span style="color: black;"><i>Posted by Christine Y. Chen, Senior Manager, Public Policy</i></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;">Earlier today, the Anti-Defamation League (ADL) </span><a href="http://www.adl.org/press-center/press-releases/discrimination-racism-bigotry/adl-releases-best-practices-challenging-cyberhate.html#.VCGg9S5dV9n" style="line-height: 1.15; text-decoration: none;"><span style="color: #1155cc; font-family: Arial; font-size: 15px; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">released</span></a><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;"> its “</span><a href="http://www.adl.org/combating-hate/cyber-safety/best-practices/" style="line-height: 1.15; text-decoration: none;"><span style="color: #1155cc; font-family: Arial; font-size: 15px; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Best Practices for Responding to Cyberhate</span></a><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;">.” For two years, Google has participated in an industry working group convened by the ADL where, together with several other companies, other NGOs, and academics, we have exchanged insights and ideas on how to balance the need for responsible discourse with the principles of free expression. The best practices set forth by the ADL grew out of these conversations and we are excited to see them being shared with the wider Internet community.</span></div><b style="font-weight: normal;"><br /></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">In line with the practices set forth by the ADL, we work hard at Google to combat the spread of hateful content in order to maintain safe and vibrant communities on platforms like YouTube, Blogger, and Google+. </span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">We don’t allow content that promotes or condones violence or that has the primary purpose of inciting hatred on the basis of race or ethnic origin, religion, disability, gender, sexual orientation or gender identity, age, nationality, or veteran status. </span></div><b style="font-weight: normal;"><br /></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">To make sure these communities stay vibrant, we also depend on our users to let us know when they see content that violates our policies. The </span><a href="http://www.google.com/safetycenter/tools/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google Safety Center</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> gives an overview of the tools that people can use to report content that violates our user policies on different products. </span></div><b style="font-weight: normal;"><br /></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/pg_sxSql1dk" width="560"></iframe></div><b style="font-weight: normal;"><br /></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Here are more details about some of our content policies and how to flag violations:</span></div><b style="font-weight: normal;"><br /></b><br /><ul style="margin-bottom: 0pt; margin-top: 0pt;"><li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">YouTube:</span><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> If you see videos that run afoul of our </span><a href="https://www.youtube.com/t/community_guidelines" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Community Guidelines</span></a><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, you can report it by clicking on the flag icon below the video player. Then click on the reason — such as “hateful or abusive content” — that best fits the violation for the video, and add any additional information that will help our reviewers make a decision. We have teams around the world reviewing content flagged by users 24 hours a day, 7 days a week, and they will remove any videos that violate our guidelines. </span></div></li></ul><b style="font-weight: normal;"><br /></b><br /><ul style="margin-bottom: 0pt; margin-top: 0pt;"><li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Blogger</span><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">: Our </span><a href="http://www.blogger.com/content.g" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">content policies</span></a><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> describe what kinds of content are and are not allowed in blog posts. If you’re on a blog that seems problematic, click the “More” drop-down at the top of the page, then click on “Report abuse” and follow the prompts to alert us about any policy violations. If the blog owner has hidden that link, you can still report it by going to this </span><a href="https://support.google.com/blogger/answer/76315" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Help Center</span></a><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> page. &nbsp;Select the type of content policy violation you’re reporting—such as “hate speech” or “harassment”—and click through to enter the URL of the blog in question. </span></div></li></ul><b style="font-weight: normal;"><br /></b><br /><ul style="margin-bottom: 0pt; margin-top: 0pt;"><li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 3pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Google+</span><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">: Our</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><a href="https://www.google.com/intl/en-US/+/policy/content.html" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">user content policy</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> outlines how we want to ensure a positive experience for our users. If you see inappropriate content, this </span><a href="https://support.google.com/plus/answer/1253377" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Help Center</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> page explains what to do. In a Google+ post, click the arrow in the upper right of the post, then click on “Report this post” to get to a pop-up where you can select the reason—like “hateful, harrassing or bullying”—for your report. To report a Google+ comment for a policy violation, click on the gray flag next to the comment. </span></div></li></ul><b style="font-weight: normal;"><br /></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">These reporting systems operate much like an online neighborhood watch. </span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">We ask your help in maintaining a community that provides a positive and respectful experience for everyone. The Internet has enabled anyone to become an artist, a writer, or a creator by simply using a keyboard and few clicks to reach out to the rest of the world. The release of the ADL’s best practices are a good reminder that we must all work together to keep the Internet a safe and open place to exchange information and ideas, where people can connect and engage with each other in unprecedented ways.</span></div><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><br /></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/fighting-online-hate-speech/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Transparency Report: Government demands for user info have risen 150% over the last five years</title>
		<link>https://googledata.org/google-public-policy/transparency-report-government-demands-for-user-info-have-risen-150-over-the-last-five-years/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=transparency-report-government-demands-for-user-info-have-risen-150-over-the-last-five-years</link>
		<comments>https://googledata.org/google-public-policy/transparency-report-government-demands-for-user-info-have-risen-150-over-the-last-five-years/#comments</comments>
		<pubDate>Mon, 15 Sep 2014 16:15:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=b596cc8fd78bb4542127d38ba1130ec2</guid>
		<description><![CDATA[<div dir="ltr">Today, we&#8217;re updating our <a href="http://www.google.com/transparencyreport/userdatarequests/">Transparency Report</a> for the tenth time. This update details the number of government demands we received for user information in criminal investigations during the first half of 2014. The update also covers demands for user information under the <a href="http://www.google.com/transparencyreport/userdatarequests/faq/#what_is_fisa">Foreign Intelligence Surveillance Act</a> (FISA) and through <a href="http://www.google.com/transparencyreport/userdatarequests/faq/#what_is_an_nsl">National Security Letters</a> (NSLs).<br /><br />Worldwide, the numbers continue to rise: excluding FISA and NSL demands, we&#8217;ve seen a 15% increase since the second half of last year, and a 150% jump since we first began publishing this data in 2009. In the U.S., those increases are 19% and 250%, respectively.<br /><br />This increase in government demands comes against a backdrop of ongoing revelations about government surveillance programs. Despite these revelations, we have seen some countries expand their surveillance authorities in an attempt to reach service providers outside their borders. Others are considering similar measures. The efforts of the U.S. Department of Justice and other countries to improve diplomatic cooperation will help reduce the perceived need for these laws, but much more remains to be done.<br /><br />Governments have a legitimate and important role in fighting crime and investigating national security threats. To maintain public confidence in both government and technology, we need legislative reform that ensures surveillance powers are transparent, reasonably scoped by law, and subject to independent oversight.<br /><br />The <a href="https://beta.congress.gov/bill/113th-congress/senate-bill/2685?q=%7B%22search%22%3A%5B%22usa+freedom+Act%22%5D%7D">USA FREEDOM Act</a>, introduced by Senators Leahy (D-VT), Lee (R-UT), Franken (D-MN) and Heller (R-NV) would prevent the bulk collection of Internet metadata under various legal authorities, allow us to be more transparent about the volume, scope and type of national security demands that we receive, and would create stronger oversight and accountability mechanisms. Congress should move now to enact this legislation into law.<br /><br />Congress should also update the <a href="http://googlepublicpolicy.blogspot.com/2014/06/a-significant-milestone-for-digital-due_18.html">Electronic Communications Privacy Act</a> to make it clear that the government must obtain a search warrant before it can compel a service provider to disclose the content of a user&#8217;s communication. Legislation introduced <a href="https://beta.congress.gov/bill/113th-congress/house-bill/1852?q=%7B%22search%22%3A%5B%22h.r.+1852%22%5D%7D">in the House</a> by Representatives Yoder (R-KS), Graves (R-GA) and Polis (D-CO) and <a href="https://beta.congress.gov/bill/113th-congress/senate-bill/607/text?q=%7B%22search%22%3A%5B%22s.+607%22%5D%7D">in the Senate</a> by Senators Leahy (D-VT) and Lee (R-UT) would create a warrant-for-content standard that protects the Fourth Amendment rights of Internet users.<br /><br />This common-sense reform is now <a href="http://digital4th.org/content/House-ECPA-letter.pdf">supported by a broad range</a> of consumer groups, trade associations, and companies that comprise the <a href="http://digitaldueprocess.org/">Digital Due Process</a> coalition. Additionally, <a href="https://petitions.whitehouse.gov/petition/reform-ecpa-tell-government-get-warrant/nq258dxk">more than 100,000 people have signed a petition</a> urging the White House to back this bill, which enjoys bipartisan support from <a href="https://beta.congress.gov/bill/113th-congress/house-bill/1852/cosponsors?q=%7B%22search%22%3A%5B%22h.r.+1852%22%5D%7D">266 House Members</a> (well over a majority of the House) and passed the Senate Judiciary Committee in April 2013.<br /><br />There is a growing consensus in support of these reforms. In the remaining days of this session, Congress has a chance to pass historic legislation that will help restore trust that has been lost. We urge them to seize upon this opportunity.<br /><br />Posted by Richard Salgado, Legal Director, Law Enforcement and Information Security</div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on">Today, we’re updating our <a href="http://www.google.com/transparencyreport/userdatarequests/">Transparency Report</a> for the tenth time. This update details the number of government demands we received for user information in criminal investigations during the first half of 2014. The update also covers demands for user information under the <a href="http://www.google.com/transparencyreport/userdatarequests/faq/#what_is_fisa">Foreign Intelligence Surveillance Act</a> (FISA) and through <a href="http://www.google.com/transparencyreport/userdatarequests/faq/#what_is_an_nsl">National Security Letters</a> (NSLs).<br /><br />Worldwide, the numbers continue to rise: excluding FISA and NSL demands, we’ve seen a 15% increase since the second half of last year, and a 150% jump since we first began publishing this data in 2009. In the U.S., those increases are 19% and 250%, respectively.<br /><br />This increase in government demands comes against a backdrop of ongoing revelations about government surveillance programs. Despite these revelations, we have seen some countries expand their surveillance authorities in an attempt to reach service providers outside their borders. Others are considering similar measures. The efforts of the U.S. Department of Justice and other countries to improve diplomatic cooperation will help reduce the perceived need for these laws, but much more remains to be done.<br /><br />Governments have a legitimate and important role in fighting crime and investigating national security threats. To maintain public confidence in both government and technology, we need legislative reform that ensures surveillance powers are transparent, reasonably scoped by law, and subject to independent oversight.<br /><br />The <a href="https://beta.congress.gov/bill/113th-congress/senate-bill/2685?q=%7B%22search%22%3A%5B%22usa+freedom+Act%22%5D%7D">USA FREEDOM Act</a>, introduced by Senators Leahy (D-VT), Lee (R-UT), Franken (D-MN) and Heller (R-NV) would prevent the bulk collection of Internet metadata under various legal authorities, allow us to be more transparent about the volume, scope and type of national security demands that we receive, and would create stronger oversight and accountability mechanisms. Congress should move now to enact this legislation into law.<br /><br />Congress should also update the <a href="http://googlepublicpolicy.blogspot.com/2014/06/a-significant-milestone-for-digital-due_18.html">Electronic Communications Privacy Act</a> to make it clear that the government must obtain a search warrant before it can compel a service provider to disclose the content of a user’s communication. Legislation introduced <a href="https://beta.congress.gov/bill/113th-congress/house-bill/1852?q=%7B%22search%22%3A%5B%22h.r.+1852%22%5D%7D">in the House</a> by Representatives Yoder (R-KS), Graves (R-GA) and Polis (D-CO) and <a href="https://beta.congress.gov/bill/113th-congress/senate-bill/607/text?q=%7B%22search%22%3A%5B%22s.+607%22%5D%7D">in the Senate</a> by Senators Leahy (D-VT) and Lee (R-UT) would create a warrant-for-content standard that protects the Fourth Amendment rights of Internet users.<br /><br />This common-sense reform is now <a href="http://digital4th.org/content/House-ECPA-letter.pdf">supported by a broad range</a> of consumer groups, trade associations, and companies that comprise the <a href="http://digitaldueprocess.org/">Digital Due Process</a> coalition. Additionally, <a href="https://petitions.whitehouse.gov/petition/reform-ecpa-tell-government-get-warrant/nq258dxk">more than 100,000 people have signed a petition</a> urging the White House to back this bill, which enjoys bipartisan support from <a href="https://beta.congress.gov/bill/113th-congress/house-bill/1852/cosponsors?q=%7B%22search%22%3A%5B%22h.r.+1852%22%5D%7D">266 House Members</a> (well over a majority of the House) and passed the Senate Judiciary Committee in April 2013.<br /><br />There is a growing consensus in support of these reforms. In the remaining days of this session, Congress has a chance to pass historic legislation that will help restore trust that has been lost. We urge them to seize upon this opportunity.<br /><br />Posted by Richard Salgado, Legal Director, Law Enforcement and Information Security</div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/transparency-report-government-demands-for-user-info-have-risen-150-over-the-last-five-years/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>UP Global White Paper: Announcing 5 Ingredients For ‘Fostering A Thriving Startup Ecosystem’</title>
		<link>https://googledata.org/google-public-policy/up-global-white-paper-announcing-5-ingredients-for-fostering-a-thriving-startup-ecosystem/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=up-global-white-paper-announcing-5-ingredients-for-fostering-a-thriving-startup-ecosystem</link>
		<comments>https://googledata.org/google-public-policy/up-global-white-paper-announcing-5-ingredients-for-fostering-a-thriving-startup-ecosystem/#comments</comments>
		<pubDate>Tue, 09 Sep 2014 16:22:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=3402daa9d654b6f18711e8593c3c0a3b</guid>
		<description><![CDATA[<div dir="ltr"><div><span><span><i>This is a guest post from our <a href="https://www.googleforentrepreneurs.com/">Google for Entrepreneur</a>'s partner Marc Nager from </i></span></span><i><a href="http://www.up.co/">UP Global</a> - ed. </i></div><div><span><span><i><br /></i></span></span></div><div><span><span>While supporting thousands of community leaders over the past six years, UP Global has consistently found itself at the center of larger conversations about what makes entrepreneurial ecosystems thrive.</span></span></div><div><b><span><br /></span></b></div><div><span><span>Fundamentally, our goal is to provide a global framework for these conversations, that can be adapted to support the unique efforts of the community leaders and entrepreneurs - wherever they may be.</span></span></div><div><b><span><br /></span></b></div><div><div><span><span>We are pleased to announce the release of the <a href="http://www.slideshare.net/cuevasm1/fostering-a-startup-and-innovation-ecosystem">Fostering a Startup and Innovation Ecosystem white paper</a>. This research project extends our commitment to entrepreneurs around the world, and substantiates our optimism for the economic progress that occurs every day. We hope the conversations around these topics continue as we work together towards providing global access to entrepreneurship. </span></span></div></div><div><br /><div><span><br /></span></div><div><span> </span></div><br /><div></div></div><div></div><div><b><span><br /></span></b></div><div><span><span>Foreword by Mary Grove, Director of Google for Entrepreneurs</span></span></div><div><span><span>Entrepreneurship and innovation are thriving in communities all across the globe, and we see the transformative power entrepreneurs have to build products and companies that improve their communities, cities, and ultimately the world. Over the last several years, we&#8217;ve seen a surge in entrepreneurial activity in cities as far ranging as Damascus to Detroit, Sao Paulo to Nairobi, led by local leaders and influencers.</span></span></div><div><b><span><br /></span></b></div><div><span><span>UP Global is a best in class organization empowering communities with the support and resources they need to foster local innovation and entrepreneurs. Their belief is that everyone in the world should have the opportunity to go from idea to startup, and the organization has over 7,000 volunteers across 125 countries who are often involved or eager to join in larger conversations with corporations, universities, and policymakers about building and fostering a favorable climate for entrepreneurs in their local community. </span></span></div><div><b><span><br /></span></b></div><div><span><span>There is plenty of research out there that provides advice for entrepreneurs and highlights a few common ingredients that help to foster successful ecosystems. </span><span>This white paper underscores the five critical ingredients that support flourishing entrepreneurial ecosystems: talent, density, culture, capital, and regulatory environment. My hope is that we continue the conversation about how to foster these ingredients in our daily work.</span><span> &#160;As a board member of UP Global and a close partner of theirs through Google for Entrepreneurs, I am more excited than ever about the organization&#8217;s continued support for entrepreneurial communities and the powerful opportunity these communities have to impact the world.</span></span></div><div><br /></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="white-space: pre-wrap;"><i>This is a guest post from our <a href="https://www.googleforentrepreneurs.com/">Google for Entrepreneur</a>'s partner Marc Nager from </i></span></span><i style="font-family: Arial, Helvetica, sans-serif; white-space: pre-wrap;"><a href="http://www.up.co/">UP Global</a> - ed. </i></div><div style="text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="white-space: pre-wrap;"><i><br /></i></span></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">While supporting thousands of community leaders over the past six years, UP Global has consistently found itself at the center of larger conversations about what makes entrepreneurial ecosystems thrive.</span></span></div><div style="text-align: left;"><b id="docs-internal-guid-8dc5c356-5b2b-94a6-e439-8ac93694cb95" style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Fundamentally, our goal is to provide a global framework for these conversations, that can be adapted to support the unique efforts of the community leaders and entrepreneurs - wherever they may be.</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><div style="text-align: left;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">We are pleased to announce the release of the <a href="http://www.slideshare.net/cuevasm1/fostering-a-startup-and-innovation-ecosystem">Fostering a Startup and Innovation Ecosystem white paper</a>. This research project extends our commitment to entrepreneurs around the world, and substantiates our optimism for the economic progress that occurs every day. We hope the conversations around these topics continue as we work together towards providing global access to entrepreneurship. </span></span></div></div><div style="margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><br /><div style="text-align: center;"><span style="font-family: Arial, Helvetica, sans-serif; line-height: 18px; white-space: pre-wrap;"><br /></span></div><div style="text-align: center;"><iframe allowfullscreen="" frameborder="0" height="356" marginheight="0" marginwidth="0" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/38890511" style="border: 1px solid rgb(204, 204, 204); line-height: 1.15; margin-bottom: 5px; max-width: 100%; white-space: pre-wrap;" width="427"></iframe><span style="line-height: 1.15; white-space: pre-wrap;"> </span></div><br /><div style="line-height: 1.15;"></div></div><div class="separator" style="clear: both; text-align: center;"></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.714285714; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: white; color: #222222; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Foreword by Mary Grove, Director of Google for Entrepreneurs</span></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Entrepreneurship and innovation are thriving in communities all across the globe, and we see the transformative power entrepreneurs have to build products and companies that improve their communities, cities, and ultimately the world. Over the last several years, we’ve seen a surge in entrepreneurial activity in cities as far ranging as Damascus to Detroit, Sao Paulo to Nairobi, led by local leaders and influencers.</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">UP Global is a best in class organization empowering communities with the support and resources they need to foster local innovation and entrepreneurs. Their belief is that everyone in the world should have the opportunity to go from idea to startup, and the organization has over 7,000 volunteers across 125 countries who are often involved or eager to join in larger conversations with corporations, universities, and policymakers about building and fostering a favorable climate for entrepreneurs in their local community. </span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">There is plenty of research out there that provides advice for entrepreneurs and highlights a few common ingredients that help to foster successful ecosystems. </span><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">This white paper underscores the five critical ingredients that support flourishing entrepreneurial ecosystems: talent, density, culture, capital, and regulatory environment. My hope is that we continue the conversation about how to foster these ingredients in our daily work.</span><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> &nbsp;As a board member of UP Global and a close partner of theirs through Google for Entrepreneurs, I am more excited than ever about the organization’s continued support for entrepreneurial communities and the powerful opportunity these communities have to impact the world.</span></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><br /></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/up-global-white-paper-announcing-5-ingredients-for-fostering-a-thriving-startup-ecosystem/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>A Hangout On Air Conversation with SBA Administrator Maria Contreras-Sweet</title>
		<link>https://googledata.org/google-public-policy/a-hangout-on-air-conversation-with-sba-administrator-maria-contreras-sweet/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-hangout-on-air-conversation-with-sba-administrator-maria-contreras-sweet</link>
		<comments>https://googledata.org/google-public-policy/a-hangout-on-air-conversation-with-sba-administrator-maria-contreras-sweet/#comments</comments>
		<pubDate>Wed, 27 Aug 2014 13:32:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=ef4be4058f5619cfd9ad029760b437f4</guid>
		<description><![CDATA[<div dir="ltr"><span>Posted by Soo Young Kim, Head of Marketing, Get Your Business Online</span><br /><span><br /></span><div dir="ltr"><span>There are 28 million small businesses in the US, and small businesses represent almost half of US private-sector jobs. What kind of support and resources does our government provide to make sure these small businesses thrive? Where can we find tips on how to start or grow a business? What funding opportunities are there?</span></div><span><b><br /></b></span><div dir="ltr"><span>On Wednesday, August 27th, the leader of the </span><a href="http://www.sba.gov/"><span>U.S. Small Business Administration</span></a><span> (SBA) and the voice of small business in President Obama&#8217;s Cabinet, </span><a href="http://www.sba.gov/administrator"><span>Maria Contreras-Sweet</span></a><span>, </span><span>will join the Google Small Business Community for a Hangout on Air to share tips and insights for small businesses. </span></div><div><a href="http://4.bp.blogspot.com/-h63uOe-_33g/U_3bq8MxmQI/AAAAAAAABp4/n9MzGHQnlZo/s1600/sba%2Bhoa%2Bsnack.png"><img border="0" src="http://4.bp.blogspot.com/-h63uOe-_33g/U_3bq8MxmQI/AAAAAAAABp4/n9MzGHQnlZo/s1600/sba%2Bhoa%2Bsnack.png" height="286" width="320"></a></div><span><b><br /></b></span><div dir="ltr"><span>Since being appointed by President Obama, Administrator Contreras-Sweet has made a priority to meet and hear from small businesses. On Wednesday, she will answer questions directly from small businesses through Hangouts. Over the past two weeks, thousands of small business owners from all over the US, representing various backgrounds, experiences, and businesses, have submitted questions for the Administrator covering funding for businesses to technology.</span></div><span><b><br /></b></span><div dir="ltr"><span>Five small business participants will be joining the Hangout on camera along with the Administrator. One of the attendees, Brantley Crowder, is the director of e-commerce for </span><a href="http://savannahbee.com/"><span>Savannah Bee Company</span></a><span>. Savannah Bee Company started in 2002 with a single beehive and a mission to support regional beekeepers by selling their honey and making honey-related health and beauty products. They started delving into digital with their website which launched in 2010 to support their stores in Charleston and Savannah. </span></div><span><b><br /></b></span><div dir="ltr"><span>The Hangout has participants like </span><a href="https://plus.google.com/u/0/110444167366586802299/posts"><span>David Winslow</span></a><span>, writing, &#8220;the SBA is beginning to make headway in an effort to lead the Government into a friendlier, more engaging place!&#65279;&#8221;</span></div><span><b><br /></b></span><div dir="ltr"><span>Join the SBA Administrator tomorrow at 1:30 PM PT / 4:30 PM ET in the Google Small Business Community, a public community, which gives business people direct access to experts and industry leaders like Contreras-Sweet</span><span>. </span><span>The event will also be accessible live on the </span><a href="https://www.youtube.com/user/GoogleBusiness"><span>Google+ Your Business YouTube channel</span></a><span>, in </span><a href="https://plus.google.com/u/0/events/cbus3io53jvpsic0eqcfd6sbvi4"><span>the event invitation</span></a><span>, and the </span><a href="http://www.sba.gov/"><span>SBA website</span></a><span>, and the video will be posted for viewing post-event. </span></div><span><br /></span><div dir="ltr"><a href="http://goo.gl/26gQwM"><span>RSVP</span></a><span> to view the broadcast </span><span>and submit your questions for a chance to have them answered live, on-air during the Hangout.</span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><span class="byline-author">Posted by Soo Young Kim, Head of Marketing, Get Your Business Online</span><br /><span class="byline-author"><br /></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">There are 28 million small businesses in the US, and small businesses represent almost half of US private-sector jobs. What kind of support and resources does our government provide to make sure these small businesses thrive? Where can we find tips on how to start or grow a business? What funding opportunities are there?</span></div><span class="byline-author"><b id="docs-internal-guid-7e2b44eb-179f-f03d-c8b5-6a0fe290a58d" style="font-weight: normal;"><br /></b></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">On Wednesday, August 27th, the leader of the </span><a href="http://www.sba.gov/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">U.S. Small Business Administration</span></a><span style="background-color: transparent; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (SBA) and the voice of small business in President Obama’s Cabinet, </span><a href="http://www.sba.gov/administrator" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Maria Contreras-Sweet</span></a><span style="background-color: white; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, </span><span style="background-color: transparent; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">will join the Google Small Business Community for a Hangout on Air to share tips and insights for small businesses. </span></div><div class="separator" style="clear: both; text-align: center;"><a href="http://4.bp.blogspot.com/-h63uOe-_33g/U_3bq8MxmQI/AAAAAAAABp4/n9MzGHQnlZo/s1600/sba%2Bhoa%2Bsnack.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-h63uOe-_33g/U_3bq8MxmQI/AAAAAAAABp4/n9MzGHQnlZo/s1600/sba%2Bhoa%2Bsnack.png" height="286" width="320" /></a></div><span class="byline-author"><b style="font-weight: normal;"><br /></b></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Since being appointed by President Obama, Administrator Contreras-Sweet has made a priority to meet and hear from small businesses. On Wednesday, she will answer questions directly from small businesses through Hangouts. Over the past two weeks, thousands of small business owners from all over the US, representing various backgrounds, experiences, and businesses, have submitted questions for the Administrator covering funding for businesses to technology.</span></div><span class="byline-author"><b style="font-weight: normal;"><br /></b></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Five small business participants will be joining the Hangout on camera along with the Administrator. One of the attendees, Brantley Crowder, is the director of e-commerce for </span><a href="http://savannahbee.com/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Savannah Bee Company</span></a><span style="background-color: transparent; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. Savannah Bee Company started in 2002 with a single beehive and a mission to support regional beekeepers by selling their honey and making honey-related health and beauty products. They started delving into digital with their website which launched in 2010 to support their stores in Charleston and Savannah. </span></div><span class="byline-author"><b style="font-weight: normal;"><br /></b></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The Hangout has participants like </span><a href="https://plus.google.com/u/0/110444167366586802299/posts" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">David Winslow</span></a><span style="background-color: transparent; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, writing, “the SBA is beginning to make headway in an effort to lead the Government into a friendlier, more engaging place!﻿”</span></div><span class="byline-author"><b style="font-weight: normal;"><br /></b></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Join the SBA Administrator tomorrow at 1:30 PM PT / 4:30 PM ET in the Google Small Business Community, a public community, which gives business people direct access to experts and industry leaders like Contreras-Sweet</span><span style="background-color: transparent; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. </span><span style="background-color: white; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The event will also be accessible live on the </span><a href="https://www.youtube.com/user/GoogleBusiness" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google+ Your Business YouTube channel</span></a><span style="background-color: white; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, in </span><a href="https://plus.google.com/u/0/events/cbus3io53jvpsic0eqcfd6sbvi4" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">the event invitation</span></a><span style="background-color: white; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, and the </span><a href="http://www.sba.gov/" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">SBA website</span></a><span style="background-color: white; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, and the video will be posted for viewing post-event. </span></div><span class="byline-author"><br /></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><a href="http://goo.gl/26gQwM" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">RSVP</span></a><span style="background-color: transparent; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to view the broadcast </span><span style="background-color: white; color: black; font-family: Roboto; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">and submit your questions for a chance to have them answered live, on-air during the Hangout.</span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/a-hangout-on-air-conversation-with-sba-administrator-maria-contreras-sweet/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Chrome now available for download in Cuba</title>
		<link>https://googledata.org/google-public-policy/chrome-now-available-for-download-in-cuba/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=chrome-now-available-for-download-in-cuba</link>
		<comments>https://googledata.org/google-public-policy/chrome-now-available-for-download-in-cuba/#comments</comments>
		<pubDate>Wed, 20 Aug 2014 21:55:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=e18f78d67325dc9ade1ee682c7d70108</guid>
		<description><![CDATA[<div dir="ltr"><div><span><span>By Pedro Less Andrade, Director of Government Affairs &#38; Public Policy, Latin America </span></span></div><div><span><span><br /></span></span></div><div><span><span><span>U.S. export controls and sanctions can sometimes limit the products available in certain countries. But these trade restrictions are always evolving, and over time, we&#8217;ve been working to figure out how to make more tools available in sanctioned countries. In the past couple years we&#8217;ve made Chrome downloadable in </span><a href="http://googleblog.blogspot.com/2012/05/software-downloads-in-syria.html"><span>Syria</span></a><span> and </span><a href="http://googleblog.blogspot.com/2011/01/software-downloads-for-iran.html"><span>Iran</span></a><span>. We&#8217;re happy to say that Internet users in Cuba can now use Chrome too, and browse the web faster and more safely than they could before.</span></span></span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="line-height: 1.15; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">By Pedro Less Andrade, Director of Government Affairs &amp; Public Policy, Latin America </span></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div><div style="text-align: left;"><span id="docs-internal-guid-a439c922-f56a-1d00-d3fc-6d2f7ba2ead8"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="vertical-align: baseline; white-space: pre-wrap;">U.S. export controls and sanctions can sometimes limit the products available in certain countries. But these trade restrictions are always evolving, and over time, we’ve been working to figure out how to make more tools available in sanctioned countries. In the past couple years we’ve made Chrome downloadable in </span><a href="http://googleblog.blogspot.com/2012/05/software-downloads-in-syria.html" style="text-decoration: none;"><span style="color: #1155cc; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Syria</span></a><span style="vertical-align: baseline; white-space: pre-wrap;"> and </span><a href="http://googleblog.blogspot.com/2011/01/software-downloads-for-iran.html" style="text-decoration: none;"><span style="color: #1155cc; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Iran</span></a><span style="vertical-align: baseline; white-space: pre-wrap;">. We’re happy to say that Internet users in Cuba can now use Chrome too, and browse the web faster and more safely than they could before.</span></span></span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/chrome-now-available-for-download-in-cuba/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Growing America’s Businesses Online</title>
		<link>https://googledata.org/google-public-policy/growing-americas-businesses-online/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=growing-americas-businesses-online</link>
		<comments>https://googledata.org/google-public-policy/growing-americas-businesses-online/#comments</comments>
		<pubDate>Thu, 17 Jul 2014 16:57:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=e00e65a8deb1cb6b2a7a1cb2a5385750</guid>
		<description><![CDATA[<div dir="ltr"><div><span><span><span>Posted by Jim Lecinski, Vice President, Customer Solutions </span></span></span></div><div><span><span><br /></span></span></div><div><span><span>Over the past few months, we&#8217;ve had the chance to talk to businesses all over the country and hear stories of how they&#8217;ve become successful. For many, it&#8217;s pretty simple: the Internet. The web is helping businesses and communities across the U.S. to grow and succeed. In fact, last year Google&#8217;s search and advertising tools helped provide $111 billion of economic activity for more than 1.5 million businesses&#8212;</span><span>advertisers, publishers and nonprofits</span><span>&#8212;across the U.S.</span></span></div><div><b><span><br /></span></b></div><div><span><span>Take </span><a href="http://www.go2marine.com/"><span>Go2marine</span></a><span>, a boat supply company located on Bainbridge Island, off the coast of Washington State. Because of their remote location, bringing traffic to their website using </span><a href="http://www.google.com/adwords"><span>Google AdWords</span></a><span> plays an important role in their ability to sell their 250,000+ boat supplies to customers in 176 countries. When it&#8217;s winter in the U.S., they rely on customers located in other parts of the world where it&#8217;s boating season, with the web bringing them business from any place, in any season.</span></span></div><div><b><span><br /></span></b></div><div><span><span>Or meet Don Morton, who taught reading, writing and language in lower-income neighborhoods in my home town of Chicago for nine years. In 2005, he began creating his own materials to supplement what the school system provided. Realizing that his worksheets could be useful for students and teachers everywhere, he created </span><a href="http://www.ereadingworksheets.com/"><span>ereadingworksheets.com</span></a><span> to provide his worksheets for free. Don started using </span><a href="http://www.google.com/adsense"><span>Google AdSense</span></a><span> to offset his costs by placing ads next to his content, and today he&#8217;s able to work full-time on his website and make an impact on students around the world. </span></span></div><div><b><span><br /></span></b></div><div><span><span>These are just two examples of enterprising people making the most of Google tools to find new customers, connect with existing ones and grow their businesses; you can find plenty more of them </span><span>in our </span><a href="http://www.google.com/economicimpact"><span>Economic Impact Report</span></a><span>. Our tools help connect business owners to their customers, whether they&#8217;re around the corner or across the world from each other. And when businesses flourish, it&#8217;s good news for the rest of us. </span><span>Recent data shows that</span><span> businesses that are online are expected to grow 40 percent faster and hire twice as many workers as businesses that aren&#8217;t. Every year, it gets clearer that the web helps lead to more successful businesses, stronger economies, more vibrant towns, and more prosperous communities. </span></span></div><div><span><br /></span></div><div><span><a href="http://www.google.com/economicimpact"><span>Learn more</span></a><span> about our economic impact in all 50 U.S. states, and how businesses are finding success through the web. </span><span>Whether it&#8217;s a part for a boat or a grammar worksheet, we&#8217;re proud to play a role in giving businesses the tools they need to do more--to grow and thrive and connect with customers and communities all over the world. </span></span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span id="docs-internal-guid-53c161d5-4540-e5c1-004d-5c5e1311b35d"><span style="vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Posted by Jim Lecinski, Vice President, Customer Solutions </span></span></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br /></span></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Over the past few months, we’ve had the chance to talk to businesses all over the country and hear stories of how they’ve become successful. For many, it’s pretty simple: the Internet. The web is helping businesses and communities across the U.S. to grow and succeed. In fact, last year Google’s search and advertising tools helped provide $111 billion of economic activity for more than 1.5 million businesses—</span><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">advertisers, publishers and nonprofits</span><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">—across the U.S.</span></span></div><div style="text-align: left;"><b id="docs-internal-guid-53c161d5-4540-7078-63a5-c15b079c439c" style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Take </span><a href="http://www.go2marine.com/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Go2marine</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, a boat supply company located on Bainbridge Island, off the coast of Washington State. Because of their remote location, bringing traffic to their website using </span><a href="http://www.google.com/adwords" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google AdWords</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> plays an important role in their ability to sell their 250,000+ boat supplies to customers in 176 countries. When it’s winter in the U.S., they rely on customers located in other parts of the world where it’s boating season, with the web bringing them business from any place, in any season.</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Or meet Don Morton, who taught reading, writing and language in lower-income neighborhoods in my home town of Chicago for nine years. In 2005, he began creating his own materials to supplement what the school system provided. Realizing that his worksheets could be useful for students and teachers everywhere, he created </span><a href="http://www.ereadingworksheets.com/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">ereadingworksheets.com</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to provide his worksheets for free. Don started using </span><a href="http://www.google.com/adsense" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google AdSense</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to offset his costs by placing ads next to his content, and today he’s able to work full-time on his website and make an impact on students around the world. </span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">These are just two examples of enterprising people making the most of Google tools to find new customers, connect with existing ones and grow their businesses; you can find plenty more of them </span><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">in our </span><a href="http://www.google.com/economicimpact" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Economic Impact Report</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. Our tools help connect business owners to their customers, whether they’re around the corner or across the world from each other. And when businesses flourish, it’s good news for the rest of us. </span><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Recent data shows that</span><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> businesses that are online are expected to grow 40 percent faster and hire twice as many workers as businesses that aren’t. Every year, it gets clearer that the web helps lead to more successful businesses, stronger economies, more vibrant towns, and more prosperous communities. </span></span></div><div style="text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><a href="http://www.google.com/economicimpact" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Learn more</span></a><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> about our economic impact in all 50 U.S. states, and how businesses are finding success through the web. </span><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Whether it’s a part for a boat or a grammar worksheet, we’re proud to play a role in giving businesses the tools they need to do more--to grow and thrive and connect with customers and communities all over the world. </span></span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/growing-americas-businesses-online/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Searching for the right balance</title>
		<link>https://googledata.org/google-public-policy/searching-for-the-right-balance-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=searching-for-the-right-balance-2</link>
		<comments>https://googledata.org/google-public-policy/searching-for-the-right-balance-2/#comments</comments>
		<pubDate>Fri, 11 Jul 2014 14:20:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=f9f820a69d4719523cc8e636350a26a8</guid>
		<description><![CDATA[<div dir="ltr"><i>In May, the Court of Justice of the European Union established a &#8220;right to be forgotten." Today, we published an op-ed by David Drummond, senior vice president of corporate development and chief legal officer, in the U.K.'s <a href="http://www.theguardian.com/commentisfree/2014/jul/10/right-to-be-forgotten-european-ruling-google-debate">The Guardian</a>, Germany's <a href="http://www.faz.net/aktuell/wirtschaft/netzwirtschaft/google/google-sucht-nach-balance-fuer-loeschantraege-13038864.html">Frankfurter Allgemeine Zeitung</a>, France's <a href="http://www.lefigaro.fr/vox/monde/2014/07/11/31002-20140711ARTFIG00016-droit-a-l-oubli-sur-internet-trouver-le-juste-equilibre.php">Le Figaro</a> and Spain's <a href="http://elpais.com/elpais/2014/07/10/opinion/1405011109_754073.html">El Pais</a>, discussing the ruling and our response. We're republishing the op-ed in full below. </i>-Ed.<br /><br />When you search online, there&#8217;s an unwritten assumption that you&#8217;ll get an instant answer, as well as additional information if you need to dig deeper.  This is all possible because of two decades worth of investment and innovation by many different companies.  Today, however, search engines across Europe face a new challenge&#8212;one we&#8217;ve had just two months to get our heads around.  That challenge is figuring out what information we must deliberately <i>omit</i> from our results, following a new ruling from the European Court of Justice.<br /><br />In the past we&#8217;ve restricted the removals we make from search to a very short list.  It includes information deemed illegal by a court, such as defamation, pirated content (once we&#8217;re notified by the rights holder), malware, personal information such as bank details, child sexual abuse imagery and other things prohibited by local law (like material that glorifies Nazism in Germany).<br /><br />We&#8217;ve taken this approach because, as article 19 of the Universal Declaration of Human Rights states:  <i>&#8220;Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers."</i><br /><br />But the European Court found that people have the right to ask for information to be removed from search results that include their names if it is &#8220;<i>inadequate, irrelevant or no longer relevant, or excessive.</i>&#8221; In deciding what to remove, search engines must also have regard to the public interest. These are, of course, very vague and subjective tests.  The court also decided that search engines don&#8217;t qualify for a &#8220;journalistic exception.&#8221; This means that <i>The Guardian</i> could have an article on its website about an individual that&#8217;s perfectly legal, but we might not legally be able to show links to it in our results when you search for that person&#8217;s name.  It&#8217;s a bit like saying the book can stay in the library, it just cannot be included in the library&#8217;s card catalogue.<br /><br />It&#8217;s for these reasons that we disagree with the ruling.  That said, we obviously respect the court&#8217;s authority and are doing our very best to comply quickly and responsibly.  It&#8217;s a huge task as we&#8217;ve had over 70,000 take-down requests covering 250,000 webpages since May.  So we now have a team of people individually reviewing each application, in most cases with limited information and almost no context.<br /><br />The examples we&#8217;ve seen so far highlight the difficult value judgments search engines and European society now face:  former politicians wanting posts removed that criticize their policies in office; serious, violent criminals asking for articles about their crimes to be deleted; bad reviews for professionals like architects and teachers; comments that people have written themselves (and now regret).  In each case, someone wants the information hidden, while others might argue it should be out in the open.<br /><br />When it comes to determining what&#8217;s in the the public interest, we&#8217;re taking into account a number of factors.  These include whether:  the information relates to a politician, celebrity, or other public figure; if the material comes from a reputable news source, and how recent it is; whether it involves political speech; questions of professional conduct that might be relevant to consumers; the involvement of criminal convictions that are not yet &#8220;spent&#8221;; and if the information is being published by a government.  But these will always be difficult and debatable judgments.<br /><br />We&#8217;re also doing our best to be transparent about removals: for example, we&#8217;re informing websites when one of their pages has been removed.  But we cannot be specific about why we have removed the information because that could violate the individual&#8217;s privacy rights under the court's decision.<br /><br />Of course, only two months in, our process is still very much a work in progress.  It&#8217;s why we incorrectly removed links to some articles last week (they have since been reinstated).  But the good news is that the ongoing, active debate that&#8217;s happening will inform the development of our principles, policies and practices&#8212;in particular about how to balance one person&#8217;s right to privacy with another&#8217;s right to know.<br /><br />That&#8217;s why we've also set up an <a href="http://www.google.com/advisorycouncil">advisory council</a> of experts, the final membership of which we're announcing today. These external experts from the worlds of academia, the media, data protection, civil society and the tech sector are serving as independent advisors to Google.  The council will be asking for evidence and recommendations from different groups, and will hold public meetings this autumn across Europe to examine these issues more deeply.  Its public report will include recommendations for particularly difficult removal requests (like criminal convictions); thoughts on the implications of the court&#8217;s decision for European Internet users, news publishers, search engines and others; and procedural steps that could improve accountability and transparency for websites and citizens.<br /><br />The issues here at stake are important and difficult, but we&#8217;re committed to complying with the court&#8217;s decision. Indeed it's hard not to empathize with some of the requests we've seen&#8212;from the man who asked that we not show a news article saying he had been questioned in connection with a crime (he&#8217;s able to demonstrate that he was never charged) to the mother who requested that we remove news articles for her daughter&#8217;s name as she had been the victim of abuse.  It&#8217;s a complex issue, with no easy answers.   So a robust debate is both welcome and necessary, as, on this issue at least, no search engine has an instant or perfect answer.<br /><br /><span>Posted by David Drummond, Senior Vice President, Corporate Development and Chief Legal Officer</span></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><i>In May, the Court of Justice of the European Union established a “right to be forgotten." Today, we published an op-ed by David Drummond, senior vice president of corporate development and chief legal officer, in the U.K.'s <a href="http://www.theguardian.com/commentisfree/2014/jul/10/right-to-be-forgotten-european-ruling-google-debate">The Guardian</a>, Germany's <a href="http://www.faz.net/aktuell/wirtschaft/netzwirtschaft/google/google-sucht-nach-balance-fuer-loeschantraege-13038864.html">Frankfurter Allgemeine Zeitung</a>, France's <a href="http://www.lefigaro.fr/vox/monde/2014/07/11/31002-20140711ARTFIG00016-droit-a-l-oubli-sur-internet-trouver-le-juste-equilibre.php">Le Figaro</a> and Spain's <a href="http://elpais.com/elpais/2014/07/10/opinion/1405011109_754073.html">El Pais</a>, discussing the ruling and our response. We're republishing the op-ed in full below. </i>-Ed.<br /><br />When you search online, there’s an unwritten assumption that you’ll get an instant answer, as well as additional information if you need to dig deeper.  This is all possible because of two decades worth of investment and innovation by many different companies.  Today, however, search engines across Europe face a new challenge—one we’ve had just two months to get our heads around.  That challenge is figuring out what information we must deliberately <i>omit</i> from our results, following a new ruling from the European Court of Justice.<br /><br />In the past we’ve restricted the removals we make from search to a very short list.  It includes information deemed illegal by a court, such as defamation, pirated content (once we’re notified by the rights holder), malware, personal information such as bank details, child sexual abuse imagery and other things prohibited by local law (like material that glorifies Nazism in Germany).<br /><br />We’ve taken this approach because, as article 19 of the Universal Declaration of Human Rights states:  <i>“Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers."</i><br /><br />But the European Court found that people have the right to ask for information to be removed from search results that include their names if it is “<i>inadequate, irrelevant or no longer relevant, or excessive.</i>” In deciding what to remove, search engines must also have regard to the public interest. These are, of course, very vague and subjective tests.  The court also decided that search engines don’t qualify for a “journalistic exception.” This means that <i>The Guardian</i> could have an article on its website about an individual that’s perfectly legal, but we might not legally be able to show links to it in our results when you search for that person’s name.  It’s a bit like saying the book can stay in the library, it just cannot be included in the library’s card catalogue.<br /><br />It’s for these reasons that we disagree with the ruling.  That said, we obviously respect the court’s authority and are doing our very best to comply quickly and responsibly.  It’s a huge task as we’ve had over 70,000 take-down requests covering 250,000 webpages since May.  So we now have a team of people individually reviewing each application, in most cases with limited information and almost no context.<br /><br />The examples we’ve seen so far highlight the difficult value judgments search engines and European society now face:  former politicians wanting posts removed that criticize their policies in office; serious, violent criminals asking for articles about their crimes to be deleted; bad reviews for professionals like architects and teachers; comments that people have written themselves (and now regret).  In each case, someone wants the information hidden, while others might argue it should be out in the open.<br /><br />When it comes to determining what’s in the the public interest, we’re taking into account a number of factors.  These include whether:  the information relates to a politician, celebrity, or other public figure; if the material comes from a reputable news source, and how recent it is; whether it involves political speech; questions of professional conduct that might be relevant to consumers; the involvement of criminal convictions that are not yet “spent”; and if the information is being published by a government.  But these will always be difficult and debatable judgments.<br /><br />We’re also doing our best to be transparent about removals: for example, we’re informing websites when one of their pages has been removed.  But we cannot be specific about why we have removed the information because that could violate the individual’s privacy rights under the court's decision.<br /><br />Of course, only two months in, our process is still very much a work in progress.  It’s why we incorrectly removed links to some articles last week (they have since been reinstated).  But the good news is that the ongoing, active debate that’s happening will inform the development of our principles, policies and practices—in particular about how to balance one person’s right to privacy with another’s right to know.<br /><br />That’s why we've also set up an <a href="http://www.google.com/advisorycouncil">advisory council</a> of experts, the final membership of which we're announcing today. These external experts from the worlds of academia, the media, data protection, civil society and the tech sector are serving as independent advisors to Google.  The council will be asking for evidence and recommendations from different groups, and will hold public meetings this autumn across Europe to examine these issues more deeply.  Its public report will include recommendations for particularly difficult removal requests (like criminal convictions); thoughts on the implications of the court’s decision for European Internet users, news publishers, search engines and others; and procedural steps that could improve accountability and transparency for websites and citizens.<br /><br />The issues here at stake are important and difficult, but we’re committed to complying with the court’s decision. Indeed it's hard not to empathize with some of the requests we've seen—from the man who asked that we not show a news article saying he had been questioned in connection with a crime (he’s able to demonstrate that he was never charged) to the mother who requested that we remove news articles for her daughter’s name as she had been the victim of abuse.  It’s a complex issue, with no easy answers.   So a robust debate is both welcome and necessary, as, on this issue at least, no search engine has an instant or perfect answer.<br /><br /><span class="byline-author">Posted by David Drummond, Senior Vice President, Corporate Development and Chief Legal Officer</span></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/searching-for-the-right-balance-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>A step toward government transparency</title>
		<link>https://googledata.org/google-public-policy/a-step-toward-government-transparency/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-step-toward-government-transparency</link>
		<comments>https://googledata.org/google-public-policy/a-step-toward-government-transparency/#comments</comments>
		<pubDate>Fri, 27 Jun 2014 17:01:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=e112d7b247381271048795cede85659d</guid>
		<description><![CDATA[<div dir="ltr">Posted by Richard Salgado, Director Law Enforcement and Information Security<br /><br />Last year, President Obama directed the Intelligence Community to be more transparent about government surveillance programs, which led to a promise by the Office of the Director of National Intelligence to release a transparency report concerning national security orders it issues on an annual basis. Today, the U.S. government released its first transparency <a href="http://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013">report</a> containing statistics around national security orders for user data to Internet and telecom companies. This is a step in the right direction of increasing trust in both government and Internet services, and it demonstrates again that governments can embrace transparency while protecting national security.  We applaud this first step, and strongly encourage other countries to follow suit, though there is still more to be done.<br /><br />First, the government reports in a manner that makes it impossible to compare its report with the report of companies, such as the <a href="http://www.google.com/transparencyreport/">Google Transparency Report</a>.   Specifically, the government has chosen to disclose an estimated number of &#8220;targets&#8221; that it has surveilled, rather than the number of &#8220;accounts&#8221; at issue.  This means that where the &#8220;target&#8221; is an organization composed of many people, and the government uses FISA to require disclosure of information from many different providers about the many accounts used by those people, covering a broad array of services, it may only report that there was one target.  By contrast, in our methodology, and that used by other companies, we each would count the number of accounts impacted by a particular surveillance request.  The government could provide more meaningful transparency by specifying the number of accounts too.<br /><br />Second, we would like to see the federal government report on its national security demands with more information about the targets than it does today.  Companies like Google can only provide a limited snapshot of how national security authorities are used.  The Department of Justice, however, can provide a complete picture.  To that end, we support <a href="http://www.google.com/transparencyreport/">legislation proposed</a> by Senator Franken in August of 2013 that would mandate that the U.S. government release statistics around the number of both citizens and non-citizens whose information is collected and the scale and scope of the search and review of that data.<br /><br />Finally, we <a href="http://googlepublicpolicy.blogspot.com/2014/02/its-time-to-reform-government.html"><span>gave early support</span></a> for USA Freedom Act provisions which would allow companies to provide greater detail about the volume, scope, and type of national security demands that we ourselves receive for user data.  Last month, the House version of the USA Freedom Act made improvements on the terms set out by the <a href="http://www.justice.gov/iso/opa/resources/366201412716018407143.pdf">Department of Justice</a>, and we hope that the Senate paves the way for companies to share more details about the national security demands that we receive.<br /><br />I&#8217;m excited to see how far this debate has come; a year ago almost no one would have imagined that the federal government would release data about its national security demands to companies.  These steps show that national security and transparency for the public are not in competition.  We also hope that governments around the world will follow the lead of the U.S. government and be more open about the national security demands they serve on service providers and put out comparable transparency reports.  Congress, and other governments around the world, should build on these steps.</div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on">Posted by Richard Salgado, Director Law Enforcement and Information Security<br /><br />Last year, President Obama directed the Intelligence Community to be more transparent about government surveillance programs, which led to a promise by the Office of the Director of National Intelligence to release a transparency report concerning national security orders it issues on an annual basis. Today, the U.S. government released its first transparency <a href="http://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013">report</a> containing statistics around national security orders for user data to Internet and telecom companies. This is a step in the right direction of increasing trust in both government and Internet services, and it demonstrates again that governments can embrace transparency while protecting national security.  We applaud this first step, and strongly encourage other countries to follow suit, though there is still more to be done.<br /><br />First, the government reports in a manner that makes it impossible to compare its report with the report of companies, such as the <a href="http://www.google.com/transparencyreport/">Google Transparency Report</a>.   Specifically, the government has chosen to disclose an estimated number of “targets” that it has surveilled, rather than the number of “accounts” at issue.  This means that where the “target” is an organization composed of many people, and the government uses FISA to require disclosure of information from many different providers about the many accounts used by those people, covering a broad array of services, it may only report that there was one target.  By contrast, in our methodology, and that used by other companies, we each would count the number of accounts impacted by a particular surveillance request.  The government could provide more meaningful transparency by specifying the number of accounts too.<br /><br />Second, we would like to see the federal government report on its national security demands with more information about the targets than it does today.  Companies like Google can only provide a limited snapshot of how national security authorities are used.  The Department of Justice, however, can provide a complete picture.  To that end, we support <a href="http://www.google.com/transparencyreport/">legislation proposed</a> by Senator Franken in August of 2013 that would mandate that the U.S. government release statistics around the number of both citizens and non-citizens whose information is collected and the scale and scope of the search and review of that data.<br /><br />Finally, we <a href="http://googlepublicpolicy.blogspot.com/2014/02/its-time-to-reform-government.html"><span style="color: blue;">gave early support</span></a> for USA Freedom Act provisions which would allow companies to provide greater detail about the volume, scope, and type of national security demands that we ourselves receive for user data.  Last month, the House version of the USA Freedom Act made improvements on the terms set out by the <a href="http://www.justice.gov/iso/opa/resources/366201412716018407143.pdf">Department of Justice</a>, and we hope that the Senate paves the way for companies to share more details about the national security demands that we receive.<br /><br />I’m excited to see how far this debate has come; a year ago almost no one would have imagined that the federal government would release data about its national security demands to companies.  These steps show that national security and transparency for the public are not in competition.  We also hope that governments around the world will follow the lead of the U.S. government and be more open about the national security demands they serve on service providers and put out comparable transparency reports.  Congress, and other governments around the world, should build on these steps.</div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/a-step-toward-government-transparency/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>A significant milestone for digital due process</title>
		<link>https://googledata.org/google-public-policy/a-significant-milestone-for-digital-due-process/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-significant-milestone-for-digital-due-process</link>
		<comments>https://googledata.org/google-public-policy/a-significant-milestone-for-digital-due-process/#comments</comments>
		<pubDate>Wed, 18 Jun 2014 15:28:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=34317a988218b84da9277e3fbec82ddd</guid>
		<description><![CDATA[<div dir="ltr"><span>Posted by David Lieber, Senior Privacy Policy Counsel&#160;</span><br /><span><br /></span><span>Although the recent debate around government surveillance has focused on the reach of the National Security Agency (NSA) and the Foreign Intelligence Surveillance Act (FISA), we have <a href="http://googlepublicpolicy.blogspot.com/2010/05/important-step-toward-updating-ecpa.html">long supported</a> <a href="http://googlepublicpolicy.blogspot.com/2013/04/more-momentum-toward-digital-due-process.html">efforts</a> <a href="http://googlepublicpolicy.blogspot.com/2014/02/its-time-to-reform-government.html">to update</a> the Electronic Communications Privacy Act (ECPA) so that the government must obtain a warrant to require a provider to disclose content stored with the provider.&#160;   </span><br /><span><br /></span><span>The ongoing campaign to update ECPA reached a significant milestone today.  For the first time, a majority of Members in the U.S. House of Representatives have gone on record to support <a href="http://beta.congress.gov/113/bills/hr1852/BILLS-113hr1852ih.pdf">bipartisan legislation</a> (H.R. 1852) sponsored by Representatives Yoder (R-KS), Graves (R-GA), and Polis (D-CO) that would create a bright-line, warrant-for-content rule for electronic communications.&#160;</span><br /><span><br /></span><span>This common-sense reform is long overdue.  While well-intentioned when enacted in 1986, ECPA no longer reflects users&#8217; reasonable expectations of privacy.  For example, an email may receive more robust privacy protections under ECPA depending on how old it is, whether it has been opened, and where it is stored &#8212; while users attach no importance to these distinctions. The Department of Justice itself has acknowledged that there is no principled reason for this rule.&#160;</span><br /><span><br /></span><span>In 2010, a federal appeals court <a href="http://scholar.google.com/scholar_case?case=1170760837547673255&#38;q=united+states+v.+warshak&#38;hl=en&#38;as_sdt=20000006">said that ECPA itself is unconstitutional</a> to the extent that it authorizes the government to obtain the content of emails without a warrant.  Google agrees with the court that the Fourth Amendment requires that the government issue a search warrant to compel a provider to disclose the content of communications that a user stores with a provider.&#160;</span><br /><span><br /></span><span>Congress should send a clear message about the limits of government surveillance by enacting legislation that would create a bright-line, warrant-for-content standard.  Now that a majority has gone on record to support this common sense update, we once again urge Congress to expeditiously pass legislation to update ECPA.</span></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-family: Arial, Helvetica, sans-serif;">Posted by David Lieber, Senior Privacy Policy Counsel&nbsp;</span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">Although the recent debate around government surveillance has focused on the reach of the National Security Agency (NSA) and the Foreign Intelligence Surveillance Act (FISA), we have <a href="http://googlepublicpolicy.blogspot.com/2010/05/important-step-toward-updating-ecpa.html">long supported</a> <a href="http://googlepublicpolicy.blogspot.com/2013/04/more-momentum-toward-digital-due-process.html">efforts</a> <a href="http://googlepublicpolicy.blogspot.com/2014/02/its-time-to-reform-government.html">to update</a> the Electronic Communications Privacy Act (ECPA) so that the government must obtain a warrant to require a provider to disclose content stored with the provider.&nbsp;   </span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">The ongoing campaign to update ECPA reached a significant milestone today.  For the first time, a majority of Members in the U.S. House of Representatives have gone on record to support <a href="http://beta.congress.gov/113/bills/hr1852/BILLS-113hr1852ih.pdf">bipartisan legislation</a> (H.R. 1852) sponsored by Representatives Yoder (R-KS), Graves (R-GA), and Polis (D-CO) that would create a bright-line, warrant-for-content rule for electronic communications.&nbsp;</span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">This common-sense reform is long overdue.  While well-intentioned when enacted in 1986, ECPA no longer reflects users’ reasonable expectations of privacy.  For example, an email may receive more robust privacy protections under ECPA depending on how old it is, whether it has been opened, and where it is stored — while users attach no importance to these distinctions. The Department of Justice itself has acknowledged that there is no principled reason for this rule.&nbsp;</span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">In 2010, a federal appeals court <a href="http://scholar.google.com/scholar_case?case=1170760837547673255&amp;q=united+states+v.+warshak&amp;hl=en&amp;as_sdt=20000006">said that ECPA itself is unconstitutional</a> to the extent that it authorizes the government to obtain the content of emails without a warrant.  Google agrees with the court that the Fourth Amendment requires that the government issue a search warrant to compel a provider to disclose the content of communications that a user stores with a provider.&nbsp;</span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">Congress should send a clear message about the limits of government surveillance by enacting legislation that would create a bright-line, warrant-for-content standard.  Now that a majority has gone on record to support this common sense update, we once again urge Congress to expeditiously pass legislation to update ECPA.</span></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/a-significant-milestone-for-digital-due-process/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Commemorating D-Day’s 70th anniversary</title>
		<link>https://googledata.org/google-public-policy/commemorating-d-days-70th-anniversary/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=commemorating-d-days-70th-anniversary</link>
		<comments>https://googledata.org/google-public-policy/commemorating-d-days-70th-anniversary/#comments</comments>
		<pubDate>Wed, 04 Jun 2014 14:30:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=3f3ef697a6ed7ced0a30b65e4c090a8d</guid>
		<description><![CDATA[<div dir="ltr"><span><span>Posted by Sixtine Fabre, Associate Program Manager, Google Cultural Institute</span></span><br /><br /><div dir="ltr"><div dir="ltr"><span>On June 6, 1944, the largest air, naval and military operation in history took place on the coast of Normandy. To commemorate the 70th anniversary of D-Day, we&#8217;ve partnered with a number of cultural institutions and veterans from the U.S., U.K. and France to help share the stories of the Normandy Landings through the </span><a href="https://www.google.com/culturalinstitute/entity/%2Fm%2F01lhv6"><span>Cultural Institute</span></a><span> and a </span><a href="https://plus.sandbox.google.com/u/0/events/cpnetnitq6oqkfdfqimapjeo384"><span>Google+ Hangout on Air</span></a><span> today. </span></div><b><br /></b><div dir="ltr"><span>Technology allows us to bring together information from around the world to showcase different perspectives on one moment in time. This is possible thanks to partners including </span><a href="https://www.google.com/culturalinstitute/exhibit/d-day-and-the-normandy-invasion/wRQ7nqwa"><span>The National Archives</span></a><span>, </span><a href="https://www.google.com/culturalinstitute/exhibit/d-day/QQd7Y5F1"><span>The George C. Marshall Research Foundation</span></a><span>, </span><a href="https://www.google.com/culturalinstitute/exhibit/d-day/gQcirO57"><span>The Imperial War Museum</span></a><span>, and </span><a href="https://www.google.com/culturalinstitute/exhibit/bletchley-park-home-of-the-codebreakers/wRANFg9s"><span>Bletchley Park codebreaker center</span></a><span>.</span></div><b><br /></b><div dir="ltr"><span>This collection provides an in-depth look into the Normandy Landings with 470 new documents and images ranging from photos of </span><a href="https://www.google.com/culturalinstitute/asset-viewer/members-of-the-women%E2%80%99s-auxiliary-air-force-waaf-repair-and-pack-parachutes-for-use-by-airborne-troops-during-the-normandy-invasion-31-may-1944/tQGYPSpHjU47OA?exhibitId=gQcirO57"><span>important preparations</span></a><span>, </span><a href="https://www.google.com/culturalinstitute/asset-viewer/josef-stalin-president-franklin-roosevelt-and-prime-minister-winston-churchill-at-tehran-1943/OwHbSsZwaZDwIg?exhibitId=gQcirO57"><span>meetings of leaders</span></a><span>, and </span><a href="https://www.google.com/culturalinstitute/asset-viewer/troops-of-the-us-7th-corps-wading-ashore-on-utah-beach-6-june-1944/4wHk0LWUJzxVVg?exhibitId=gQcirO57"><span>soldiers in action</span></a><span> to documents like </span><a href="https://www.google.com/culturalinstitute/asset-viewer/reading-copy-of-fdr%E2%80%99s-d-day-prayer-june-6-1944-page-1/uwHWp1I0jX-NPQ"><span>FDR&#8217;s D-Day Prayer</span></a><span> and a </span><a href="https://www.google.com/culturalinstitute/asset-viewer/top-secret-progress-report-from-eisenhower-to-marshall-june-6-1944-page-2/bQHB_QfTNTpv7A"><span>top secret progress report</span></a><span> from General Eisenhower to General Marshall. These pieces have been curated into digital exhibits that present a timeline of events for those who want to be guided through the content. For visitors who have a specific photo or document in mind, the search function allows users to find specific archival material.</span></div><b><br /></b><div dir="ltr"><span>Not only will we honor this history through archival content, but you&#8217;ll also have the chance to hear the stories of veterans who made the mission possible. Today, we&#8217;re hosting a </span><a href="https://plus.sandbox.google.com/u/0/events/cpnetnitq6oqkfdfqimapjeo384"><span>Google+ Hangout on Air</span></a><span> from the Caen War Memorial with American, French and British D-Day veterans. The conversation will be hosted by French journalist Gilles Bouleau and Caen Memorial historian Christophe Prime will take part as well. The </span><a href="https://plus.sandbox.google.com/u/0/events/cpnetnitq6oqkfdfqimapjeo384"><span>Hangout</span></a><span> will begin at 12:00 p.m. EST.</span></div><br /><div dir="ltr"><span>Whether it&#8217;s through the Cultural Institute or Hangouts on Air, we hope you&#8217;ll take the chance to learn more about D-Day and remember this important piece of our history. </span></div></div><div dir="ltr"><span><br /></span></div><table align="center" cellpadding="0" cellspacing="0"><tbody><tr><td><a href="http://4.bp.blogspot.com/-c1k5Viwd-nU/U48qjlf4yAI/AAAAAAAABow/7edXv1KEr3A/s1600/Screen+Shot+2014-06-04+at+10.17.28+AM.png"><img border="0" src="http://4.bp.blogspot.com/-c1k5Viwd-nU/U48qjlf4yAI/AAAAAAAABow/7edXv1KEr3A/s1600/Screen+Shot+2014-06-04+at+10.17.28+AM.png" height="320" width="400"></a></td></tr><tr><td>US Amphibious Force Training for Invasion, The George C. Marshall Foundation</td></tr></tbody></table><div dir="ltr"><span><br /></span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-family: Arial; font-size: x-small;"><span style="line-height: 14.949999809265137px; white-space: pre-wrap;">Posted by Sixtine Fabre, Associate Program Manager, Google Cultural Institute</span></span><br /><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">On June 6, 1944, the largest air, naval and military operation in history took place on the coast of Normandy. To commemorate the 70th anniversary of D-Day, we’ve partnered with a number of cultural institutions and veterans from the U.S., U.K. and France to help share the stories of the Normandy Landings through the </span><a href="https://www.google.com/culturalinstitute/entity/%2Fm%2F01lhv6" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Cultural Institute</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> and a </span><a href="https://plus.sandbox.google.com/u/0/events/cpnetnitq6oqkfdfqimapjeo384" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google+ Hangout on Air</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> today. </span></div><b id="docs-internal-guid-0fc6f70d-674c-1ca6-e754-fd7e3f3f3d8c" style="font-weight: normal;"><br /></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Technology allows us to bring together information from around the world to showcase different perspectives on one moment in time. This is possible thanks to partners including </span><a href="https://www.google.com/culturalinstitute/exhibit/d-day-and-the-normandy-invasion/wRQ7nqwa" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">The National Archives</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, </span><a href="https://www.google.com/culturalinstitute/exhibit/d-day/QQd7Y5F1" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">The George C. Marshall Research Foundation</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, </span><a href="https://www.google.com/culturalinstitute/exhibit/d-day/gQcirO57" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">The Imperial War Museum</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, and </span><a href="https://www.google.com/culturalinstitute/exhibit/bletchley-park-home-of-the-codebreakers/wRANFg9s" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Bletchley Park codebreaker center</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">.</span></div><b style="font-weight: normal;"><br /></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">This collection provides an in-depth look into the Normandy Landings with 470 new documents and images ranging from photos of </span><a href="https://www.google.com/culturalinstitute/asset-viewer/members-of-the-women%E2%80%99s-auxiliary-air-force-waaf-repair-and-pack-parachutes-for-use-by-airborne-troops-during-the-normandy-invasion-31-may-1944/tQGYPSpHjU47OA?exhibitId=gQcirO57" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">important preparations</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, </span><a href="https://www.google.com/culturalinstitute/asset-viewer/josef-stalin-president-franklin-roosevelt-and-prime-minister-winston-churchill-at-tehran-1943/OwHbSsZwaZDwIg?exhibitId=gQcirO57" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">meetings of leaders</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, and </span><a href="https://www.google.com/culturalinstitute/asset-viewer/troops-of-the-us-7th-corps-wading-ashore-on-utah-beach-6-june-1944/4wHk0LWUJzxVVg?exhibitId=gQcirO57" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">soldiers in action</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to documents like </span><a href="https://www.google.com/culturalinstitute/asset-viewer/reading-copy-of-fdr%E2%80%99s-d-day-prayer-june-6-1944-page-1/uwHWp1I0jX-NPQ" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">FDR’s D-Day Prayer</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> and a </span><a href="https://www.google.com/culturalinstitute/asset-viewer/top-secret-progress-report-from-eisenhower-to-marshall-june-6-1944-page-2/bQHB_QfTNTpv7A" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">top secret progress report</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> from General Eisenhower to General Marshall. These pieces have been curated into digital exhibits that present a timeline of events for those who want to be guided through the content. For visitors who have a specific photo or document in mind, the search function allows users to find specific archival material.</span></div><b style="font-weight: normal;"><br /></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Not only will we honor this history through archival content, but you’ll also have the chance to hear the stories of veterans who made the mission possible. Today, we’re hosting a </span><a href="https://plus.sandbox.google.com/u/0/events/cpnetnitq6oqkfdfqimapjeo384" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google+ Hangout on Air</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> from the Caen War Memorial with American, French and British D-Day veterans. The conversation will be hosted by French journalist Gilles Bouleau and Caen Memorial historian Christophe Prime will take part as well. The </span><a href="https://plus.sandbox.google.com/u/0/events/cpnetnitq6oqkfdfqimapjeo384" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Hangout</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> will begin at 12:00 p.m. EST.</span></div><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Whether it’s through the Cultural Institute or Hangouts on Air, we hope you’ll take the chance to learn more about D-Day and remember this important piece of our history. </span></div></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody><tr><td style="text-align: center;"><a href="http://4.bp.blogspot.com/-c1k5Viwd-nU/U48qjlf4yAI/AAAAAAAABow/7edXv1KEr3A/s1600/Screen+Shot+2014-06-04+at+10.17.28+AM.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="http://4.bp.blogspot.com/-c1k5Viwd-nU/U48qjlf4yAI/AAAAAAAABow/7edXv1KEr3A/s1600/Screen+Shot+2014-06-04+at+10.17.28+AM.png" height="320" width="400" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">US Amphibious Force Training for Invasion, The George C. Marshall Foundation</td></tr></tbody></table><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/commemorating-d-days-70th-anniversary/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>The FCC’s Important Step to Power Wireless Broadband</title>
		<link>https://googledata.org/google-public-policy/the-fccs-important-step-to-power-wireless-broadband/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-fccs-important-step-to-power-wireless-broadband</link>
		<comments>https://googledata.org/google-public-policy/the-fccs-important-step-to-power-wireless-broadband/#comments</comments>
		<pubDate>Thu, 15 May 2014 20:27:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=6d942eb514ca0a68e029e638673ae4ae</guid>
		<description><![CDATA[<div dir="ltr"><div><span>Posted by Aparna Sridhar, Google Policy Counsel</span></div><div><span><br /></span></div><div><span>Today, the Federal Communications Commission took an important step toward powering tomorrow&#8217;s wireless broadband. &#160;The FCC adopted new rules that will designate some spectrum--resources that, under the FCC&#8217;s plan, would not in any event be auctioned for wireless carriers&#8217; broadband services--for unlicensed devices and applications on a shared basis. &#160;</span></div><div><b><br /></b></div><div><span>Unlicensed uses of spectrum are an important complement to carriers&#8217; mobile broadband services. &#160;For example, the Wi-Fi networks in homes, businesses, and coffee shops allow users to take data off the wireless carriers&#8217; licensed networks, which enables faster service and reduces congestion on cellular systems. &#160;For smartphones and tablets in particular, Cisco has found that daily data consumption over Wi-Fi is four times that of cellular. &#160;Offloading data from cellular networks to Wi-Fi has saved mobile network operators billions of dollars in network deployment costs. &#160;Faster and cheaper access to online services drives usage of those services and thus demand for all forms of network access, creating a virtuous cycle of investment. &#160;Access to new, lower-frequency TV band spectrum could accelerate this process and create more unlicensed service options, allowing better indoor coverage and service in rural and underserved areas. &#160;</span></div><div><b><br /></b></div><div><span>The FCC&#8217;s plan allows television broadcasters to sell their spectrum rights voluntarily so they can be purchased by mobile operators. &#160;This will enable more efficient spectrum use and spur economic growth. </span></div><div><b><br /></b></div><div><span>The FCC had a challenge in designing its plan for an auction of TV broadcast spectrum, and we&#8217;re pleased that it is supporting both licensed and unlicensed uses. &#160;While the plan doesn&#8217;t provide as much unlicensed spectrum as we recommended, it should provide just enough unlicensed spectrum to attract investments in equipment and operations in the new band. &#160;Google will do its part to ensure that our </span><a href="https://www.google.com/get/spectrumdatabase/"><span>Spectrum Database</span></a><span> supports sharing of the newly allocated spectrum. </span></div><div><br /></div><div><span><span>We&#8217;re grateful that Congressional supporters of unlicensed spectrum use have continued to back the FCC&#8217;s progress on this front. </span>While there&#8217;s still a lot of work ahead to get the final details of the auction right, we look forward to working with all stakeholders to build the next generation of wireless technologies and see them deployed across America. </span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial; white-space: pre-wrap;">Posted by Aparna Sridhar, Google Policy Counsel</span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial; font-size: 15px; white-space: pre-wrap;"><br /></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Today, the Federal Communications Commission took an important step toward powering tomorrow’s wireless broadband. &nbsp;The FCC adopted new rules that will designate some spectrum--resources that, under the FCC’s plan, would not in any event be auctioned for wireless carriers’ broadband services--for unlicensed devices and applications on a shared basis. &nbsp;</span></div><div style="text-align: left;"><b id="docs-internal-guid-dd262618-018d-ea6d-fc69-cf582c3eb8d4" style="font-weight: normal;"><br /></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Unlicensed uses of spectrum are an important complement to carriers’ mobile broadband services. &nbsp;For example, the Wi-Fi networks in homes, businesses, and coffee shops allow users to take data off the wireless carriers’ licensed networks, which enables faster service and reduces congestion on cellular systems. &nbsp;For smartphones and tablets in particular, Cisco has found that daily data consumption over Wi-Fi is four times that of cellular. &nbsp;Offloading data from cellular networks to Wi-Fi has saved mobile network operators billions of dollars in network deployment costs. &nbsp;Faster and cheaper access to online services drives usage of those services and thus demand for all forms of network access, creating a virtuous cycle of investment. &nbsp;Access to new, lower-frequency TV band spectrum could accelerate this process and create more unlicensed service options, allowing better indoor coverage and service in rural and underserved areas. &nbsp;</span></div><div style="text-align: left;"><b style="font-weight: normal;"><br /></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The FCC’s plan allows television broadcasters to sell their spectrum rights voluntarily so they can be purchased by mobile operators. &nbsp;This will enable more efficient spectrum use and spur economic growth. </span></div><div style="text-align: left;"><b style="font-weight: normal;"><br /></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The FCC had a challenge in designing its plan for an auction of TV broadcast spectrum, and we’re pleased that it is supporting both licensed and unlicensed uses. &nbsp;While the plan doesn’t provide as much unlicensed spectrum as we recommended, it should provide just enough unlicensed spectrum to attract investments in equipment and operations in the new band. &nbsp;Google will do its part to ensure that our </span><a href="https://www.google.com/get/spectrumdatabase/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Spectrum Database</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> supports sharing of the newly allocated spectrum. </span></div><div style="text-align: left;"><br /></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-family: Arial; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-size: 15px; line-height: 1.15;">We’re grateful that Congressional supporters of unlicensed spectrum use have continued to back the FCC’s progress on this front. </span>While there’s still a lot of work ahead to get the final details of the auction right, we look forward to working with all stakeholders to build the next generation of wireless technologies and see them deployed across America. </span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/the-fccs-important-step-to-power-wireless-broadband/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>New FCC Rules Will Boost Wireless Broadband</title>
		<link>https://googledata.org/google-public-policy/new-fcc-rules-will-boost-wireless-broadband/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-fcc-rules-will-boost-wireless-broadband</link>
		<comments>https://googledata.org/google-public-policy/new-fcc-rules-will-boost-wireless-broadband/#comments</comments>
		<pubDate>Wed, 23 Apr 2014 18:59:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=0ebbd343660b089c067af07d412010e6</guid>
		<description><![CDATA[<div dir="ltr"><div><span><i><span>Posted by Milo Medin, Vice President of Access Services</span></i></span></div><div><b><span><br /></span></b></div><div><span><span>Earlier today, the Federal Communications Commission </span><a href="http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-326708A1.pdf"><span>adopted proposed rules</span></a><span> that -- if finalized later this year as planned -- will implement a 2012 </span><a href="http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast_spectrum_report_final_july_20_2012.pdf"><span>recommendation</span></a><span> of the President&#8217;s Council of Advisors on Science and Technology (PCAST)</span><span> and put spectrum to better use for broadband. &#160;The proposed rules include some of the most forward-thinking spectrum policy anywhere in the world, and the FCC should be commended for moving aggressively towards implementation.</span></span></div><div><b><span><br /></span></b></div><div><span><span>The key idea is that modern database technologies will allow commercial use of spectrum that historically has been dedicated to federal purposes, when and where the government doesn&#8217;t have immediate need for it. &#160;Additionally, this new model allows flexible commercial use of the spectrum, where the database can mediate between protected operations like cellular LTE, and unprotected operations (which could be WiFi-type devices), without the government having to pick one or the other. &#160;</span></span></div><div><b><span><br /></span></b></div><div><span><span>The government will also benefit from having commercial devices in their bands. &#160;Federal users will be able to buy lower-cost and higher-performance equipment based on consumer smartphone technologies. &#160;</span><span>It&#8217;s a win-win approach that lets government agencies continue to use their spectrum and take advantage of the commercial ecosystem, while also helping meet the growing demand for mobile broadband and device connectivity. &#160;</span></span></div><div><b><span><br /></span></b></div><div><span><span>Google has long advocated for more efficient use of spectrum through sharing technologies. &#160;We operate an FCC-approved </span><a href="https://www.google.com/get/spectrumdatabase/"><span>Spectrum Database</span></a><span> that enables the use of vacant TV broadcast channels for wireless broadband. &#160;And, we&#8217;ve built a prototype Spectrum Access System that is in use at our headquarters in Mountain View, California. &#160;We believe spectrum sharing can unlock huge consumer benefits compared with traditional approaches of clearing existing users to make way for new ones, which can take as long as a decade to implement when it is possible at all.</span></span></div><div><b><span><br /></span></b></div><div><span><span></span></span></div><div><span><span>It also is important that the FCC continue pushing hard to allow flexible use of spectrum in multiple bands.  Different radio frequencies are suited to different applications. &#160;For instance, the 600 MHz TV broadcast spectrum that Congress designated for voluntary recovery is especially useful for longer range services that provide excellent coverage, while higher frequencies (like the 3550 MHz band that&#8217;s at issue in today&#8217;s FCC rules) are ideal for quickly and affordably scaling up capacity in densely populated areas. &#160;In these bands and others, federal policy should maximize the availability of spectrum that&#8217;s usable for broadband under a variety of business models.</span></span></div><div><span><br /></span></div><div><span><span>Google welcomes the new FCC rules as a major step forward. &#160;We&#8217;re committed to continue to work with the FCC and other federal agencies to make shared commercial access a reality, while ensuring federal operations are safeguarded.</span></span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: left;"><span style="line-height: 1.15; white-space: pre-wrap;"><i><span style="font-family: Arial, Helvetica, sans-serif;">Posted by Milo Medin, Vice President of Access Services</span></i></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Earlier today, the Federal Communications Commission </span><a href="http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-326708A1.pdf" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">adopted proposed rules</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> that -- if finalized later this year as planned -- will implement a 2012 </span><a href="http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast_spectrum_report_final_july_20_2012.pdf" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">recommendation</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> of the President’s Council of Advisors on Science and Technology (PCAST)</span><span style="background-color: white; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> and put spectrum to better use for broadband. &nbsp;The proposed rules include some of the most forward-thinking spectrum policy anywhere in the world, and the FCC should be commended for moving aggressively towards implementation.</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: white; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">The key idea is that modern database technologies will allow commercial use of spectrum that historically has been dedicated to federal purposes, when and where the government doesn’t have immediate need for it. &nbsp;Additionally, this new model allows flexible commercial use of the spectrum, where the database can mediate between protected operations like cellular LTE, and unprotected operations (which could be WiFi-type devices), without the government having to pick one or the other. &nbsp;</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The government will also benefit from having commercial devices in their bands. &nbsp;Federal users will be able to buy lower-cost and higher-performance equipment based on consumer smartphone technologies. &nbsp;</span><span style="background-color: white; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">It’s a win-win approach that lets government agencies continue to use their spectrum and take advantage of the commercial ecosystem, while also helping meet the growing demand for mobile broadband and device connectivity. &nbsp;</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Google has long advocated for more efficient use of spectrum through sharing technologies. &nbsp;We operate an FCC-approved </span><a href="https://www.google.com/get/spectrumdatabase/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Spectrum Database</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> that enables the use of vacant TV broadcast channels for wireless broadband. &nbsp;And, we’ve built a prototype Spectrum Access System that is in use at our headquarters in Mountain View, California. &nbsp;We believe spectrum sharing can unlock huge consumer benefits compared with traditional approaches of clearing existing users to make way for new ones, which can take as long as a decade to implement when it is possible at all.</span></span></div><div style="text-align: left;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><span id="docs-internal-guid-1b01fb4c-8fe5-07d0-750b-970207e664e2"></span></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">It also is important that the FCC continue pushing hard to allow flexible use of spectrum in multiple bands.  Different radio frequencies are suited to different applications. &nbsp;For instance, the 600 MHz TV broadcast spectrum that Congress designated for voluntary recovery is especially useful for longer range services that provide excellent coverage, while higher frequencies (like the 3550 MHz band that’s at issue in today’s FCC rules) are ideal for quickly and affordably scaling up capacity in densely populated areas. &nbsp;In these bands and others, federal policy should maximize the availability of spectrum that’s usable for broadband under a variety of business models.</span></span></div><div style="text-align: left;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div><div style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Google welcomes the new FCC rules as a major step forward. &nbsp;We’re committed to continue to work with the FCC and other federal agencies to make shared commercial access a reality, while ensuring federal operations are safeguarded.</span></span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/new-fcc-rules-will-boost-wireless-broadband/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Using Technology to Celebrate and Remember the Civil Rights Movement</title>
		<link>https://googledata.org/google-public-policy/using-technology-to-celebrate-and-remember-the-civil-rights-movement/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=using-technology-to-celebrate-and-remember-the-civil-rights-movement</link>
		<comments>https://googledata.org/google-public-policy/using-technology-to-celebrate-and-remember-the-civil-rights-movement/#comments</comments>
		<pubDate>Tue, 08 Apr 2014 19:23:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=c415aae636f3fb6b8709e03693fa2904</guid>
		<description><![CDATA[<div dir="ltr"><div dir="ltr"><span><span>Posted by Susan Molinari, VP Public Policy&#160;&#160;</span></span></div><div dir="ltr"><span><span><br /></span></span></div><div dir="ltr"><span>Technology can help us understand our past and connect with history in extraordinary and meaningful ways.&#160;This week, the LBJ Presidential Library is holding a three day </span><a href="http://www.civilrightssummit.org/"><span>Civil Rights Summit</span></a><span> to mark the 50th anniversary of the Civil Rights Act of 1964 and we are proud to provide technology to help support this event. </span></div><div dir="ltr"><b><br /><span></span></b></div><div dir="ltr"><span>Over the next three days, we will be </span><a href="http://www.civilrightssummit.org/"><span>live streaming</span></a><span> the program so people from all over the world can tune in to hear the panels and speakers, including remarks from four U.S. presidents. Each day will also feature heroes from the civil rights movement, the sports arena and the music industry, as well as panels on new civil rights challenges around immigration rights, gay rights, women&#8217;s rights and so much more. &#160;We hope you can tune in, but if you miss the live stream, you can find all of the content on the </span><a href="https://www.youtube.com/user/TheLBJLibrary"><span>LBJ Library&#8217;s YouTube page</span></a><span>. </span></div><div dir="ltr"><b><br /><span></span></b></div><div dir="ltr"><a href="http://goo.gl/M8wMfL"><span>President Jimmy Carter</span></a><span> will also be doing a Google+ Hangout on Air Tuesday at 2:00 PM PST. &#160;Rock musician </span><a href="https://plus.sandbox.google.com/events/c4cib0aq4uj26i00mepe3tl69io"><span>Graham Nash</span></a><span> of Crosby, Stills and Nash fame will be on Air Tuesday at 2:30 PM PST, and </span><a href="http://goo.gl/wjYEVD"><span>playwright Robert Schenkkan</span></a><span>, whose play about LBJ is currently on Broadway, will be on Air Wednesday at 2:00 PM PST.</span></div><div dir="ltr"><b><br /><span></span></b></div><div dir="ltr"><span>Finally, Google has teamed up with the National Archives to launch a </span><a href="https://www.google.com/culturalinstitute/exhibit/the-civil-rights-act-of-1964/wRSRa8FV"><span>new collection on the Cultural Institute</span></a><span> to capture the history of the passage of the Civil Rights Act online. Much of the content on the site is from the LBJ Presidential Library and features images, letters, telegrams, and video from January 1961 when President Kennedy first takes office to July 1964 when President Johnson signs the Civil Rights Act into law. Here are a few examples of what can be found in the collection: </span></div><div dir="ltr"><b><br /><span></span></b></div><ul><li><div dir="ltr"><a href="https://www.google.com/culturalinstitute/asset-viewer/telegram-to-president-kennedy-from-martin-luther-king-jr/IAEbaMAGTTg4KQ?exhibitId=wRSRa8FV"><span>Telegram from Dr. Martin Luther King Jr. to President Kennedy</span></a><span>, June 1963</span></div></li><li><div dir="ltr"><a href="https://www.google.com/culturalinstitute/asset-viewer/request-for-a-meeting-on-the-day-of-the-march-on-washington/wQGzgah4EDsB4w?exhibitId=wRSRa8FV"><span>Request to meet with Kennedy on the day of the March on Washington</span></a><span>, August 1963</span></div></li><li><div dir="ltr"><a href="https://www.google.com/culturalinstitute/asset-viewer/civil-rights-act-of-1964/tgHFe_NVPXGemQ?exhibitId=wRSRa8FV"><span>The Civil Rights Act of 1964</span></a><span>, July 1964</span></div></li></ul><div dir="ltr"><b><br /><span></span></b></div><div dir="ltr"><span>We are honored to be able to help capture this important event and this special exhibit highlighting one of America&#8217;s most pivotal moments in history. </span></div><div dir="ltr"><span></span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="background-color: white; color: #666666; font-family: 'Trebuchet MS', Trebuchet, Verdana, sans-serif; font-size: 13px; line-height: 18.479999542236328px; white-space: normal;">Posted by Susan Molinari, VP Public Policy&nbsp;&nbsp;</span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="background-color: white; color: #666666; font-family: 'Trebuchet MS', Trebuchet, Verdana, sans-serif; font-size: 13px; line-height: 18.479999542236328px; white-space: normal;"><br /></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Technology can help us understand our past and connect with history in extraordinary and meaningful ways.&nbsp;This week, the LBJ Presidential Library is holding a three day </span><a href="http://www.civilrightssummit.org/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Civil Rights Summit</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to mark the 50th anniversary of the Civil Rights Act of 1964 and we are proud to provide technology to help support this event. </span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-1a42f2bb-42ca-4e0a-58a4-01424be0b9fd" style="font-weight: normal;"><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Over the next three days, we will be </span><a href="http://www.civilrightssummit.org/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">live streaming</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> the program so people from all over the world can tune in to hear the panels and speakers, including remarks from four U.S. presidents. Each day will also feature heroes from the civil rights movement, the sports arena and the music industry, as well as panels on new civil rights challenges around immigration rights, gay rights, women’s rights and so much more. &nbsp;We hope you can tune in, but if you miss the live stream, you can find all of the content on the </span><a href="https://www.youtube.com/user/TheLBJLibrary" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">LBJ Library’s YouTube page</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. </span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b style="font-weight: normal;"><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><a href="http://goo.gl/M8wMfL" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">President Jimmy Carter</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> will also be doing a Google+ Hangout on Air Tuesday at 2:00 PM PST. &nbsp;Rock musician </span><a href="https://plus.sandbox.google.com/events/c4cib0aq4uj26i00mepe3tl69io" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Graham Nash</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> of Crosby, Stills and Nash fame will be on Air Tuesday at 2:30 PM PST, and </span><a href="http://goo.gl/wjYEVD" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">playwright Robert Schenkkan</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, whose play about LBJ is currently on Broadway, will be on Air Wednesday at 2:00 PM PST.</span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b style="font-weight: normal;"><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Finally, Google has teamed up with the National Archives to launch a </span><a href="https://www.google.com/culturalinstitute/exhibit/the-civil-rights-act-of-1964/wRSRa8FV" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">new collection on the Cultural Institute</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to capture the history of the passage of the Civil Rights Act online. Much of the content on the site is from the LBJ Presidential Library and features images, letters, telegrams, and video from January 1961 when President Kennedy first takes office to July 1964 when President Johnson signs the Civil Rights Act into law. Here are a few examples of what can be found in the collection: </span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b style="font-weight: normal;"><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></b></div><ul style="margin-bottom: 0pt; margin-top: 0pt;"><li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><a href="https://www.google.com/culturalinstitute/asset-viewer/telegram-to-president-kennedy-from-martin-luther-king-jr/IAEbaMAGTTg4KQ?exhibitId=wRSRa8FV" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Telegram from Dr. Martin Luther King Jr. to President Kennedy</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, June 1963</span></div></li><li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><a href="https://www.google.com/culturalinstitute/asset-viewer/request-for-a-meeting-on-the-day-of-the-march-on-washington/wQGzgah4EDsB4w?exhibitId=wRSRa8FV" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Request to meet with Kennedy on the day of the March on Washington</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, August 1963</span></div></li><li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><a href="https://www.google.com/culturalinstitute/asset-viewer/civil-rights-act-of-1964/tgHFe_NVPXGemQ?exhibitId=wRSRa8FV" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">The Civil Rights Act of 1964</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, July 1964</span></div></li></ul><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b style="font-weight: normal;"><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">We are honored to be able to help capture this important event and this special exhibit highlighting one of America’s most pivotal moments in history. </span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;"></span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/using-technology-to-celebrate-and-remember-the-civil-rights-movement/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Transparency Report: Requests for user information up 120 percent over four years</title>
		<link>https://googledata.org/google-public-policy/transparency-report-requests-for-user-information-up-120-percent-over-four-years/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=transparency-report-requests-for-user-information-up-120-percent-over-four-years</link>
		<comments>https://googledata.org/google-public-policy/transparency-report-requests-for-user-information-up-120-percent-over-four-years/#comments</comments>
		<pubDate>Thu, 27 Mar 2014 15:02:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=74fc0655accd12ef74421b796c0a4567</guid>
		<description><![CDATA[<div dir="ltr"><div dir="ltr"><span><span>Posted by Richard Salgado, </span><span>Legal Director, Law Enforcement and Information Security</span></span></div><b><span><br /><span></span></span></b><div dir="ltr"><span><span>While we&#8217;ve always known how important transparency is when it comes to government requests, </span><span>the events of the past year have underscored just how urgent the issue is.</span><span> From being the first company to </span><a href="http://googleblog.blogspot.com/2013/03/transparency-report-shedding-more-light.html"><span>disclose information about National Security Letters</span></a><span> to fighting for the ability to </span><a href="http://googleblog.blogspot.com/2014/02/shedding-some-light-on-foreign.html"><span>publish more about FISA requests</span></a><span>, we&#8217;ve continually advocated for your right to know. </span></span></div><b><span><br /><span></span></span></b><div dir="ltr"><span><span>Today, we&#8217;re updating our </span><a href="http://www.google.com/transparencyreport/userdatarequests/"><span>Transparency Report</span></a><span> for the ninth time. This updated Report details the number of government requests we received for user information in criminal investigations during the second half of 2013. Government requests for user information in criminal cases have increased by about 120 percent since we first began publishing these numbers in 2009. Though our number of users has grown throughout the time period, we&#8217;re also seeing more and more governments start to exercise their authority to make requests. </span></span></div><b><span><br /><span></span></span></b><div dir="ltr"><span><span>We consistently push back against overly broad requests for your personal information, but it&#8217;s also important for laws to explicitly protect you from government overreach. That&#8217;s why we&#8217;re working alongside eight other companies to push for </span><a href="http://www.reformgovernmentsurveillance.com/"><span>surveillance reform</span></a><span>, including more transparency. We&#8217;ve all been sharing best practices about how to report the requests we receive, and as a result our Transparency Report now includes governments that made less than 30 requests during a six-month reporting period, in addition to those that made 30+ requests. </span></span></div><div dir="ltr"><span><span><br /></span></span></div><div dir="ltr"><span><span><span><span>We also call on Congress to pass legislation that would update the Electronic Communications Privacy Act (ECPA) to require governmental entities to obtain a warrant before they can compel online companies to disclose the content of users&#8217; communications. As </span><a href="http://googlepublicpolicy.blogspot.com/2014/02/its-time-to-reform-government.html"><span>we have noted previously</span></a><span>, legislation introduced by Senators Leahy and Lee (R-Utah) in the Senate and Representatives Yoder (R-Kan.), Graves (R-Ga.), and Polis (D-Colo.) in the House would achieve that goal. This legislation enjoys broad, bipartisan support, and we urge Congress to move quickly toward enacting legislation that would update ECPA in a manner that comports with how people use the Internet today. Moreover, more than 110,000 people have signed a </span><a href="https://petitions.whitehouse.gov/petition/reform-ecpa-tell-government-get-warrant/nq258dxk"><span>White House petition</span></a><span>, asking the Administration to support legislation that would update ECPA in this manner.</span></span></span></span></div><b><span><br /><span></span></span></b><div dir="ltr"><span><span>Also, people have been asking about how we respond to search warrants in the U.S., so we&#8217;ve created an entertaining </span><a href="https://www.youtube.com/watch?v=MeKKHxcJfh0"><span>video</span></a><span> to explain in plain language how this process works. We apply the same rigorous standards presented in this video to every request we receive, regardless of type. </span></span></div><b><span><br /><span></span></span></b><span><br /></span><span><br /><span></span></span><div dir="ltr"><span><span>You deserve to know when and how governments request user information online, and we&#8217;ll keep fighting to make sure that&#8217;s the case.</span></span></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-style: italic; vertical-align: baseline; white-space: pre-wrap;">Posted by Richard Salgado, </span><span style="background-color: white; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">Legal Director, Law Enforcement and Information Security</span></span></div><b id="docs-internal-guid-91ca9317-040d-1adf-4209-9e75548fbe37" style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: white; color: #444444; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">While we’ve always known how important transparency is when it comes to government requests, </span><span style="background-color: white; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">the events of the past year have underscored just how urgent the issue is.</span><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> From being the first company to </span><a href="http://googleblog.blogspot.com/2013/03/transparency-report-shedding-more-light.html" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">disclose information about National Security Letters</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to fighting for the ability to </span><a href="http://googleblog.blogspot.com/2014/02/shedding-some-light-on-foreign.html" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">publish more about FISA requests</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, we’ve continually advocated for your right to know. </span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Today, we’re updating our </span><a href="http://www.google.com/transparencyreport/userdatarequests/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Transparency Report</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> for the ninth time. This updated Report details the number of government requests we received for user information in criminal investigations during the second half of 2013. Government requests for user information in criminal cases have increased by about 120 percent since we first began publishing these numbers in 2009. Though our number of users has grown throughout the time period, we’re also seeing more and more governments start to exercise their authority to make requests. </span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">We consistently push back against overly broad requests for your personal information, but it’s also important for laws to explicitly protect you from government overreach. That’s why we’re working alongside eight other companies to push for </span><a href="http://www.reformgovernmentsurveillance.com/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">surveillance reform</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, including more transparency. We’ve all been sharing best practices about how to report the requests we receive, and as a result our Transparency Report now includes governments that made less than 30 requests during a six-month reporting period, in addition to those that made 30+ requests. </span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span id="docs-internal-guid-91ca9317-040e-408f-1938-f5539f007ae4"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="vertical-align: baseline;">We also call on Congress to pass legislation that would update the Electronic Communications Privacy Act (ECPA) to require governmental entities to obtain a warrant before they can compel online companies to disclose the content of users’ communications. As </span><a href="http://googlepublicpolicy.blogspot.com/2014/02/its-time-to-reform-government.html" style="text-decoration: none;"><span style="color: #1155cc; text-decoration: underline; vertical-align: baseline;">we have noted previously</span></a><span style="vertical-align: baseline;">, legislation introduced by Senators Leahy and Lee (R-Utah) in the Senate and Representatives Yoder (R-Kan.), Graves (R-Ga.), and Polis (D-Colo.) in the House would achieve that goal. This legislation enjoys broad, bipartisan support, and we urge Congress to move quickly toward enacting legislation that would update ECPA in a manner that comports with how people use the Internet today. Moreover, more than 110,000 people have signed a </span><a href="https://petitions.whitehouse.gov/petition/reform-ecpa-tell-government-get-warrant/nq258dxk" style="text-decoration: none;"><span style="color: #1155cc; text-decoration: underline; vertical-align: baseline;">White House petition</span></a><span style="vertical-align: baseline;">, asking the Administration to support legislation that would update ECPA in this manner.</span></span></span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Also, people have been asking about how we respond to search warrants in the U.S., so we’ve created an entertaining </span><a href="https://www.youtube.com/watch?v=MeKKHxcJfh0" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">video</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to explain in plain language how this process works. We apply the same rigorous standards presented in this video to every request we receive, regardless of type. </span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><span style="font-family: Arial, Helvetica, sans-serif;"><iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/MeKKHxcJfh0" width="560"></iframe><br /></span><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">You deserve to know when and how governments request user information online, and we’ll keep fighting to make sure that’s the case.</span></span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/transparency-report-requests-for-user-information-up-120-percent-over-four-years/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Apply for a 2014 Google Policy Fellowship</title>
		<link>https://googledata.org/google-public-policy/apply-for-a-2014-google-policy-fellowship/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=apply-for-a-2014-google-policy-fellowship</link>
		<comments>https://googledata.org/google-public-policy/apply-for-a-2014-google-policy-fellowship/#comments</comments>
		<pubDate>Thu, 20 Mar 2014 18:05:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=8e84662a70bf18bb6eaea652531f4176</guid>
		<description><![CDATA[<div dir="ltr"><span>The Internet policy world ripe with fascinating policy issues. From government surveillance and data security to patent reform and copyright to free expression and open access to information, there has never been a more exciting time to get involved. We&#8217;re excited to launch the 7th summer of the Google Policy Fellowship, connecting students of all levels and disciplines with organizations working on the forefront of these and other critical issues for the future of the Internet.  Applications are open today for North America and Latin America, and students of all levels and disciplines are welcome to apply before Friday, April 14, 2014.&#160;</span><br /><span><br /></span><span>This year&#8217;s organizations include:&#160;</span><br /><br /><ul><li><span>American Library Association&#160;</span></li><li><span>National Consumers League&#160;</span></li><li><span>National Hispanic Media Coalition&#160;</span></li><li><span>Open Technology Institute, New America Foundation</span></li><li><span>Public Knowledge</span></li><li><span>TechFreedom</span></li><li><span>Center for Democracy and Technology</span></li><li><span>Global Network Initiative&#160;</span></li><li><span>R Street&#160;</span></li><li><span>iKeepSafe&#160;</span></li><li><span>ConnectSafely&#160;</span></li><li><span>The Citizen Lab&#160;</span></li><li><span>Samuelson-Glushko Canadian Internet Policy &#38; Public Interest Clinic</span></li><li><span>American Association of People with Disabilities</span></li><li><span>Future of Privacy Forum</span></li><li><span>Technology Policy Institute</span></li><li><span>Future of Music</span></li><li><span>Electronic Frontier Foundation</span></li><li><span>US Hispanic Chamber of Commerce</span></li><li><span>Internet Education Foundation</span></li><li><span>Fundaci&#243;n Karisma&#160;</span></li><li><span>Asociaci&#243;n por los Derechos Civiles</span></li><li><span>Derechos Digitales&#160;</span></li><li><span>Article 19 Mexico&#160;</span></li></ul><span><span><br /></span>More fellowship opportunities in Asia, Africa, and Europe will be coming soon. You can learn about the <a href="http://www.google.com/policyfellowship/faq.html">program</a>, application process and <a href="http://www.google.com/policyfellowship/hosts.html">host organizations</a> on the <a href="http://www.google.com/policyfellowship/index.html">Google Public Policy Fellowship website</a>.</span></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-family: Arial, Helvetica, sans-serif;">The Internet policy world ripe with fascinating policy issues. From government surveillance and data security to patent reform and copyright to free expression and open access to information, there has never been a more exciting time to get involved. We’re excited to launch the 7th summer of the Google Policy Fellowship, connecting students of all levels and disciplines with organizations working on the forefront of these and other critical issues for the future of the Internet.  Applications are open today for North America and Latin America, and students of all levels and disciplines are welcome to apply before Friday, April 14, 2014.&nbsp;</span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">This year’s organizations include:&nbsp;</span><br /><br /><ul style="text-align: left;"><li><span style="font-family: Arial, Helvetica, sans-serif;">American Library Association&nbsp;</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">National Consumers League&nbsp;</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">National Hispanic Media Coalition&nbsp;</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Open Technology Institute, New America Foundation</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Public Knowledge</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">TechFreedom</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Center for Democracy and Technology</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Global Network Initiative&nbsp;</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">R Street&nbsp;</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">iKeepSafe&nbsp;</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">ConnectSafely&nbsp;</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">The Citizen Lab&nbsp;</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Samuelson-Glushko Canadian Internet Policy &amp; Public Interest Clinic</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">American Association of People with Disabilities</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Future of Privacy Forum</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Technology Policy Institute</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Future of Music</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Electronic Frontier Foundation</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">US Hispanic Chamber of Commerce</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Internet Education Foundation</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Fundación Karisma&nbsp;</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Asociación por los Derechos Civiles</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Derechos Digitales&nbsp;</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Article 19 Mexico&nbsp;</span></li></ul><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>More fellowship opportunities in Asia, Africa, and Europe will be coming soon. You can learn about the <a href="http://www.google.com/policyfellowship/faq.html">program</a>, application process and <a href="http://www.google.com/policyfellowship/hosts.html">host organizations</a> on the <a href="http://www.google.com/policyfellowship/index.html">Google Public Policy Fellowship website</a>.</span></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/apply-for-a-2014-google-policy-fellowship/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Protecting Consumers From Identity Theft and Scams</title>
		<link>https://googledata.org/google-public-policy/protecting-consumers-from-identity-theft-and-scams/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-consumers-from-identity-theft-and-scams</link>
		<comments>https://googledata.org/google-public-policy/protecting-consumers-from-identity-theft-and-scams/#comments</comments>
		<pubDate>Wed, 05 Mar 2014 16:31:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=b144685e27f5f567134116d79c5cc0f2</guid>
		<description><![CDATA[<div dir="ltr"><br /><div dir="ltr"><span><span>Posted by </span><span>Sheily Chhabria, Head of Strategic Operations, Product Quality Operations</span></span></div><b><span><br /><span></span></span></b><div dir="ltr"><span><span>Keeping your information safe and secure is one of Google&#8217;s top priorities and to celebrate </span><a href="https://www.ncpw.gov/"><span>National Consumer Protection Week</span></a><span> we wanted to share a few things that we do to help protect you and your information from harm on the web. </span></span></div><b><span><br /><span></span></span></b><div dir="ltr"><span><span>Google scans the web to find the most useful and interesting content to display in your search results, but while we&#8217;re looking for all that good stuff, we sometimes find sites or links that seem unsafe - that might be set up to steal your information or silently take over your computer. </span><a href="http://www.google.com/transparencyreport/safebrowsing/?hl=en"><span>We identify about 10,000 of these bad sites daily</span></a><span> and if you try and visit a site that is unsafe, we show warnings like the one below. &#160;&#160;</span></span></div><b><span><br /></span></b><div><b><span><img height="341px;" src="https://lh3.googleusercontent.com/3jQP3VQ3MF1rLLJPcVcFvTaKJqkFWrky3_rE99ZPlKgkbl3BoIttwTcv1Sm9EkvzY5AqNayj9nqxaxYGA6Ck1i8OES3EI4-ySMJTDDs6GTFQcSUqhi79DHmoHZ6SqQ" width="522px;"></span></b></div><b><span><span></span><span></span></span></b><br /><div dir="ltr"><span><span>These warnings help you avoid sites containing software that might steal your personal information or harm your computer. </span></span></div><b><span><br /><span></span></span></b><div dir="ltr"><span><span>These warnings appear on millions of Google Search results and we also make information about these unsafe sites available to other companies and developers so that users on many services, not just Google, can be protected from harm. This work helps protect you and about one billion other internet users from these types of sites .</span></span></div><b><span><br /><span></span></span></b><div dir="ltr"><span><span>If one of these bad sites did manage to steal your sensitive information, like your social security numbers or driver&#8217;s license, and published it on the web, </span><a href="https://support.google.com/websearch/answer/2744324?hl=en"><span>you can report it</span></a><span> to Google to have your information taken out of our Search results. We also follow this process for sensitive financial information like credit card numbers or bank account numbers. </span></span></div><b><span><br /><span></span></span></b><div dir="ltr"><span><span>Google also has strict policies about the kinds of goods and services that can be advertised using our ad systems and on our publisher network. For example, w</span><span>e don&#8217;t allow ads for certain types of things that might harm your computer or cost you money, like </span><a href="http://support.google.com/adwordspolicy/bin/static.py?hl=en&#38;topic=1310876&#38;guide=1308243&#38;page=guide.cs"><span>malicious downloads</span></a><span>, or ads for products or services with </span><a href="http://support.google.com/adwordspolicy/bin/static.py?hl=en&#38;page=guide.cs&#38;guide=1308231&#38;topic=1310867&#38;answer=190439"><span>unclear billing practices</span></a><span>, like hidden costs. </span><span>We also don&#8217;t allow ads with misleading claims (&#8220;lose weight guaranteed!&#8221;), for </span><a href="http://support.google.com/adwordspolicy/bin/static.py?hl=en&#38;topic=1346942&#38;guide=1308252&#38;page=guide.cs"><span>counterfeit goods</span></a><span>, or fraudulent work-at-home scams (</span><a href="https://support.google.com/adwordspolicy/answer/1331529?hl=en"><span>&#8220;make a million dollars an hour - from your kitchen!&#8221;</span></a><span>).&#160;</span></span></div><div dir="ltr"><span><span><br /></span></span></div><div dir="ltr"><span><img alt="Misleading ad screenshot .jpg" height="94px;" src="https://lh5.googleusercontent.com/gSQ8ynZviLcr8bWFyUVoCoIveFay70bJlapbBuBnrrR26_nwZ6z7U75a-EHMLvMcpyR0a8P4X-GFLt_gCIHbsu6tfG_AlnCDzOE3tVoLJhHb_LMsvLGsvck-VxmdSA" width="158px;"><span></span></span></div><div dir="ltr"><span><span>We don&#8217;t allow scammy ads that mislead consumers</span></span></div><b><span><br /><span></span></span></b><div dir="ltr"><span><span>In </span><a href="http://googlepublicpolicy.blogspot.com/2014/01/busting-bad-advertising-practices-2013.html"><span>2013 alone</span></a><span> we </span><span>removed more than 350 million bad ads from our systems and banned more than 270,000 advertisers from using Google&#8217;s ad services. We proactively look for these ads to keep them off our systems, and listen to feedback from consumers if they tell us an ad is no good. In fact, you can </span><a href="http://www.google.com/safetycenter/tools/"><span>report scams, inappropriate content or bad behavior</span></a><span> using some of the safety tools that are built into many Google products. &#160;</span><span></span></span></div><b><span><br /><span></span></span></b><div dir="ltr"><span><span>Technology is complicated, but thankfully you don&#8217;t have to be a computer scientist to help protect yourself online. The </span><a href="http://www.google.com/safetycenter/"><span>Google Safety Center</span></a><span> has advice and tips from security experts on the simple things you can do to protect yourself and your family from online threats like </span><a href="http://www.google.com/safetycenter/everyone/cybercrime/identity-theft/"><span>identity theft</span></a><span> or </span><a href="http://www.google.com/safetycenter/everyone/cybercrime/scams/"><span>scams</span></a><span>. And if you&#8217;re looking for a way to celebrate along with us this week, please check out our </span><a href="http://googleblog.blogspot.com/search/label/security%20and%20safety%20tips"><span>blog post series</span></a><span> on quick steps you can take to help improve your online safety and security. You can also get more information, videos and advice from some of the many </span><a href="http://www.ncpw.gov/about-us"><span>consumer protection organizations</span></a><span> celebrating this week, such as the </span><a href="http://www.consumer.ftc.gov/media/video-0094-national-consumer-protection-week"><span>Federal Trade Commission</span></a><span>, &#160;the </span><a href="http://www.ncpw.gov/about-us#National-Association-of-Attorneys-General"><span>National Association of Attorneys General</span></a><span> and many individual State Attorneys General, and the </span><a href="http://www.bbb.org/us/article/national-consumer-protection-week-%E2%80%93-sign-up-for-a-tip-a-day-40142"><span>Better Business Bureau</span></a><span>. </span></span></div><span><br /></span></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="white-space: pre-wrap;">Posted by </span><span style="white-space: pre-wrap;">Sheily Chhabria, Head of Strategic Operations, Product Quality Operations</span></span></div><b id="docs-internal-guid-f72e5575-9312-4ab7-925f-a3fe88be0d59" style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Keeping your information safe and secure is one of Google’s top priorities and to celebrate </span><a href="https://www.ncpw.gov/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">National Consumer Protection Week</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> we wanted to share a few things that we do to help protect you and your information from harm on the web. </span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Google scans the web to find the most useful and interesting content to display in your search results, but while we’re looking for all that good stuff, we sometimes find sites or links that seem unsafe - that might be set up to steal your information or silently take over your computer. </span><a href="http://www.google.com/transparencyreport/safebrowsing/?hl=en" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">We identify about 10,000 of these bad sites daily</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> and if you try and visit a site that is unsafe, we show warnings like the one below. &nbsp;&nbsp;</span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><div style="text-align: center;"><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><img height="341px;" src="https://lh3.googleusercontent.com/3jQP3VQ3MF1rLLJPcVcFvTaKJqkFWrky3_rE99ZPlKgkbl3BoIttwTcv1Sm9EkvzY5AqNayj9nqxaxYGA6Ck1i8OES3EI4-ySMJTDDs6GTFQcSUqhi79DHmoHZ6SqQ" style="border: none;" width="522px;" /></span></b></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><span style="background-color: transparent; color: black; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif; font-size: x-small;">These warnings help you avoid sites containing software that might steal your personal information or harm your computer. </span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">These warnings appear on millions of Google Search results and we also make information about these unsafe sites available to other companies and developers so that users on many services, not just Google, can be protected from harm. This work helps protect you and about one billion other internet users from these types of sites .</span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">If one of these bad sites did manage to steal your sensitive information, like your social security numbers or driver’s license, and published it on the web, </span><a href="https://support.google.com/websearch/answer/2744324?hl=en" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">you can report it</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> to Google to have your information taken out of our Search results. We also follow this process for sensitive financial information like credit card numbers or bank account numbers. </span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Google also has strict policies about the kinds of goods and services that can be advertised using our ad systems and on our publisher network. For example, w</span><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">e don’t allow ads for certain types of things that might harm your computer or cost you money, like </span><a href="http://support.google.com/adwordspolicy/bin/static.py?hl=en&amp;topic=1310876&amp;guide=1308243&amp;page=guide.cs" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">malicious downloads</span></a><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, or ads for products or services with </span><a href="http://support.google.com/adwordspolicy/bin/static.py?hl=en&amp;page=guide.cs&amp;guide=1308231&amp;topic=1310867&amp;answer=190439" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">unclear billing practices</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, like hidden costs. </span><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">We also don’t allow ads with misleading claims (“lose weight guaranteed!”), for </span><a href="http://support.google.com/adwordspolicy/bin/static.py?hl=en&amp;topic=1346942&amp;guide=1308252&amp;page=guide.cs" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">counterfeit goods</span></a><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, or fraudulent work-at-home scams (</span><a href="https://support.google.com/adwordspolicy/answer/1331529?hl=en" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">“make a million dollars an hour - from your kitchen!”</span></a><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">).&nbsp;</span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><span style="font-family: Arial, Helvetica, sans-serif;"><img alt="Misleading ad screenshot .jpg" height="94px;" src="https://lh5.googleusercontent.com/gSQ8ynZviLcr8bWFyUVoCoIveFay70bJlapbBuBnrrR26_nwZ6z7U75a-EHMLvMcpyR0a8P4X-GFLt_gCIHbsu6tfG_AlnCDzOE3tVoLJhHb_LMsvLGsvck-VxmdSA" style="border: none;" width="158px;" /><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><span style="background-color: white; color: black; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif; font-size: x-small;">We don’t allow scammy ads that mislead consumers</span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">In </span><a href="http://googlepublicpolicy.blogspot.com/2014/01/busting-bad-advertising-practices-2013.html" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">2013 alone</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> we </span><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">removed more than 350 million bad ads from our systems and banned more than 270,000 advertisers from using Google’s ad services. We proactively look for these ads to keep them off our systems, and listen to feedback from consumers if they tell us an ad is no good. In fact, you can </span><a href="http://www.google.com/safetycenter/tools/" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">report scams, inappropriate content or bad behavior</span></a><span style="background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> using some of the safety tools that are built into many Google products. &nbsp;</span><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></div><b style="font-weight: normal;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Technology is complicated, but thankfully you don’t have to be a computer scientist to help protect yourself online. The </span><a href="http://www.google.com/safetycenter/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google Safety Center</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> has advice and tips from security experts on the simple things you can do to protect yourself and your family from online threats like </span><a href="http://www.google.com/safetycenter/everyone/cybercrime/identity-theft/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">identity theft</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> or </span><a href="http://www.google.com/safetycenter/everyone/cybercrime/scams/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">scams</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. And if you’re looking for a way to celebrate along with us this week, please check out our </span><a href="http://googleblog.blogspot.com/search/label/security%20and%20safety%20tips" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">blog post series</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> on quick steps you can take to help improve your online safety and security. You can also get more information, videos and advice from some of the many </span><a href="http://www.ncpw.gov/about-us" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">consumer protection organizations</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> celebrating this week, such as the </span><a href="http://www.consumer.ftc.gov/media/video-0094-national-consumer-protection-week" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Federal Trade Commission</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, &nbsp;the </span><a href="http://www.ncpw.gov/about-us#National-Association-of-Attorneys-General" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">National Association of Attorneys General</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> and many individual State Attorneys General, and the </span><a href="http://www.bbb.org/us/article/national-consumer-protection-week-%E2%80%93-sign-up-for-a-tip-a-day-40142" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Better Business Bureau</span></a><span style="background-color: transparent; color: black; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. </span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/protecting-consumers-from-identity-theft-and-scams/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>It’s time to reform government surveillance laws</title>
		<link>https://googledata.org/google-public-policy/its-time-to-reform-government-surveillance-laws/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=its-time-to-reform-government-surveillance-laws</link>
		<comments>https://googledata.org/google-public-policy/its-time-to-reform-government-surveillance-laws/#comments</comments>
		<pubDate>Tue, 11 Feb 2014 13:10:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=56b258e38977441e2d7f49373b9ef3d9</guid>
		<description><![CDATA[<div dir="ltr">Posted by Susan Molinari, VP Public Policy&#160; <br /><br />The revelations about government surveillance practices&#8212;both in the U.S. and globally&#8212;over the past eight months have sparked a serious and overdue debate about the nature and scope of existing laws and programs. Today, many organizations and companies are participating in  &#8220;<a href="https://thedaywefightback.org/">The Day We Fight Back</a>,&#8221;  a series of events and awareness campaigns highlighting the urgent need for surveillance reform around the world.<br /><br />Google recognizes the very real threats that the U.S. and other countries face, but we strongly believe that government surveillance programs should operate under a legal framework that is rule-bound, narrowly tailored, transparent, and subject to oversight.<br /><br />In December, along with other technology companies, we unveiled a set of <a href="http://www.reformgovernmentsurveillance.com/">government surveillance reform principles</a> that address many of the recent concerns around government surveillance.  In Congress, Representative Sensenbrenner (R-Wis.) and Senator Leahy (D-Vt.) have introduced legislation&#8212;the USA Freedom Act&#8212;that would codify many of these principles. As they both <a href="http://www.politico.com/story/2013/10/leahy-sensenbrenner-nsa-reform-98953.html?hp=r10">noted</a> when introducing this bill, government surveillance programs &#8220;have come at a high cost to Americans&#8217; privacy rights, business interests and standing in the international community.&#8221;<br /><br />The USA Freedom Act reflects some of the key recommendations made by the <a href="http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf">President&#8217;s Review Group on Intelligence Communications and Technologies</a> as well as the <a href="http://www.pclob.gov/SiteAssets/Pages/default/PCLOB-Report-on-the-Telephone-Records-Program.pdf">Privacy and Civil Liberties Oversight Board</a>. We support this legislation and we urge Congress to enact it into law.<br /><br />But there&#8217;s more that can be done as we consider appropriate reforms to government surveillance laws. Congress should update the Electronic Communications Privacy Act (ECPA) to require governmental entities to obtain a warrant before they can compel online companies to disclose the content of users&#8217; communications.  Legislation introduced by Senators Leahy and Lee (R-Utah) in the Senate and Representatives Yoder (R-Kan.), Graves (R-Ga.), and Polis (D-Colo.) in the House would achieve that goal. <a href="http://digitaldueprocess.org/index.cfm?objectid=DF652CE0-2552-11DF-B455000C296BA163">More than 100 companies, trade associations, and consumer groups</a>&#8212;<a href="https://petitions.whitehouse.gov/petition/reform-ecpa-tell-government-get-warrant/nq258dxk">and more than 100,000 Americans</a>&#8212;have signed on to support this important update to ECPA, which no longer reflects users&#8217; reasonable expectations of privacy.<br /><br />We will continue to press Congress to adopt these important measures, which would represent significant progress in the broader effort to reform government surveillance laws.  If you want to receive updates from us, please visit <a href="https://www.google.com/intl/en/takeaction/unwarranted-intrusion/?utm_source=googleblog&#38;utm_medium=blog&#38;utm_campaign=20140211googleblog">google.com/takeaction</a> and sign up.   </div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on">Posted by Susan Molinari, VP Public Policy&nbsp; <br /><br />The revelations about government surveillance practices—both in the U.S. and globally—over the past eight months have sparked a serious and overdue debate about the nature and scope of existing laws and programs. Today, many organizations and companies are participating in  “<a href="https://thedaywefightback.org/">The Day We Fight Back</a>,”  a series of events and awareness campaigns highlighting the urgent need for surveillance reform around the world.<br /><br />Google recognizes the very real threats that the U.S. and other countries face, but we strongly believe that government surveillance programs should operate under a legal framework that is rule-bound, narrowly tailored, transparent, and subject to oversight.<br /><br />In December, along with other technology companies, we unveiled a set of <a href="http://www.reformgovernmentsurveillance.com/">government surveillance reform principles</a> that address many of the recent concerns around government surveillance.  In Congress, Representative Sensenbrenner (R-Wis.) and Senator Leahy (D-Vt.) have introduced legislation—the USA Freedom Act—that would codify many of these principles. As they both <a href="http://www.politico.com/story/2013/10/leahy-sensenbrenner-nsa-reform-98953.html?hp=r10">noted</a> when introducing this bill, government surveillance programs “have come at a high cost to Americans’ privacy rights, business interests and standing in the international community.”<br /><br />The USA Freedom Act reflects some of the key recommendations made by the <a href="http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf">President’s Review Group on Intelligence Communications and Technologies</a> as well as the <a href="http://www.pclob.gov/SiteAssets/Pages/default/PCLOB-Report-on-the-Telephone-Records-Program.pdf">Privacy and Civil Liberties Oversight Board</a>. We support this legislation and we urge Congress to enact it into law.<br /><br />But there’s more that can be done as we consider appropriate reforms to government surveillance laws. Congress should update the Electronic Communications Privacy Act (ECPA) to require governmental entities to obtain a warrant before they can compel online companies to disclose the content of users’ communications.  Legislation introduced by Senators Leahy and Lee (R-Utah) in the Senate and Representatives Yoder (R-Kan.), Graves (R-Ga.), and Polis (D-Colo.) in the House would achieve that goal. <a href="http://digitaldueprocess.org/index.cfm?objectid=DF652CE0-2552-11DF-B455000C296BA163">More than 100 companies, trade associations, and consumer groups</a>—<a href="https://petitions.whitehouse.gov/petition/reform-ecpa-tell-government-get-warrant/nq258dxk">and more than 100,000 Americans</a>—have signed on to support this important update to ECPA, which no longer reflects users’ reasonable expectations of privacy.<br /><br />We will continue to press Congress to adopt these important measures, which would represent significant progress in the broader effort to reform government surveillance laws.  If you want to receive updates from us, please visit <a href="https://www.google.com/intl/en/takeaction/unwarranted-intrusion/?utm_source=googleblog&amp;utm_medium=blog&amp;utm_campaign=20140211googleblog">google.com/takeaction</a> and sign up.   </div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/its-time-to-reform-government-surveillance-laws/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Keeping Your Tax Identity Safe</title>
		<link>https://googledata.org/google-public-policy/keeping-your-tax-identity-safe/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=keeping-your-tax-identity-safe</link>
		<comments>https://googledata.org/google-public-policy/keeping-your-tax-identity-safe/#comments</comments>
		<pubDate>Tue, 21 Jan 2014 20:21:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=0f5e36639ea289e6c6ddadbe8f61598a</guid>
		<description><![CDATA[<div dir="ltr">Posted by Rob Mahini, Policy Counsel<br /><br />Once upon a time, Tax Day meant pens and pencils, paper forms, and long waits at the post office.  Now, the Internet makes tax day much simpler -- online software and e-Filing now allows everyone a much smoother Tax Day experience.  Unfortunately, the Internet also makes something else easier:  tax identity theft that allows scammers to do things like file for fraudulent tax refunds or apply for jobs.<br /><br />As the FTC <a href="http://www.ftc.gov/news-events/press-releases/2014/01/ftcs-tax-identity-theft-awareness-week-offers-consumers-advice">noted</a> earlier this month, "identity theft has been the top consumer complaint to the FTC for 13 consecutive years, and tax identity theft has been an increasing share of the Commission&#8217;s identity theft complaints."  In fact, tax ID theft accounted for more than 43 percent of the FTC's ID theft complaints, "making it the largest category of identity theft complaints by a substantial margin."<br /><br />With this in mind, the FTC hosted events around the country last week as part of its <a href="http://www.consumer.ftc.gov/features/feature-0029-tax-identity-theft-awareness-week">Tax Identity Theft Awareness Week</a>, to educate consumers about the risks of tax identity theft and how to avoid becoming a victim.  The IRS also released a<a href="http://www.youtube.com/watch?v=T-G2qU_tFDE"> video</a> this month to educate taxpayers on what to do if they are victimized by tax ID theft.<br /><br />At Google's Good To Know site, consumers can learn about the many ways that they can protect all of their data, including their SSN, tax forms, and other information that tax identity thieves are after.  For example:<br /><ul><li>Don&#8217;t reply if you see a suspicious email, instant message or webpage asking for your personal or financial information. Identity thieves try to use these phishing techniques to steal your information such as your social security number or other tax info.&#160;</li><li>If you see a message from someone you know that doesn&#8217;t seem like them, their account might have been compromised by a cyber criminal who is trying to con you into providing your SSN or other sensitive information.&#160;</li><li>Don&#8217;t send your password via email, and don&#8217;t share your password with others -- thieves that gain access to your accounts can then steal your tax identity. Legitimate sites won&#8217;t ask you to send them your passwords via email, so don&#8217;t respond if you get requests for your passwords to online sites.</li></ul><br />The ease and convenience of the Internet has helped simplify tax filing.  And following these tips will help keep your tax information safe in the process.</div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on">Posted by Rob Mahini, Policy Counsel<br /><br />Once upon a time, Tax Day meant pens and pencils, paper forms, and long waits at the post office.  Now, the Internet makes tax day much simpler -- online software and e-Filing now allows everyone a much smoother Tax Day experience.  Unfortunately, the Internet also makes something else easier:  tax identity theft that allows scammers to do things like file for fraudulent tax refunds or apply for jobs.<br /><br />As the FTC <a href="http://www.ftc.gov/news-events/press-releases/2014/01/ftcs-tax-identity-theft-awareness-week-offers-consumers-advice">noted</a> earlier this month, "identity theft has been the top consumer complaint to the FTC for 13 consecutive years, and tax identity theft has been an increasing share of the Commission’s identity theft complaints."  In fact, tax ID theft accounted for more than 43 percent of the FTC's ID theft complaints, "making it the largest category of identity theft complaints by a substantial margin."<br /><br />With this in mind, the FTC hosted events around the country last week as part of its <a href="http://www.consumer.ftc.gov/features/feature-0029-tax-identity-theft-awareness-week">Tax Identity Theft Awareness Week</a>, to educate consumers about the risks of tax identity theft and how to avoid becoming a victim.  The IRS also released a<a href="http://www.youtube.com/watch?v=T-G2qU_tFDE"> video</a> this month to educate taxpayers on what to do if they are victimized by tax ID theft.<br /><br />At Google's Good To Know site, consumers can learn about the many ways that they can protect all of their data, including their SSN, tax forms, and other information that tax identity thieves are after.  For example:<br /><ul style="text-align: left;"><li>Don’t reply if you see a suspicious email, instant message or webpage asking for your personal or financial information. Identity thieves try to use these phishing techniques to steal your information such as your social security number or other tax info.&nbsp;</li><li>If you see a message from someone you know that doesn’t seem like them, their account might have been compromised by a cyber criminal who is trying to con you into providing your SSN or other sensitive information.&nbsp;</li><li>Don’t send your password via email, and don’t share your password with others -- thieves that gain access to your accounts can then steal your tax identity. Legitimate sites won’t ask you to send them your passwords via email, so don’t respond if you get requests for your passwords to online sites.</li></ul><br />The ease and convenience of the Internet has helped simplify tax filing.  And following these tips will help keep your tax information safe in the process.</div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/keeping-your-tax-identity-safe/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Busting Bad Advertising Practices — 2013 Year in Review</title>
		<link>https://googledata.org/google-public-policy/busting-bad-advertising-practices-2013-year-in-review-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=busting-bad-advertising-practices-2013-year-in-review-2</link>
		<comments>https://googledata.org/google-public-policy/busting-bad-advertising-practices-2013-year-in-review-2/#comments</comments>
		<pubDate>Fri, 17 Jan 2014 15:19:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[adwords]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=6e7ad87810acffb5bcab82a59a95784a</guid>
		<description><![CDATA[<div dir="ltr">Posted by: Mike Hochberg, Director, Ads Engineering<br /><br />(<i>Cross-posted from the <a href="http://adwords.blogspot.com/">Google AdWords Blog</a>)</i><br /><br />Advertising helps fund great web services and enables companies of all sizes to grow their businesses online.  However, this economy can also attract bad actors that want to abuse online advertising tools for harmful or deceptive purposes.<br /><br />We've allocated substantial technical, financial, and human resources to stopping bad advertising practices and protecting users on the web.  Hundreds of our engineers, policy experts and others have dedicated their careers to this work.<br /><br />Following up on our <a href="http://adwords.blogspot.com/2013/01/ads-security-2012-retrospective.html">2012 report</a>, below is an overview of how we fought bad ads and bad ad-funded content in 2013.<br /><b><br /></b><b>Stopping more bad ads from fewer bad sources</b><br /><br />We removed more than 350 million bad ads from our systems in 2013.  To put that in perspective, if someone looked at each of these for one second, it would take them more than ten years to see them all.  This was a significant increase from approximately 220 million ads removed in 2012.  This trend has been consistent in the last several years and we attribute it to several factors, including: the growth of online advertising overall and constant improvement of our detection systems.<br /><br />The number of advertisers we disabled, however, dropped from over 850,000 in 2012 to more than 270,000 in 2013.  In part, we attribute this decline to scammers &#8212; counterfeiters, for example &#8212; being thwarted by our safety screens and searching for less-secure targets.<br /><b><br /></b><b>Counter-attacking counterfeiters</b><br /><br />We continue to see positive results in our work to combat counterfeiters.  Attempts to market counterfeit goods on AdWords decreased by 47% in 2012 and 82% in 2013.  In parallel, the volume of complaints about these ads dropped by 85% in 2012 and by another 78% in 2013.<br /><br />As these numbers have declined, we&#8217;re pleased to report that we&#8217;ve also banned fewer bad advertisers for counterfeit violations.  Last year, we banned approximately 14,000 advertisers for trying to sell counterfeit goods  &#8212; a decline of more than 80% compared to 2012.<br /><br /><b>Preventing good ads from funding bad content</b><br /><br />Maintaining a healthy ads ecosystem isn&#8217;t just about stopping bad ads and advertisers; we closely monitor the sites and mobile apps that show our ads as well.  Early last year, we <a href="http://adwords.blogspot.com/2013/04/a-healthy-advertising-ecosystem.html">outlined</a> some of this work, with a particular focus on our efforts to stop scammy ad-funded software, like toolbars, that provides a poor user-experience.<br /><br />By the end of 2013, we had blacklisted more than 200,000 total publisher pages, an encouraging decline from last year, and disapproved more than 3,000,000 attempts to join our AdSense network.  We also removed more than 250,000 publisher accounts for various policy violations.  This includes more than 5,000 account removals for violating our copyright policies, an increase of more than 25% compared to 2012.<br /><br />Here&#8217;s a more complete overview of our work to bust bad advertising practices in 2013:<br /><br /><div><a href="http://2.bp.blogspot.com/-itMzv0pn-dg/UtlPiQxXtbI/AAAAAAAABoU/uFjCW95x4_k/s1600/bad+ad.png"><img border="0" src="http://2.bp.blogspot.com/-itMzv0pn-dg/UtlPiQxXtbI/AAAAAAAABoU/uFjCW95x4_k/s1600/bad+ad.png" height="640" width="260"></a></div><div><a href="http://services.google.com/fh/files/blogs/bad2013.pdf"><span>Click here for full size image</span></a>&#160;</div><div><br /></div>This is an ever-evolving and ongoing fight.  Bad actors are relentless, often very sophisticated and will not rest on their laurels.  But neither will we.  Nothing is more important than the security of our users and we&#8217;ll continue to work tirelessly to keep them safe online.</div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on">Posted by: Mike Hochberg, Director, Ads Engineering<br /><br />(<i>Cross-posted from the <a href="http://adwords.blogspot.com/">Google AdWords Blog</a>)</i><br /><br />Advertising helps fund great web services and enables companies of all sizes to grow their businesses online.  However, this economy can also attract bad actors that want to abuse online advertising tools for harmful or deceptive purposes.<br /><br />We've allocated substantial technical, financial, and human resources to stopping bad advertising practices and protecting users on the web.  Hundreds of our engineers, policy experts and others have dedicated their careers to this work.<br /><br />Following up on our <a href="http://adwords.blogspot.com/2013/01/ads-security-2012-retrospective.html">2012 report</a>, below is an overview of how we fought bad ads and bad ad-funded content in 2013.<br /><b><br /></b><b>Stopping more bad ads from fewer bad sources</b><br /><br />We removed more than 350 million bad ads from our systems in 2013.  To put that in perspective, if someone looked at each of these for one second, it would take them more than ten years to see them all.  This was a significant increase from approximately 220 million ads removed in 2012.  This trend has been consistent in the last several years and we attribute it to several factors, including: the growth of online advertising overall and constant improvement of our detection systems.<br /><br />The number of advertisers we disabled, however, dropped from over 850,000 in 2012 to more than 270,000 in 2013.  In part, we attribute this decline to scammers — counterfeiters, for example — being thwarted by our safety screens and searching for less-secure targets.<br /><b><br /></b><b>Counter-attacking counterfeiters</b><br /><br />We continue to see positive results in our work to combat counterfeiters.  Attempts to market counterfeit goods on AdWords decreased by 47% in 2012 and 82% in 2013.  In parallel, the volume of complaints about these ads dropped by 85% in 2012 and by another 78% in 2013.<br /><br />As these numbers have declined, we’re pleased to report that we’ve also banned fewer bad advertisers for counterfeit violations.  Last year, we banned approximately 14,000 advertisers for trying to sell counterfeit goods  — a decline of more than 80% compared to 2012.<br /><br /><b>Preventing good ads from funding bad content</b><br /><br />Maintaining a healthy ads ecosystem isn’t just about stopping bad ads and advertisers; we closely monitor the sites and mobile apps that show our ads as well.  Early last year, we <a href="http://adwords.blogspot.com/2013/04/a-healthy-advertising-ecosystem.html">outlined</a> some of this work, with a particular focus on our efforts to stop scammy ad-funded software, like toolbars, that provides a poor user-experience.<br /><br />By the end of 2013, we had blacklisted more than 200,000 total publisher pages, an encouraging decline from last year, and disapproved more than 3,000,000 attempts to join our AdSense network.  We also removed more than 250,000 publisher accounts for various policy violations.  This includes more than 5,000 account removals for violating our copyright policies, an increase of more than 25% compared to 2012.<br /><br />Here’s a more complete overview of our work to bust bad advertising practices in 2013:<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-itMzv0pn-dg/UtlPiQxXtbI/AAAAAAAABoU/uFjCW95x4_k/s1600/bad+ad.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-itMzv0pn-dg/UtlPiQxXtbI/AAAAAAAABoU/uFjCW95x4_k/s1600/bad+ad.png" height="640" width="260" /></a></div><div style="text-align: center;"><a href="http://services.google.com/fh/files/blogs/bad2013.pdf"><span style="font-size: x-small;">Click here for full size image</span></a>&nbsp;</div><div style="text-align: center;"><br /></div>This is an ever-evolving and ongoing fight.  Bad actors are relentless, often very sophisticated and will not rest on their laurels.  But neither will we.  Nothing is more important than the security of our users and we’ll continue to work tirelessly to keep them safe online.</div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/busting-bad-advertising-practices-2013-year-in-review-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Global Network Initiative sets important precedent for transparency</title>
		<link>https://googledata.org/google-public-policy/global-network-initiative-sets-important-precedent-for-transparency/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=global-network-initiative-sets-important-precedent-for-transparency</link>
		<comments>https://googledata.org/google-public-policy/global-network-initiative-sets-important-precedent-for-transparency/#comments</comments>
		<pubDate>Wed, 08 Jan 2014 18:50:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=29cf5234de511c3b4e5c01ba13a756f8</guid>
		<description><![CDATA[<div dir="ltr">Posted by: Ross LaJeunesse, Global Head of Free Expression and International Relations, and Lewis Segall, Senior Counsel<br /><br />Five years ago, when we became founding members of the <a href="http://www.globalnetworkinitiative.org/">Global Network Initiative (GNI)</a>, we agreed that outside assessors would review how we&#8217;re doing against <a href="http://www.globalnetworkinitiative.org/principles/index.php">GNI&#8217;s Principles on Freedom of Expression and Privacy</a>. GNI brings together diverse stakeholders to address the risks to a free and open Internet, and conducting these assessments is an important part of the organization's mandate.<br /><br />This morning, GNI released its first ever <a href="http://globalnetworkinitiative.org/news/gni-report-finds-google-microsoft-and-yahoo-compliant-free-expression-and-privacy-principles">Company Assessment Report</a>. The organization used independent assessors to look into whether the GNI&#8217;s three founding companies -- Google, Yahoo!, and Microsoft -- are upholding GNI&#8217;s principles in practice.  After reviewing specific cases on how Google is implementing the principles, the board found that we are compliant and working to protect freedom of expression and privacy online. <br /><br />Even though it can be uncomfortable to open up to outside scrutiny, we believe the assessment is a useful model for companies, NGOs, academics, and others working together to assess how companies respond to government requests related to human rights.<br /><br />Today&#8217;s report also supports the organization&#8217;s other primary task, advocacy -- ensuring that governments everywhere protect privacy and free expression online. If you&#8217;re interested in learning more about how Google responds to government demands for user information and content removal, check out our <a href="http://www.google.com/transparencyreport/">Transparency Report</a>.   </div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on">Posted by: Ross LaJeunesse, Global Head of Free Expression and International Relations, and Lewis Segall, Senior Counsel<br /><br />Five years ago, when we became founding members of the <a href="http://www.globalnetworkinitiative.org/">Global Network Initiative (GNI)</a>, we agreed that outside assessors would review how we’re doing against <a href="http://www.globalnetworkinitiative.org/principles/index.php">GNI’s Principles on Freedom of Expression and Privacy</a>. GNI brings together diverse stakeholders to address the risks to a free and open Internet, and conducting these assessments is an important part of the organization's mandate.<br /><br />This morning, GNI released its first ever <a href="http://globalnetworkinitiative.org/news/gni-report-finds-google-microsoft-and-yahoo-compliant-free-expression-and-privacy-principles">Company Assessment Report</a>. The organization used independent assessors to look into whether the GNI’s three founding companies -- Google, Yahoo!, and Microsoft -- are upholding GNI’s principles in practice.  After reviewing specific cases on how Google is implementing the principles, the board found that we are compliant and working to protect freedom of expression and privacy online. <br /><br />Even though it can be uncomfortable to open up to outside scrutiny, we believe the assessment is a useful model for companies, NGOs, academics, and others working together to assess how companies respond to government requests related to human rights.<br /><br />Today’s report also supports the organization’s other primary task, advocacy -- ensuring that governments everywhere protect privacy and free expression online. If you’re interested in learning more about how Google responds to government demands for user information and content removal, check out our <a href="http://www.google.com/transparencyreport/">Transparency Report</a>.   </div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/global-network-initiative-sets-important-precedent-for-transparency/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Innovation, Not Litigation</title>
		<link>https://googledata.org/google-public-policy/innovation-not-litigation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=innovation-not-litigation</link>
		<comments>https://googledata.org/google-public-policy/innovation-not-litigation/#comments</comments>
		<pubDate>Wed, 04 Dec 2013 20:50:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=f49053574d44ab677d36f3e61cf93734</guid>
		<description><![CDATA[<div dir="ltr">Posted by Kent Walker, SVP &#38; General Counsel<br /><br />Tomorrow the House of Representatives will consider <a href="http://www.gpo.gov/fdsys/pkg/BILLS-113hr3309rh/pdf/BILLS-113hr3309rh.pdf">H.R. 3309</a>, the Innovation Act. This bipartisan bill, introduced by Chairman Bob Goodlatte, approved by the House Judiciary Committee with a 33-5 vote, and supported by the White House, would go a long way to solve the patent troll problem.<br /><br />The Innovation Act would address the explosion of abusive patent litigation, helping the patent system work as intended &#8212; promoting innovation.<br /><br />Patent protection is meant to provide an incentive to innovate, spurring real progress that benefits consumers. Unfortunately, patent trolls are abusing a flood of questionable patents &#8212; like those on basic e-commerce tools such as online shopping carts and shipment notification emails &#8212; to attack supermarkets, hotels, restaurants, retailers, and many other businesses, large and small. Trolls use the threat of time-consuming and expensive litigation to extort settlements, even where their claims wouldn&#8217;t hold up in court. <br /><br />This kind of patent troll litigation has grown like a particularly noxious weed, increasing four-fold since 2005.  By some estimates it cost the U.S. economy nearly $500 billion over the past two decades. And the problem is growing.  <br /><br />It&#8217;s time to step up and take action.  A broad coalition of companies and organizations support the Innovation Act, which would level the playing field by controlling discovery costs, raising pleading standards, and making fee-shifting a more meaningful deterrent to frivolous allegations. We agree with Chairman Goodlatte on the need to stop the exponential increase in the use of dubious patents to attack American businesses.  And we believe that legislation can go further to address the significant burden that invalid business method patents impose on innovative companies.<br /><br />We strongly support Chairman Goodlatte's bill and encourage all Members of Congress to vote for this important piece of legislation. The Innovation Act would stop patent trolls from abusing the system, letting America&#8217;s productive companies focus on creating new products and jobs, not fighting frivolous patent suits.</div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on">Posted by Kent Walker, SVP &amp; General Counsel<br /><br />Tomorrow the House of Representatives will consider <a href="http://www.gpo.gov/fdsys/pkg/BILLS-113hr3309rh/pdf/BILLS-113hr3309rh.pdf">H.R. 3309</a>, the Innovation Act. This bipartisan bill, introduced by Chairman Bob Goodlatte, approved by the House Judiciary Committee with a 33-5 vote, and supported by the White House, would go a long way to solve the patent troll problem.<br /><br />The Innovation Act would address the explosion of abusive patent litigation, helping the patent system work as intended — promoting innovation.<br /><br />Patent protection is meant to provide an incentive to innovate, spurring real progress that benefits consumers. Unfortunately, patent trolls are abusing a flood of questionable patents — like those on basic e-commerce tools such as online shopping carts and shipment notification emails — to attack supermarkets, hotels, restaurants, retailers, and many other businesses, large and small. Trolls use the threat of time-consuming and expensive litigation to extort settlements, even where their claims wouldn’t hold up in court. <br /><br />This kind of patent troll litigation has grown like a particularly noxious weed, increasing four-fold since 2005.  By some estimates it cost the U.S. economy nearly $500 billion over the past two decades. And the problem is growing.  <br /><br />It’s time to step up and take action.  A broad coalition of companies and organizations support the Innovation Act, which would level the playing field by controlling discovery costs, raising pleading standards, and making fee-shifting a more meaningful deterrent to frivolous allegations. We agree with Chairman Goodlatte on the need to stop the exponential increase in the use of dubious patents to attack American businesses.  And we believe that legislation can go further to address the significant burden that invalid business method patents impose on innovative companies.<br /><br />We strongly support Chairman Goodlatte's bill and encourage all Members of Congress to vote for this important piece of legislation. The Innovation Act would stop patent trolls from abusing the system, letting America’s productive companies focus on creating new products and jobs, not fighting frivolous patent suits.</div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/innovation-not-litigation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Launching our spectrum database to help users dynamically access TV white space spectrum</title>
		<link>https://googledata.org/google-public-policy/launching-our-spectrum-database-to-help-users-dynamically-access-tv-white-space-spectrum/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=launching-our-spectrum-database-to-help-users-dynamically-access-tv-white-space-spectrum</link>
		<comments>https://googledata.org/google-public-policy/launching-our-spectrum-database-to-help-users-dynamically-access-tv-white-space-spectrum/#comments</comments>
		<pubDate>Thu, 14 Nov 2013 14:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=1e1cd31baf4fc4ddc192bd922a52ec58</guid>
		<description><![CDATA[<div dir="ltr">Posted by Alan Norman, Access Principal<br /><div><br /></div><div>Spectrum is an essential resource to fuel the Internet's future&#8212;it can power improved broadband access and spark innovation in wireless technology. And, as with any important resource, effective management can help make sure we're making the most of what's available. Both policy and technology have a role to play in making sure that spectrum is managed, allocated, and shared in ways that can help the Internet grow.<br /><br /><a href="https://www.google.com/spectrumdatabase/">Google's Spectrum Database</a> is one such technology, developed to enable dynamic sharing of TV white space spectrum; this allows parties to use spectrum when they need it, and make it available to other users when they don't. In July 2013, we <a href="http://blog.google.org/2013/06/television-white-spaces-database.html">were certified</a> by the FCC to operate the database for commercial use. Since then, early testers have provided feedback and insights on future innovations. Testers included <a href="http://www.gedigitalenergy.com/Communications">GE Industrial Communications</a>, which used the database to explore how it could enable new communication options for its Industrial Internet products. <br /><br />Now, we're launching a <a href="https://developers.google.com/spectrum/index">developer API</a> for the database that enables general exploration for any user, as well as a commercial account option for device manufacturers. The commercial account allows equipment makers to register their devices with our database in order to operate on available TV white space.<br /><br />Adaptrum is the first device manufacturer to be certified to use our Spectrum Database, and is already using the tool in the field for a white space deployment, providing public Wi-Fi on the campus of West Virginia University (WVU). The white space network, which is managed by Air.U co-founder Declaration Networks, uses Adaptrum's equipment integrated with our Spectrum Database. The collaboration shows how dynamic spectrum sharing can help deliver broadband coverage and capacity to more rural areas.<br /><br />We hope that the database continues to support new opportunities like the WVU white space network. With forward-looking policy as well technology advances, we can further encourage dynamic spectrum sharing and the wireless innovation that it supports.<br /><br /><i>Please contact <a href="mailto:whitespace.communications@ge.com">GE Industrial Communications</a>, <a href="mailto:bob@declarationnetworks.com">Air.U</a>, or <a href="mailto:kevin@adaptrum.com">Adaptrum</a> for more information on their work.</i></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on">Posted by Alan Norman, Access Principal<br /><div><br /></div><div>Spectrum is an essential resource to fuel the Internet's future—it can power improved broadband access and spark innovation in wireless technology. And, as with any important resource, effective management can help make sure we're making the most of what's available. Both policy and technology have a role to play in making sure that spectrum is managed, allocated, and shared in ways that can help the Internet grow.<br /><br /><a href="https://www.google.com/spectrumdatabase/">Google's Spectrum Database</a> is one such technology, developed to enable dynamic sharing of TV white space spectrum; this allows parties to use spectrum when they need it, and make it available to other users when they don't. In July 2013, we <a href="http://blog.google.org/2013/06/television-white-spaces-database.html">were certified</a> by the FCC to operate the database for commercial use. Since then, early testers have provided feedback and insights on future innovations. Testers included <a href="http://www.gedigitalenergy.com/Communications">GE Industrial Communications</a>, which used the database to explore how it could enable new communication options for its Industrial Internet products. <br /><br />Now, we're launching a <a href="https://developers.google.com/spectrum/index">developer API</a> for the database that enables general exploration for any user, as well as a commercial account option for device manufacturers. The commercial account allows equipment makers to register their devices with our database in order to operate on available TV white space.<br /><br />Adaptrum is the first device manufacturer to be certified to use our Spectrum Database, and is already using the tool in the field for a white space deployment, providing public Wi-Fi on the campus of West Virginia University (WVU). The white space network, which is managed by Air.U co-founder Declaration Networks, uses Adaptrum's equipment integrated with our Spectrum Database. The collaboration shows how dynamic spectrum sharing can help deliver broadband coverage and capacity to more rural areas.<br /><br />We hope that the database continues to support new opportunities like the WVU white space network. With forward-looking policy as well technology advances, we can further encourage dynamic spectrum sharing and the wireless innovation that it supports.<br /><br /><i>Please contact <a href="mailto:whitespace.communications@ge.com">GE Industrial Communications</a>, <a href="mailto:bob@declarationnetworks.com">Air.U</a>, or <a href="mailto:kevin@adaptrum.com">Adaptrum</a> for more information on their work.</i></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/launching-our-spectrum-database-to-help-users-dynamically-access-tv-white-space-spectrum/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Government requests for user information double over three years</title>
		<link>https://googledata.org/google-public-policy/government-requests-for-user-information-double-over-three-years/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=government-requests-for-user-information-double-over-three-years</link>
		<comments>https://googledata.org/google-public-policy/government-requests-for-user-information-double-over-three-years/#comments</comments>
		<pubDate>Thu, 14 Nov 2013 12:10:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=5f4946a26afb3eb35a131c8ab08d598f</guid>
		<description><![CDATA[<div dir="ltr"><div><i>Cross-posted with the Official Google Blog</i></div><div><br /></div>posted by Richard Salgado, Legal Director, Law Enforcement and Information Security<br /><br />In a year in which government surveillance has dominated the headlines, today we're <a href="http://www.google.com/transparencyreport/userdatarequests/">updating our Transparency Report</a> for the eighth time. Since we began sharing these figures with you <a href="http://googleblog.blogspot.com/2010/04/greater-transparency-around-government.html">in 2010</a>, requests from governments for user information have increased by more than 100 percent. This comes as usage of our services continues to grow, but also as more governments have made requests than ever before. And these numbers only include the requests we're allowed to publish.<br /><div><br /></div><div></div><div><div><a href="http://3.bp.blogspot.com/-6NnM-pbuzdo/UoREL22UqYI/AAAAAAAABnw/EdmGmlLkG7M/s1600/1Mgzr8EWSqVDnp1FtcjO0y3P7gzNGgsCuoh0Hnw.jpg"><img border="0" height="320" src="http://3.bp.blogspot.com/-6NnM-pbuzdo/UoREL22UqYI/AAAAAAAABnw/EdmGmlLkG7M/s400/1Mgzr8EWSqVDnp1FtcjO0y3P7gzNGgsCuoh0Hnw.jpg" width="400"></a></div><br /><div>Over the past three years, we've continued to add more details to the report, and we're doing so again today. We're including additional information about legal process for U.S. criminal requests: breaking out emergency disclosures, wiretap orders, <a href="http://en.wikipedia.org/wiki/Pen_register">pen register</a> orders and other court orders.<br /><br /></div><div>We want to go even further. We believe it's your right to know what kinds of requests and how many each government is making of us and other companies. However, the U.S. Department of Justice contends that U.S. law does not allow us to share information about some national security requests that we might receive. Specifically, the U.S. government argues that we cannot share information about the requests we receive (if any) under the Foreign Intelligence Surveillance Act. But you deserve to know.<br /><br />Earlier this year, we brought a federal case to assert that we do indeed have the right to shine more light on the FISA process. In addition, we recently wrote a <a href="https://www.cdt.org/files/pdfs/weneedtoknow-transparency-bills-support-letter.pdf">letter of support</a> for two pieces of legislation currently proposed in the U.S. Congress. And we're asking governments around the world to uphold international legal agreements that respect the laws of different countries and guarantee standards for due process are met.<br /><br />Our promise to you is to continue to make this report robust, to defend your information from overly broad government requests, and to push for greater transparency around the world.<br /><br />We strongly believe that the Electronic Communications Privacy Act (ECPA) must be updated in this Congress, and we urge Congress to expeditiously enact a bright-line, warrant-for-content rule. Governmental entities should be required to obtain a warrant&#8212;issued based on a showing of probable cause&#8212;before requiring companies like Google to disclose the content of users' electronic communications.</div></div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on"><div><i>Cross-posted with the Official Google Blog</i></div><div><br /></div>posted by Richard Salgado, Legal Director, Law Enforcement and Information Security<br /><br />In a year in which government surveillance has dominated the headlines, today we're <a href="http://www.google.com/transparencyreport/userdatarequests/">updating our Transparency Report</a> for the eighth time. Since we began sharing these figures with you <a href="http://googleblog.blogspot.com/2010/04/greater-transparency-around-government.html">in 2010</a>, requests from governments for user information have increased by more than 100 percent. This comes as usage of our services continues to grow, but also as more governments have made requests than ever before. And these numbers only include the requests we're allowed to publish.<br /><div><br /></div><div class="separator" style="clear: both; text-align: center;"></div><div><div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/-6NnM-pbuzdo/UoREL22UqYI/AAAAAAAABnw/EdmGmlLkG7M/s1600/1Mgzr8EWSqVDnp1FtcjO0y3P7gzNGgsCuoh0Hnw.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://3.bp.blogspot.com/-6NnM-pbuzdo/UoREL22UqYI/AAAAAAAABnw/EdmGmlLkG7M/s400/1Mgzr8EWSqVDnp1FtcjO0y3P7gzNGgsCuoh0Hnw.jpg" width="400" /></a></div><br /><div>Over the past three years, we've continued to add more details to the report, and we're doing so again today. We're including additional information about legal process for U.S. criminal requests: breaking out emergency disclosures, wiretap orders, <a href="http://en.wikipedia.org/wiki/Pen_register">pen register</a> orders and other court orders.<br /><br /></div><div>We want to go even further. We believe it's your right to know what kinds of requests and how many each government is making of us and other companies. However, the U.S. Department of Justice contends that U.S. law does not allow us to share information about some national security requests that we might receive. Specifically, the U.S. government argues that we cannot share information about the requests we receive (if any) under the Foreign Intelligence Surveillance Act. But you deserve to know.<br /><br />Earlier this year, we brought a federal case to assert that we do indeed have the right to shine more light on the FISA process. In addition, we recently wrote a <a href="https://www.cdt.org/files/pdfs/weneedtoknow-transparency-bills-support-letter.pdf">letter of support</a> for two pieces of legislation currently proposed in the U.S. Congress. And we're asking governments around the world to uphold international legal agreements that respect the laws of different countries and guarantee standards for due process are met.<br /><br />Our promise to you is to continue to make this report robust, to defend your information from overly broad government requests, and to push for greater transparency around the world.<br /><br />We strongly believe that the Electronic Communications Privacy Act (ECPA) must be updated in this Congress, and we urge Congress to expeditiously enact a bright-line, warrant-for-content rule. Governmental entities should be required to obtain a warrant—issued based on a showing of probable cause—before requiring companies like Google to disclose the content of users' electronic communications.</div></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/government-requests-for-user-information-double-over-three-years/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Testifying before the U.S. Senate on transparency legislation</title>
		<link>https://googledata.org/google-public-policy/testifying-before-the-u-s-senate-on-transparency-legislation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=testifying-before-the-u-s-senate-on-transparency-legislation</link>
		<comments>https://googledata.org/google-public-policy/testifying-before-the-u-s-senate-on-transparency-legislation/#comments</comments>
		<pubDate>Wed, 13 Nov 2013 15:16:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=19256668f63290212a17923e1d7ceb7c</guid>
		<description><![CDATA[<div dir="ltr">Posted by Pablo Chavez, Director, Public Policy and Government Affairs<br /><br />This morning, Richard Salgado, Director of Law Enforcement and Information Security, will <a href="http://www.judiciary.senate.gov/hearings/hearing.cfm?id=5fa8a4fcfd512d43b3816f1ee7181a33">testify</a> before the Senate Judiciary Subcommittee on Privacy, Technology, and the Law on the <a href="http://www.gpo.gov/fdsys/pkg/BILLS-113s1621is/pdf/BILLS-113s1621is.pdf">Surveillance Transparency Act of 2013</a>. <br /><br />We commend Senators Franken and Heller for introducing this bill, which would allow Internet service providers to disclose basic statistics about requests we receive from law enforcement for users&#8217; information in the course of a national security investigation. The current lack of transparency about government surveillance programs undermines trust, economic growth and security, and the promise of the Internet as a platform for openness. <br /><br />More transparency can help fix that. Since 2010, our <a href="http://www.google.com/transparencyreport/">Transparency Report</a> has shed light on requests for user data that we receive from the government. We strive to surface new and useful data with every update. Richard&#8217;s testimony details our efforts to be allowed to disclose statistics about FISA requests that we may receive, including our <a href="http://www.uscourts.gov/uscourts/courts/fisc/misc-13-03-motion-130909.pdf">motion</a> before the Foreign Intelligence Surveillance Court. <br /><br />Transparency is crucial, but it is only one step among many needed. As we <a href="http://sensenbrenner.house.gov/uploadedfiles/usa_freedom_act_letter.pdf">wrote to Congress</a> two weeks ago, it is clear that the U.S. government and other governments must examine broader reforms to government surveillance.<div><br />You can read Richard&#8217;s <a href="http://services.google.com/fh/files/blogs/google_testimony_transparency_nov132013.pdf">written testimony</a> and watch the <a href="http://www.judiciary.senate.gov/hearings/hearing.cfm?id=5fa8a4fcfd512d43b3816f1ee7181a33">webcast</a> of the hearing starting at 10:00 AM Eastern.</div></div>]]></description>
				<content:encoded><![CDATA[<div dir="ltr" style="text-align: left;" trbidi="on">Posted by Pablo Chavez, Director, Public Policy and Government Affairs<br /><br />This morning, Richard Salgado, Director of Law Enforcement and Information Security, will <a href="http://www.judiciary.senate.gov/hearings/hearing.cfm?id=5fa8a4fcfd512d43b3816f1ee7181a33">testify</a> before the Senate Judiciary Subcommittee on Privacy, Technology, and the Law on the <a href="http://www.gpo.gov/fdsys/pkg/BILLS-113s1621is/pdf/BILLS-113s1621is.pdf">Surveillance Transparency Act of 2013</a>. <br /><br />We commend Senators Franken and Heller for introducing this bill, which would allow Internet service providers to disclose basic statistics about requests we receive from law enforcement for users’ information in the course of a national security investigation. The current lack of transparency about government surveillance programs undermines trust, economic growth and security, and the promise of the Internet as a platform for openness. <br /><br />More transparency can help fix that. Since 2010, our <a href="http://www.google.com/transparencyreport/">Transparency Report</a> has shed light on requests for user data that we receive from the government. We strive to surface new and useful data with every update. Richard’s testimony details our efforts to be allowed to disclose statistics about FISA requests that we may receive, including our <a href="http://www.uscourts.gov/uscourts/courts/fisc/misc-13-03-motion-130909.pdf">motion</a> before the Foreign Intelligence Surveillance Court. <br /><br />Transparency is crucial, but it is only one step among many needed. As we <a href="http://sensenbrenner.house.gov/uploadedfiles/usa_freedom_act_letter.pdf">wrote to Congress</a> two weeks ago, it is clear that the U.S. government and other governments must examine broader reforms to government surveillance.<div><br />You can read Richard’s <a href="http://services.google.com/fh/files/blogs/google_testimony_transparency_nov132013.pdf">written testimony</a> and watch the <a href="http://www.judiciary.senate.gov/hearings/hearing.cfm?id=5fa8a4fcfd512d43b3816f1ee7181a33">webcast</a> of the hearing starting at 10:00 AM Eastern.</div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/testifying-before-the-u-s-senate-on-transparency-legislation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Joining forces to advocate for a more affordable Internet</title>
		<link>https://googledata.org/google-public-policy/joining-forces-to-advocate-for-a-more-affordable-internet/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=joining-forces-to-advocate-for-a-more-affordable-internet</link>
		<comments>https://googledata.org/google-public-policy/joining-forces-to-advocate-for-a-more-affordable-internet/#comments</comments>
		<pubDate>Mon, 07 Oct 2013 04:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=c69c8c20e49853496fae1341adf8b927</guid>
		<description><![CDATA[Posted by Jennifer Haroon, Access Principal<br /><br />Imagine a world where you spent 30% of your monthly income on basic Internet service. Could you pay? What might you have to give up? For billions of people, these costs&#8212;and questions&#8212;are an unaffordable reality that stop them from accessing the Web.<br /><br />Today, Google is joining more than 30 members to launch the <a href="http://www.google.com/url?q=http%3A%2F%2Fa4ai.org%2Fhome%2F&#38;sa=D&#38;sntz=1&#38;usg=AFQjCNFTXWOmnaQujydie-zK_r7wp2COUg">Alliance for Affordable Internet</a> (A4AI), a new coalition that cuts across boundaries of geography, sector, or size. Our goal? To help bring down Internet costs through policy change.<br /><br />New technologies play a crucial role in bringing the Internet to more people worldwide&#8212;we&#8217;ve developed and invested in many of these big ideas over the years. We broke new ground with <a href="http://www.google.com/loon/">balloon-powered Internet access</a>, are bringing broadband to Africa with <a href="http://google-africa.blogspot.com/2013/03/announcing-new-tv-white-spaces-trial-in.html">TV White Spaces</a>, and are <a href="http://blog.google.org/2013/02/improving-internet-access-in-emerging.html">funding organizations</a> like the Internet Society to develop Internet Exchange Points in emerging markets.<br /><br />These technologies can have major impact, but no single solution can connect the 5 billion people living without Internet access today. Policy change can help new innovation take hold and flourish; outdated policies can stifle progress. In Kenya and other markets that have adopted national broadband plans, policy change has <a href="http://www.itu.int/net/pressoffice/press_releases/2013/27.aspx#.Ukze2GR4YzV">delivered results</a>, fast. A4AI will focus on those policy changes that can bolster new access technologies and initiatives and make the Internet more affordable to people worldwide.<br /><br />Initiated by the <a href="http://www.webfoundation.org/">World Wide Web Foundation</a>, A4AI includes <a href="http://www.google.com/url?q=http%3A%2F%2Fa4ai.org%2Fmembers%2F&#38;sa=D&#38;sntz=1&#38;usg=AFQjCNHjSozq0kOin-kFkk75Iq7GWCdosA">members</a> from the technology, government, and nonprofit worlds, from developed and developing countries. Google&#8212;along with other Global Sponsors&#8212;joined the alliance in its early days to help establish the vision that exists today, as well as rally more members that share our mission for affordable Internet access.<br /><br />A4AI has a specific goal in mind: to reach the UN Broadband Commission target of entry-level broadband access priced at less than 5% of monthly income worldwide. (According to the ITU, households in the developing world pay roughly 30% of monthly income for a fixed connection, so there&#8217;s a lot of work to do.) We&#8217;re working with A4AI on several initial projects, including:<br /><br /><ul><li>Publishing a set of policy and regulatory <a href="http://a4ai.org/wp-content/uploads/2013/09/A4AI-Best-Practices-launch1.pdf">best practices</a></li><li>Working directly with governments, with plans to engage with 10+ countries by the end of 2015</li><li>Releasing the first edition of an annual affordability report</li></ul><br />Ultimately, A4AI is about making the world a more connected place. Over 90% of people in the 49 least developed countries are still not online. A4AI wants to help people in these countries to get access, to find a door to new information, opportunities, and ideas. <a href="http://www.cck.go.ke/about/board/bitange.html">Dr. Bitange Ndemo</a>, the honorary chairperson of A4AI, has called for the need to remove &#8220;analog policies that are holding back the digital revolution&#8221; in emerging markets.<br /><br />We couldn&#8217;t agree more.]]></description>
				<content:encoded><![CDATA[Posted by Jennifer Haroon, Access Principal<br /><br />Imagine a world where you spent 30% of your monthly income on basic Internet service. Could you pay? What might you have to give up? For billions of people, these costs—and questions—are an unaffordable reality that stop them from accessing the Web.<br /><br />Today, Google is joining more than 30 members to launch the <a href="http://www.google.com/url?q=http%3A%2F%2Fa4ai.org%2Fhome%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFTXWOmnaQujydie-zK_r7wp2COUg">Alliance for Affordable Internet</a> (A4AI), a new coalition that cuts across boundaries of geography, sector, or size. Our goal? To help bring down Internet costs through policy change.<br /><br />New technologies play a crucial role in bringing the Internet to more people worldwide—we’ve developed and invested in many of these big ideas over the years. We broke new ground with <a href="http://www.google.com/loon/">balloon-powered Internet access</a>, are bringing broadband to Africa with <a href="http://google-africa.blogspot.com/2013/03/announcing-new-tv-white-spaces-trial-in.html">TV White Spaces</a>, and are <a href="http://blog.google.org/2013/02/improving-internet-access-in-emerging.html">funding organizations</a> like the Internet Society to develop Internet Exchange Points in emerging markets.<br /><br />These technologies can have major impact, but no single solution can connect the 5 billion people living without Internet access today. Policy change can help new innovation take hold and flourish; outdated policies can stifle progress. In Kenya and other markets that have adopted national broadband plans, policy change has <a href="http://www.itu.int/net/pressoffice/press_releases/2013/27.aspx#.Ukze2GR4YzV">delivered results</a>, fast. A4AI will focus on those policy changes that can bolster new access technologies and initiatives and make the Internet more affordable to people worldwide.<br /><br />Initiated by the <a href="http://www.webfoundation.org/">World Wide Web Foundation</a>, A4AI includes <a href="http://www.google.com/url?q=http%3A%2F%2Fa4ai.org%2Fmembers%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHjSozq0kOin-kFkk75Iq7GWCdosA">members</a> from the technology, government, and nonprofit worlds, from developed and developing countries. Google—along with other Global Sponsors—joined the alliance in its early days to help establish the vision that exists today, as well as rally more members that share our mission for affordable Internet access.<br /><br />A4AI has a specific goal in mind: to reach the UN Broadband Commission target of entry-level broadband access priced at less than 5% of monthly income worldwide. (According to the ITU, households in the developing world pay roughly 30% of monthly income for a fixed connection, so there’s a lot of work to do.) We’re working with A4AI on several initial projects, including:<br /><br /><ul><li>Publishing a set of policy and regulatory <a href="http://a4ai.org/wp-content/uploads/2013/09/A4AI-Best-Practices-launch1.pdf">best practices</a></li><li>Working directly with governments, with plans to engage with 10+ countries by the end of 2015</li><li>Releasing the first edition of an annual affordability report</li></ul><br />Ultimately, A4AI is about making the world a more connected place. Over 90% of people in the 49 least developed countries are still not online. A4AI wants to help people in these countries to get access, to find a door to new information, opportunities, and ideas. <a href="http://www.cck.go.ke/about/board/bitange.html">Dr. Bitange Ndemo</a>, the honorary chairperson of A4AI, has called for the need to remove “analog policies that are holding back the digital revolution” in emerging markets.<br /><br />We couldn’t agree more.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/joining-forces-to-advocate-for-a-more-affordable-internet/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Broadening Google Patents</title>
		<link>https://googledata.org/google-public-policy/broadening-google-patents/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=broadening-google-patents</link>
		<comments>https://googledata.org/google-public-policy/broadening-google-patents/#comments</comments>
		<pubDate>Tue, 17 Sep 2013 14:15:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=bf6d2c5aab7352caae255b0227f11ba2</guid>
		<description><![CDATA[<i>Cross-posted with the&#160;<a href="http://googlepolicyeurope.blogspot.com/">European Public Policy Blog</a>&#160;and <a href="http://insidesearch.blogspot.com/">Inside Search Blog</a>.</i><br /><br />Last year, we launched two improvements to <a href="https://www.google.com/?tbm=pts">Google Patents</a>: the <a href="http://www.google.com/patents/related">Prior Art Finder</a> and European Patent Office (EPO) patents.  Today we&#8217;re happy to announce the addition of documents from four new patent agencies: China, Germany, Canada, and the World Intellectual Property Organization (WIPO).  Many of these documents may provide prior art for future patent applications, and we hope their increased discoverability will improve the quality of patents in the U.S. and worldwide.<br /><br />So if you want to learn about a <a href="https://www.google.com/patents/CN2578211Y">Chinese dual-drive bicycle</a>, a <a href="https://www.google.com/patents/DE102011002125B3">German valve for inflating bicycle tires</a>, attach a <a href="https://www.google.com/patents/CA2053546A1">Canadian trailer to your bike</a>, or read the <a href="https://www.google.com/patents/WO1999048749A1">WIPO application for pedalling with one leg</a>, those and millions of other inventions are now available on Google Patents.<br /><br />Thanks to <a href="http://translate.google.com/">Google Translate</a>, all patents are available in both their original languages and in English, and you can search across the world&#8217;s patents using terms in any of those languages.  When there are multiple submission languages, you can move between them with a single click on the tabs at the top of the page, as shown in the screenshot below:<br /><br /><div></div><div><a href="http://2.bp.blogspot.com/-IpkC-UK2PNQ/Ujhg_e_ycEI/AAAAAAAAAo0/zqPYCPymNss/s1600/Screen+Shot+2013-09-17+at+7.02.12+AM.png"><img border="0" src="http://2.bp.blogspot.com/-IpkC-UK2PNQ/Ujhg_e_ycEI/AAAAAAAAAo0/zqPYCPymNss/s400/Screen+Shot+2013-09-17+at+7.02.12+AM.png"></a></div><div><span><br /></span><br /><div><span>Happy patent searching!</span><br /><span><br /></span><span>Posted by Jon Orwant, Engineering Manager</span></div></div>]]></description>
				<content:encoded><![CDATA[<i>Cross-posted with the&nbsp;<a href="http://googlepolicyeurope.blogspot.com/">European Public Policy Blog</a>&nbsp;and <a href="http://insidesearch.blogspot.com/">Inside Search Blog</a>.</i><br /><br />Last year, we launched two improvements to <a href="https://www.google.com/?tbm=pts">Google Patents</a>: the <a href="http://www.google.com/patents/related">Prior Art Finder</a> and European Patent Office (EPO) patents.  Today we’re happy to announce the addition of documents from four new patent agencies: China, Germany, Canada, and the World Intellectual Property Organization (WIPO).  Many of these documents may provide prior art for future patent applications, and we hope their increased discoverability will improve the quality of patents in the U.S. and worldwide.<br /><br />So if you want to learn about a <a href="https://www.google.com/patents/CN2578211Y">Chinese dual-drive bicycle</a>, a <a href="https://www.google.com/patents/DE102011002125B3">German valve for inflating bicycle tires</a>, attach a <a href="https://www.google.com/patents/CA2053546A1">Canadian trailer to your bike</a>, or read the <a href="https://www.google.com/patents/WO1999048749A1">WIPO application for pedalling with one leg</a>, those and millions of other inventions are now available on Google Patents.<br /><br />Thanks to <a href="http://translate.google.com/">Google Translate</a>, all patents are available in both their original languages and in English, and you can search across the world’s patents using terms in any of those languages.  When there are multiple submission languages, you can move between them with a single click on the tabs at the top of the page, as shown in the screenshot below:<br /><br /><div style="text-align: center;"></div><div style="text-align: center;"><a href="http://2.bp.blogspot.com/-IpkC-UK2PNQ/Ujhg_e_ycEI/AAAAAAAAAo0/zqPYCPymNss/s1600/Screen+Shot+2013-09-17+at+7.02.12+AM.png" imageanchor="1"><img border="0" src="http://2.bp.blogspot.com/-IpkC-UK2PNQ/Ujhg_e_ycEI/AAAAAAAAAo0/zqPYCPymNss/s400/Screen+Shot+2013-09-17+at+7.02.12+AM.png" /></a></div><div style="text-align: center;"><span class="post-author"><br /></span><br /><div style="text-align: left;"><span class="post-author">Happy patent searching!</span><br /><span class="post-author"><br /></span><span class="post-author">Posted by Jon Orwant, Engineering Manager</span></div></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/broadening-google-patents/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Report: How Google fights piracy</title>
		<link>https://googledata.org/google-public-policy/report-how-google-fights-piracy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=report-how-google-fights-piracy</link>
		<comments>https://googledata.org/google-public-policy/report-how-google-fights-piracy/#comments</comments>
		<pubDate>Tue, 10 Sep 2013 13:07:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=584a6bc2b9d475a2d36133b43057f791</guid>
		<description><![CDATA[<span>Posted by Fred von Lohmann, Legal Director, Copyright</span><br /><span><br /></span>More music, video, text and software is being created on the Internet by more people in more places than ever before. Every kind of creative endeavor, both amateur and professional, is being transformed by the new opportunities and lower costs made possible by digital tools and online distribution. But copyright infringement remains a problem online, and Google is working hard to tackle it.<br /><br />Today, we are releasing a report, &#8220;<a href="https://docs.google.com/a/google.com/file/d/0BwxyRPFduTN2dVFqYml5UENUeUE/edit"><span>How Google Fights Piracy</span></a>,&#8221; bringing together in one place an overview of the programs, policies, and technologies we have put in place to combat piracy online. Here are few highlights:<br /><br /><ul><li><b>Better Legal Alternatives</b>: The best way to fight piracy is with better, convenient, legal alternatives. On YouTube and Play, Google is committed to creating those compelling alternatives for users. Each time a music fan chooses YouTube or Play over an unauthorized source, for example, it&#8217;s a victory against piracy. And thousands of copyright owners now use Content ID on YouTube to elect to monetize user-generated content on YouTube, rather than take it down, resulting in  hundreds of millions of dollars in royalties from Google each year.</li></ul><ul><li><b>Follow the Money</b>: When it comes to rogue sites that specialize in online piracy, other anti-piracy strategies will have limited effect so long as there is money to be made by their operators.  As a global leader in online advertising, Google is committed to rooting out and ejecting rogue sites from our advertising services, to ensure that they are not being misused to fund these sites. In 2012, we disabled ad serving to more than 46,000 sites for violating our copyright policies, the vast majority detected through our proactive efforts. We are also working with other leaders in the industry to craft <a href="http://www.whitehouse.gov/blog/2013/07/15/coming-together-combat-online-piracy-and-counterfeiting">best practices</a> aimed at raising standards across the entire online advertising industry.&#160;</li></ul><ul><li><b>Removing Infringing Results from Search</b>: When it comes to Search, Google is a leader in addressing the concerns of copyright owners, responding to more copyright removal notices, and faster, than ever before. During 2012, copyright owners and their agents sent us removal notices for more than 57 million web pages. Our turnaround time on those notices was, on average, less than 6 hours. That&#8217;s faster than we managed in 2011, despite a 15-fold increase in the volume of requests.&#160;</li></ul><br />Hundreds of Google employees work on the problem of piracy online, and we will continue to work with copyright owners to focus our energies on combating the problem.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Fred von Lohmann, Legal Director, Copyright</span><br /><span class="byline-author"><br /></span>More music, video, text and software is being created on the Internet by more people in more places than ever before. Every kind of creative endeavor, both amateur and professional, is being transformed by the new opportunities and lower costs made possible by digital tools and online distribution. But copyright infringement remains a problem online, and Google is working hard to tackle it.<br /><br />Today, we are releasing a report, “<a href="https://docs.google.com/a/google.com/file/d/0BwxyRPFduTN2dVFqYml5UENUeUE/edit"><span style="color: blue;">How Google Fights Piracy</span></a>,” bringing together in one place an overview of the programs, policies, and technologies we have put in place to combat piracy online. Here are few highlights:<br /><br /><ul><li><b>Better Legal Alternatives</b>: The best way to fight piracy is with better, convenient, legal alternatives. On YouTube and Play, Google is committed to creating those compelling alternatives for users. Each time a music fan chooses YouTube or Play over an unauthorized source, for example, it’s a victory against piracy. And thousands of copyright owners now use Content ID on YouTube to elect to monetize user-generated content on YouTube, rather than take it down, resulting in  hundreds of millions of dollars in royalties from Google each year.</li></ul><ul><li><b>Follow the Money</b>: When it comes to rogue sites that specialize in online piracy, other anti-piracy strategies will have limited effect so long as there is money to be made by their operators.  As a global leader in online advertising, Google is committed to rooting out and ejecting rogue sites from our advertising services, to ensure that they are not being misused to fund these sites. In 2012, we disabled ad serving to more than 46,000 sites for violating our copyright policies, the vast majority detected through our proactive efforts. We are also working with other leaders in the industry to craft <a href="http://www.whitehouse.gov/blog/2013/07/15/coming-together-combat-online-piracy-and-counterfeiting">best practices</a> aimed at raising standards across the entire online advertising industry.&nbsp;</li></ul><ul><li><b>Removing Infringing Results from Search</b>: When it comes to Search, Google is a leader in addressing the concerns of copyright owners, responding to more copyright removal notices, and faster, than ever before. During 2012, copyright owners and their agents sent us removal notices for more than 57 million web pages. Our turnaround time on those notices was, on average, less than 6 hours. That’s faster than we managed in 2011, despite a 15-fold increase in the volume of requests.&nbsp;</li></ul><br />Hundreds of Google employees work on the problem of piracy online, and we will continue to work with copyright owners to focus our energies on combating the problem.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/report-how-google-fights-piracy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Don&#8217;t get locked out: set up recovery options for your Google Account</title>
		<link>https://googledata.org/google-public-policy/dont-get-locked-out-set-up-recovery-options-for-your-google-account-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=dont-get-locked-out-set-up-recovery-options-for-your-google-account-2</link>
		<comments>https://googledata.org/google-public-policy/dont-get-locked-out-set-up-recovery-options-for-your-google-account-2/#comments</comments>
		<pubDate>Mon, 09 Sep 2013 17:25:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=a88ac2d378960351fe7c5c3d7fa8d446</guid>
		<description><![CDATA[Posted by Diana Smetters, Software Engineer<br /><i><br /></i><i>This summer we&#8217;re <a href="http://googleblog.blogspot.com/search/label/security%20and%20safety%20tips">posting regularly</a> with privacy and security tips. Knowing how to stay safe and secure online is important, which is why we created our Good to Know site with advice and tips for safe and savvy Internet use.</i> -Ed.<br /><br />Strong passwords help protect your accounts and information on the web. But forgetting your password is like losing your keys&#8212;you can end up locked out of your own home. It gets worse if your password gets compromised or stolen. Sometimes the thief will change your password so you can't get back into your own account&#8212;kind of like someone stealing your keys and then changing the lock.<br /><br />If you've lost your Google password, you need a way to get back into your Google Account&#8212;and back to all of your stuff in Gmail, Maps, Google+ and YouTube. To help you, Google needs to be able to tell that you&#8217;re the rightful account owner even if you don't have the right password. There are a few easy steps you can take right now to make it easy for you&#8212;and no one else&#8212;to get into your Google Account if you forget or don&#8217;t know the password.<br /><b><br /></b><b>1. Add a recovery email address. </b>By registering an alternate email address with your <a href="https://www.google.com/settings/account">Google Account settings</a>, you&#8217;re giving Google another way to reach you. If you forget your password, Google can send a link to that recovery email address so you can reset your password. Google can also use that email address to let you know if we detect something suspicious happening with your account.   <br /><br /><div><a href="http://2.bp.blogspot.com/-dqfN5uqhUM8/Ui3_IqDvOuI/AAAAAAAANIk/TygnhpCZpzM/s1600/1SMIlUAskALVF1rVhDogBoLlc7sp6Nj13wDEj.png"><img border="0" src="http://2.bp.blogspot.com/-dqfN5uqhUM8/Ui3_IqDvOuI/AAAAAAAANIk/TygnhpCZpzM/s1600/1SMIlUAskALVF1rVhDogBoLlc7sp6Nj13wDEj.png"></a></div><div><i>Setting up your recovery options can help you get back in </i></div><div><i>if you get locked out of your Google Account</i></div><b><br /></b><b>2. Add a phone number to your Google Account. </b>Your mobile phone is the best way to regain access to your account if you forget your password. It's like the "fast lane" for account recovery: we text a code to the phone number you've registered with us, and you're <a href="https://support.google.com/accounts/answer/183728?hl=en">back in business</a> in no time. Your phone is more secure and reliable than other means of recovering your account.  Methods like &#8220;secret&#8221; questions (asking your mother&#8217;s maiden name or city where you were born) may have answers that are easy to remember, but they are also possible for bad guys to uncover. And we&#8217;ve consistently seen that people who register a recovery phone are faster and more successful at getting their accounts back than those recovering their accounts via email.<br /><br />You can also get a text message if Google detects that something suspicious is going on with your account. Giving a recovery phone number to Google won&#8217;t result in you being signed up for marketing lists or getting more calls from telemarketers.  <b>3. Keep your recovery options up to date. </b>It&#8217;s a good idea to check your recovery options every so often. For example, if you change your phone number after setting up your recovery options, take just a minute to update your recovery settings to match. We'll remind you of your current settings every so often to make it easier for you to keep them up to date.<br /><br />That&#8217;s it! You can either update your recovery options next time you&#8217;re prompted, or you can take two minutes to do it right now on our <a href="http://accounts.google.com/UpdateAccountRecoveryOptions">Account recovery options page</a>. For more advice on how to protect yourself and your family online, visit our <a href="http://www.google.com/goodtoknow/">Good to Know site</a>, or check out some of the other posts in our series on staying safe and secure.]]></description>
				<content:encoded><![CDATA[Posted by Diana Smetters, Software Engineer<br /><i><br /></i><i>This summer we’re <a href="http://googleblog.blogspot.com/search/label/security%20and%20safety%20tips">posting regularly</a> with privacy and security tips. Knowing how to stay safe and secure online is important, which is why we created our Good to Know site with advice and tips for safe and savvy Internet use.</i> -Ed.<br /><br />Strong passwords help protect your accounts and information on the web. But forgetting your password is like losing your keys—you can end up locked out of your own home. It gets worse if your password gets compromised or stolen. Sometimes the thief will change your password so you can't get back into your own account—kind of like someone stealing your keys and then changing the lock.<br /><br />If you've lost your Google password, you need a way to get back into your Google Account—and back to all of your stuff in Gmail, Maps, Google+ and YouTube. To help you, Google needs to be able to tell that you’re the rightful account owner even if you don't have the right password. There are a few easy steps you can take right now to make it easy for you—and no one else—to get into your Google Account if you forget or don’t know the password.<br /><b><br /></b><b>1. Add a recovery email address. </b>By registering an alternate email address with your <a href="https://www.google.com/settings/account">Google Account settings</a>, you’re giving Google another way to reach you. If you forget your password, Google can send a link to that recovery email address so you can reset your password. Google can also use that email address to let you know if we detect something suspicious happening with your account.   <br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-dqfN5uqhUM8/Ui3_IqDvOuI/AAAAAAAANIk/TygnhpCZpzM/s1600/1SMIlUAskALVF1rVhDogBoLlc7sp6Nj13wDEj.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-dqfN5uqhUM8/Ui3_IqDvOuI/AAAAAAAANIk/TygnhpCZpzM/s1600/1SMIlUAskALVF1rVhDogBoLlc7sp6Nj13wDEj.png" /></a></div><div style="text-align: center;"><i>Setting up your recovery options can help you get back in </i></div><div style="text-align: center;"><i>if you get locked out of your Google Account</i></div><b><br /></b><b>2. Add a phone number to your Google Account. </b>Your mobile phone is the best way to regain access to your account if you forget your password. It's like the "fast lane" for account recovery: we text a code to the phone number you've registered with us, and you're <a href="https://support.google.com/accounts/answer/183728?hl=en">back in business</a> in no time. Your phone is more secure and reliable than other means of recovering your account.  Methods like “secret” questions (asking your mother’s maiden name or city where you were born) may have answers that are easy to remember, but they are also possible for bad guys to uncover. And we’ve consistently seen that people who register a recovery phone are faster and more successful at getting their accounts back than those recovering their accounts via email.<br /><br />You can also get a text message if Google detects that something suspicious is going on with your account. Giving a recovery phone number to Google won’t result in you being signed up for marketing lists or getting more calls from telemarketers.  <b>3. Keep your recovery options up to date. </b>It’s a good idea to check your recovery options every so often. For example, if you change your phone number after setting up your recovery options, take just a minute to update your recovery settings to match. We'll remind you of your current settings every so often to make it easier for you to keep them up to date.<br /><br />That’s it! You can either update your recovery options next time you’re prompted, or you can take two minutes to do it right now on our <a href="http://accounts.google.com/UpdateAccountRecoveryOptions">Account recovery options page</a>. For more advice on how to protect yourself and your family online, visit our <a href="http://www.google.com/goodtoknow/">Good to Know site</a>, or check out some of the other posts in our series on staying safe and secure.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/dont-get-locked-out-set-up-recovery-options-for-your-google-account-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>A petition for greater transparency</title>
		<link>https://googledata.org/google-public-policy/a-petition-for-greater-transparency/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-petition-for-greater-transparency</link>
		<comments>https://googledata.org/google-public-policy/a-petition-for-greater-transparency/#comments</comments>
		<pubDate>Mon, 09 Sep 2013 14:30:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=81f1a09ea19f40895960f9946ff1292a</guid>
		<description><![CDATA[Posted by Richard Salgado, Director, Law Enforcement &#38; Information Security and Pablo Chavez, Director, Public Policy and Government Affairs<br /><br />Today we filed an amended <a href="http://services.google.com/fh/files/blogs/google_fisc_motion_sep9_2013.pdf">petition</a> [PDF] in the <a href="http://www.uscourts.gov/uscourts/courts/fisc/index.html">U.S. Foreign Intelligence Surveillance Court</a>.  This petition mirrors the requests made to Congress and the President by our industry and civil liberties groups in a <a href="https://www.cdt.org/files/pdfs/weneedtoknow-transparency-letter.pdf">letter</a> earlier this year.  Namely, that Google be allowed to publish detailed statistics about the types (if any) of national security requests we receive under the Foreign Intelligence Surveillance Act, including Section 702.  Given the important public policy issues at stake, we have also asked the court to hold its hearing in open rather than behind closed doors.  It&#8217;s time for more transparency.<br /><br />In addition, along with a number of other companies and trade associations, we are also meeting the President&#8217;s Group on Intelligence and Communications Technologies today.  We&#8217;ll reiterate the same message there: that the levels of secrecy that have built up around national security requests undermine the basic freedoms that are at the heart of a democratic society.]]></description>
				<content:encoded><![CDATA[Posted by Richard Salgado, Director, Law Enforcement &amp; Information Security and Pablo Chavez, Director, Public Policy and Government Affairs<br /><br />Today we filed an amended <a href="http://services.google.com/fh/files/blogs/google_fisc_motion_sep9_2013.pdf">petition</a> [PDF] in the <a href="http://www.uscourts.gov/uscourts/courts/fisc/index.html">U.S. Foreign Intelligence Surveillance Court</a>.  This petition mirrors the requests made to Congress and the President by our industry and civil liberties groups in a <a href="https://www.cdt.org/files/pdfs/weneedtoknow-transparency-letter.pdf">letter</a> earlier this year.  Namely, that Google be allowed to publish detailed statistics about the types (if any) of national security requests we receive under the Foreign Intelligence Surveillance Act, including Section 702.  Given the important public policy issues at stake, we have also asked the court to hold its hearing in open rather than behind closed doors.  It’s time for more transparency.<br /><br />In addition, along with a number of other companies and trade associations, we are also meeting the President’s Group on Intelligence and Communications Technologies today.  We’ll reiterate the same message there: that the levels of secrecy that have built up around national security requests undermine the basic freedoms that are at the heart of a democratic society.    ]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/a-petition-for-greater-transparency/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>More patents in the service of open source</title>
		<link>https://googledata.org/google-public-policy/more-patents-in-the-service-of-open-source-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=more-patents-in-the-service-of-open-source-2</link>
		<comments>https://googledata.org/google-public-policy/more-patents-in-the-service-of-open-source-2/#comments</comments>
		<pubDate>Thu, 08 Aug 2013 18:03:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=063a6f9142bff10e384f5dca022b4b4f</guid>
		<description><![CDATA[<b><span><div dir="ltr"><b></b></div><div dir="ltr"><b><span><i>Posted by Duane Valz, Senior Patent Counsel</i></span></b></div><br /><br /><span></span><div dir="ltr"><span>Open-source software has accelerated the pace of innovation in computing, leading to better products and services at lower cost. But as the impact of open-source software has grown, so too has the number of </span><a href="http://googleblog.blogspot.com/2011/08/when-patents-attack-android.html"><span>patent attacks</span></a><span> against it.</span></div><br /><span></span><div dir="ltr"><span>In March, we </span><a href="http://google-opensource.blogspot.com/2013/03/taking-stand-on-open-source-and-patents.html"><span>announced</span></a><span> an Open Patent Non-Assertion (OPN) Pledge&#8212;committing not to sue any user, distributor or developer of open-source software on </span><a href="http://www.google.com/patents/opnpledge/patents/"><span>specified patents</span></a><span>, unless first attacked. Our goal was to encourage pro-competitive, defensive uses of patents to support open-source innovation.</span></div><br /><span></span><div dir="ltr"><span>Today we are pleased to expand the OPN Pledge to include an additional 79 patents. These patents cover software used to efficiently operate data centers, including middleware, distributed storage management, distributed database management, and alarm monitoring.</span></div><br /><span></span><div dir="ltr"><span>We acquired these patents from </span><a href="http://www.ibm.com/"><span>IBM</span></a><span> and </span><a href="http://www.ca.com/us/default.aspx"><span>CA Technologies</span></a><span>, companies that in 2005 were </span><a href="http://www.arnnet.com.au/article/139603/ca_opens_access_14_patents_announces_deal_ibm/"><span>among the first to make open-source patent pledges</span></a><span>. The goal of the patent system is to foster innovation, and we aim to use patents, whether acquired or developed internally, in support of that goal.</span></div><br /><span></span><div dir="ltr"><span>You can learn more about this second group of patents and the Pledge itself on </span><a href="http://www.google.com/patents/opnpledge/"><span>our site</span></a><span>, which we&#8217;ve also updated to make it easier to browse and download data on pledged patents.</span></div><br /><span></span><div dir="ltr"><span>To date, the patents we&#8217;ve included in the Pledge</span><span> </span><span>have generally related to &#8220;back-end&#8221; technologies: servers, data centers, and the like. But open-source software is also transforming the development of consumer products that people use every day&#8212;so stay tuned for additional extensions to patents covering those sorts of technologies.</span></div><div><span><br /></span></div></span></b><br />]]></description>
				<content:encoded><![CDATA[<b id="docs-internal-guid-78626443-5f1c-9d74-4c23-4bfdf12a8015"><span style="font-family: Arial, Helvetica, sans-serif;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-78626443-5f1c-9d74-4c23-4bfdf12a8015"></b></div><div dir="ltr" style="display: inline !important; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-78626443-5f1c-9d74-4c23-4bfdf12a8015"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><i>Posted by Duane Valz, Senior Patent Counsel</i></span></b></div><br /><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Open-source software has accelerated the pace of innovation in computing, leading to better products and services at lower cost. But as the impact of open-source software has grown, so too has the number of </span><a href="http://googleblog.blogspot.com/2011/08/when-patents-attack-android.html" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">patent attacks</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> against it.</span></div><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">In March, we </span><a href="http://google-opensource.blogspot.com/2013/03/taking-stand-on-open-source-and-patents.html" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">announced</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> an Open Patent Non-Assertion (OPN) Pledge—committing not to sue any user, distributor or developer of open-source software on </span><a href="http://www.google.com/patents/opnpledge/patents/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">specified patents</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, unless first attacked. Our goal was to encourage pro-competitive, defensive uses of patents to support open-source innovation.</span></div><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Today we are pleased to expand the OPN Pledge to include an additional 79 patents. These patents cover software used to efficiently operate data centers, including middleware, distributed storage management, distributed database management, and alarm monitoring.</span></div><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">We acquired these patents from </span><a href="http://www.ibm.com/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">IBM</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> and </span><a href="http://www.ca.com/us/default.aspx" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">CA Technologies</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, companies that in 2005 were </span><a href="http://www.arnnet.com.au/article/139603/ca_opens_access_14_patents_announces_deal_ibm/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">among the first to make open-source patent pledges</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. The goal of the patent system is to foster innovation, and we aim to use patents, whether acquired or developed internally, in support of that goal.</span></div><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">You can learn more about this second group of patents and the Pledge itself on </span><a href="http://www.google.com/patents/opnpledge/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">our site</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, which we’ve also updated to make it easier to browse and download data on pledged patents.</span></div><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">To date, the patents we’ve included in the Pledge</span><span style="color: yellow; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">have generally related to “back-end” technologies: servers, data centers, and the like. But open-source software is also transforming the development of consumer products that people use every day—so stay tuned for additional extensions to patents covering those sorts of technologies.</span></div><div><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div></span></b><br />]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/more-patents-in-the-service-of-open-source-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Dude, where’s my phone? Simple steps to protect your Android device this summer.</title>
		<link>https://googledata.org/google-public-policy/dude-wheres-my-phone-simple-steps-to-protect-your-android-device-this-summer-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=dude-wheres-my-phone-simple-steps-to-protect-your-android-device-this-summer-2</link>
		<comments>https://googledata.org/google-public-policy/dude-wheres-my-phone-simple-steps-to-protect-your-android-device-this-summer-2/#comments</comments>
		<pubDate>Fri, 02 Aug 2013 21:11:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=6da9a34d784ef28801511d693b846a2e</guid>
		<description><![CDATA[<span>Posted by Adrian Ludwig, Android Security Engineer</span><br /><i><br /></i><i>This summer we&#8217;re <a href="http://googleblog.blogspot.com/search/label/security%20and%20safety%20tips">posting regularly</a> with privacy and security tips. Knowing how to stay safe and secure online is important, which is why we created our Good to Know site with advice and tips for safe and savvy Internet use.</i> -Ed.<br /><br />With summer vacation in full swing, you&#8217;re likely out and about, using your smartphone or tablet to get answers on the go or check out the latest cool apps and games. But you don&#8217;t have to leave safety at home! In this post, we&#8217;re sharing a few tips and tools that you can easily set up if you&#8217;re on an Android phone or tablet to keep your device&#8212;and the contents inside&#8212;safe and secure, including a new service that makes it easy to locate a misplaced device.<br /><b><br /></b><b>1. Lock your device screen. </b>Whether you&#8217;re on a phone or a tablet, it&#8217;s easy to set up a <a href="http://support.google.com/nexus/4/answer/2819522">screen lock</a>. This is important to do in case your device gets left in the back of a car, or you&#8217;re worried about someone picking up your phone and scrolling through your stuff. You can lock your device with a pin, password, pattern (or even <a href="http://www.youtube.com/watch?v=5l4D2tn_-kQ">your face</a>!) by going to Settings &#62; Personal &#62; Security &#62; Screen Lock.<br /><br /><div><a href="http://3.bp.blogspot.com/-JqKMEYHEfjY/UfvZcNdwbII/AAAAAAAAM2c/JDPO2Uke1LU/s1600/ScreenLock.png"><img border="0" src="http://3.bp.blogspot.com/-JqKMEYHEfjY/UfvZcNdwbII/AAAAAAAAM2c/JDPO2Uke1LU/s320/ScreenLock.png" height="320" width="191"></a></div><b><br /></b><b>2. Protect your phone from suspicious apps. </b>We automatically scan Google Play to block and remove harmful apps. That makes Google Play the safest place to get Android apps. But Google Play can also help <a href="https://support.google.com/accounts/answer/2812853?hl=en">protect you</a> even for apps you get elsewhere, like the web or a third-party app store. The first time you start to install an app from an unknown source, a message will pop up asking if you&#8217;d like Google to scan the file to make sure it&#8217;s not harmful. Tap &#8220;OK&#8221; to let Google help protect you from harmful apps.<br /><b><br /></b><b>3. Locate, ring and wipe a misplaced device. </b>Have you ever lost your phone in between the couch cushions or left it in a restaurant? Later this month, you will be able to use a new service called Android Device Manager, which can quickly ring your phone at maximum volume so you can find it (even if it&#8217;s been silenced), or locate it on a map, in real time, using Android Device Manager. If your phone can&#8217;t be recovered, or has been stolen, you can quickly and securely erase all of the data on your device to keep your data from ending up in the wrong hands. The Android Device Manager will be available for devices running Android 2.2 and above, as part of Google Play. You can read the full announcement on the Android blog.   <br /><br /><div><a href="http://3.bp.blogspot.com/-vlpwxPkUYzw/UfvZcOz4XeI/AAAAAAAAM2Y/bGYqGe88P3A/s1600/blogpost.png"><img border="0" src="http://3.bp.blogspot.com/-vlpwxPkUYzw/UfvZcOz4XeI/AAAAAAAAM2Y/bGYqGe88P3A/s400/blogpost.png" height="180" width="400"></a></div><br />For more advice on how to protect yourself and your family online, visit our <a href="http://www.google.com/goodtoknow/">Good to Know site</a>, and stay tuned for more posts in our security series.  <br /><br />]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Adrian Ludwig, Android Security Engineer</span><br /><i><br /></i><i>This summer we’re <a href="http://googleblog.blogspot.com/search/label/security%20and%20safety%20tips">posting regularly</a> with privacy and security tips. Knowing how to stay safe and secure online is important, which is why we created our Good to Know site with advice and tips for safe and savvy Internet use.</i> -Ed.<br /><br />With summer vacation in full swing, you’re likely out and about, using your smartphone or tablet to get answers on the go or check out the latest cool apps and games. But you don’t have to leave safety at home! In this post, we’re sharing a few tips and tools that you can easily set up if you’re on an Android phone or tablet to keep your device—and the contents inside—safe and secure, including a new service that makes it easy to locate a misplaced device.<br /><b><br /></b><b>1. Lock your device screen. </b>Whether you’re on a phone or a tablet, it’s easy to set up a <a href="http://support.google.com/nexus/4/answer/2819522">screen lock</a>. This is important to do in case your device gets left in the back of a car, or you’re worried about someone picking up your phone and scrolling through your stuff. You can lock your device with a pin, password, pattern (or even <a href="http://www.youtube.com/watch?v=5l4D2tn_-kQ">your face</a>!) by going to Settings &gt; Personal &gt; Security &gt; Screen Lock.<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/-JqKMEYHEfjY/UfvZcNdwbII/AAAAAAAAM2c/JDPO2Uke1LU/s1600/ScreenLock.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-JqKMEYHEfjY/UfvZcNdwbII/AAAAAAAAM2c/JDPO2Uke1LU/s320/ScreenLock.png" height="320" width="191" /></a></div><b><br /></b><b>2. Protect your phone from suspicious apps. </b>We automatically scan Google Play to block and remove harmful apps. That makes Google Play the safest place to get Android apps. But Google Play can also help <a href="https://support.google.com/accounts/answer/2812853?hl=en">protect you</a> even for apps you get elsewhere, like the web or a third-party app store. The first time you start to install an app from an unknown source, a message will pop up asking if you’d like Google to scan the file to make sure it’s not harmful. Tap “OK” to let Google help protect you from harmful apps.<br /><b><br /></b><b>3. Locate, ring and wipe a misplaced device. </b>Have you ever lost your phone in between the couch cushions or left it in a restaurant? Later this month, you will be able to use a new service called Android Device Manager, which can quickly ring your phone at maximum volume so you can find it (even if it’s been silenced), or locate it on a map, in real time, using Android Device Manager. If your phone can’t be recovered, or has been stolen, you can quickly and securely erase all of the data on your device to keep your data from ending up in the wrong hands. The Android Device Manager will be available for devices running Android 2.2 and above, as part of Google Play. You can read the full announcement on the Android blog.   <br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/-vlpwxPkUYzw/UfvZcOz4XeI/AAAAAAAAM2Y/bGYqGe88P3A/s1600/blogpost.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-vlpwxPkUYzw/UfvZcOz4XeI/AAAAAAAAM2Y/bGYqGe88P3A/s400/blogpost.png" height="180" width="400" /></a></div><br />For more advice on how to protect yourself and your family online, visit our <a href="http://www.google.com/goodtoknow/">Good to Know site</a>, and stay tuned for more posts in our security series.  <br /><br />]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/dude-wheres-my-phone-simple-steps-to-protect-your-android-device-this-summer-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Increasing Online Awareness of Mental Health Services</title>
		<link>https://googledata.org/uncategorized/increasing-online-awareness-of-mental-health-services/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=increasing-online-awareness-of-mental-health-services</link>
		<comments>https://googledata.org/uncategorized/increasing-online-awareness-of-mental-health-services/#comments</comments>
		<pubDate>Tue, 16 Jul 2013 18:29:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=d95f6435bd11ec7004ae6c439189f567</guid>
		<description><![CDATA[<b><div dir="ltr"><span>Posted by Susan Molinari, Vice President, Public Policy and Government Relations</span></div><br /><span></span><div dir="ltr"><span>Nearly 45 million Americans are affected by illnesses like depression, bipolar disorder and schizophrenia. Every day, thousands of nonprofit organizations across the country are providing critical life-saving assistance for people who increasingly turn to online communities for help. </span></div><br /><span></span><div dir="ltr"><span>On Wednesday, Google, Twitter and Facebook are joining</span><a href="http://www.mentalhealth.gov/"><span> </span><span>the national conversation about mental health</span></a><span> in the United States and will host a training session for mental health organizations - both large and small - about how to use social media platforms to raise awareness and create new avenues for public discussion. The presentations will include best practices for setting up organizational accounts, building communities of followers, conducting outreach, integrating multimedia, and measuring success.</span></div><br /><span></span><div dir="ltr"><span>The training session will be hosted in Google&#8217;s Washington DC office from 1:30 - 3:30 pm.  Attendees can</span><a href="https://docs.google.com/a/google.com/forms/d/1rLr6xsDH7_WHQAuw1nyKAFuX9yl5GW9uAuwxKuwxmSk/viewform"><span> </span><span>register</span></a><span> to join the event or watch the</span><a href="http://www.youtube.com/watch?v=xxzpE9B5ICI"><span> </span><span>livestream on YouTube</span></a><span>.</span></div></b>]]></description>
				<content:encoded><![CDATA[<b id="docs-internal-guid-44b66307-e8b7-d366-52e9-2fb3fae6f762"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Posted by Susan Molinari, Vice President, Public Policy and Government Relations</span></div><br /><span style="font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Nearly 45 million Americans are affected by illnesses like depression, bipolar disorder and schizophrenia. Every day, thousands of nonprofit organizations across the country are providing critical life-saving assistance for people who increasingly turn to online communities for help. </span></div><br /><span style="font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">On Wednesday, Google, Twitter and Facebook are joining</span><a href="http://www.mentalhealth.gov/" style="text-decoration: none;"><span style="color: black; font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-family: Arial; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">the national conversation about mental health</span></a><span style="font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> in the United States and will host a training session for mental health organizations - both large and small - about how to use social media platforms to raise awareness and create new avenues for public discussion. The presentations will include best practices for setting up organizational accounts, building communities of followers, conducting outreach, integrating multimedia, and measuring success.</span></div><br /><span style="font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">The training session will be hosted in Google’s Washington DC office from 1:30 - 3:30 pm.  Attendees can</span><a href="https://docs.google.com/a/google.com/forms/d/1rLr6xsDH7_WHQAuw1nyKAFuX9yl5GW9uAuwxKuwxmSk/viewform" style="text-decoration: none;"><span style="color: black; font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-family: Arial; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">register</span></a><span style="font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> to join the event or watch the</span><a href="http://www.youtube.com/watch?v=xxzpE9B5ICI" style="text-decoration: none;"><span style="color: black; font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-family: Arial; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">livestream on YouTube</span></a><span style="font-family: Arial; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">.</span></div></b>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/increasing-online-awareness-of-mental-health-services/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Ad Networks Agree on Industry Best Practices to Combat Piracy and Counterfeiting</title>
		<link>https://googledata.org/uncategorized/ad-networks-agree-on-industry-best-practices-to-combat-piracy-and-counterfeiting/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ad-networks-agree-on-industry-best-practices-to-combat-piracy-and-counterfeiting</link>
		<comments>https://googledata.org/uncategorized/ad-networks-agree-on-industry-best-practices-to-combat-piracy-and-counterfeiting/#comments</comments>
		<pubDate>Mon, 15 Jul 2013 12:09:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=9f2b774b6d471c972b71f40ee2e98a93</guid>
		<description><![CDATA[<b><span><div dir="ltr"><span>Posted by Susan Molinari, Vice President, Public Policy and Government Relations</span></div><div dir="ltr"><span><br /></span></div><div dir="ltr"><b><span></span></b></div><div dir="ltr"><b><span><b></b></span></b></div><div dir="ltr"><b><span><b><span>With more than</span><a href="http://insidesearch.blogspot.com/2013/03/billions-of-times-day-in-blink-of-eye.html"><span> </span><span>30 trillion individual pages</span></a><span> on the web, online piracy and counterfeit remains a challenge. Google takes that challenge seriously. Using cutting-edge technology like</span><a href="http://www.youtube.com/t/contentid"><span> </span><span>YouTube&#8217;s Content ID</span></a><span> and innovative copyright removal tools for</span><a href="http://googlepublicpolicy.blogspot.com/2011/09/making-copyright-work-better-online.html"><span> </span><span>Web Search</span></a><span>, we develop and deploy antipiracy solutions with the support of hundreds of Google employees. &#160;In addition to developing legitimate, innovative, and convenient content offerings (such as</span><a href="https://play.google.com/%E2%80%8E"><span> </span><span>Google Play</span></a><span> and</span><a href="http://www.youtube.com/"><span> </span><span>YouTube</span></a><span>, through which our partners together generate hundreds of millions of dollars), we continue to develop solutions to help fight piracy and counterfeit online. We think one of the most effective ways to do this is to cut off the money supply to rogue sites that specialize in piracy or counterfeiting. To that end, in 2012 we disabled ad serving to 46,000 sites for violating our policies on copyright infringing content and shut down more than 82,000 accounts for attempting to advertise counterfeit goods. Nearly 99% of our account suspensions were discovered through our own detection efforts and risk models. &#160;</span></b></span></b></div><br /><br /><div dir="ltr"><b><span></span></b></div><div dir="ltr"><b><span><b></b></span></b></div><div dir="ltr"><b><span><b><span>There's always more that can be done by the industry to starve these infringing sites of advertising revenues. Today, working with the</span><a href="http://www.whitehouse.gov/omb/intellectualproperty"><span> </span><span>White House&#8217;s Office of the U.S. Intellectual Property Enforcement Coordinator (IPEC)</span></a><span>, the</span><a href="http://www.iab.net/"><span> </span><span>Interactive Advertising Bureau (IAB)</span></a><span>, and other leading ad networks, we are pleased to participate in a set of voluntary</span><a href="http://www.2013ippractices.com/bestpracticesguidelinesforadnetworkstoaddresspiracyandcounterfeiting.html"><span> </span><span>Best Practices and Guidelines for Ad Networks to Address Piracy and Counterfeiting</span></a><span>. &#160;Under these best practices, Ad Networks will maintain and post policies prohibiting websites that are principally dedicated to selling counterfeit goods or engaging in copyright piracy from participating in the Ad Network&#8217;s advertising programs. By working across the industry, these best practices should help reduce the financial incentives for pirate sites by cutting off their revenue supply while maintaining a healthy Internet and promoting innovation. &#160;</span></b></span></b></div><br /><br /><div><span><br /></span></div></span></b><br />]]></description>
				<content:encoded><![CDATA[<b id="docs-internal-guid-425913df-e45b-29f3-f4f1-e8332e6f1740"><span style="font-family: Arial, Helvetica, sans-serif;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Posted by Susan Molinari, Vice President, Public Policy and Government Relations</span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-425913df-e45b-29f3-f4f1-e8332e6f1740"><span style="font-family: Arial, Helvetica, sans-serif;"></span></b></div><div dir="ltr" style="display: inline !important; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-425913df-e45b-29f3-f4f1-e8332e6f1740"><span style="font-family: Arial, Helvetica, sans-serif;"><b id="docs-internal-guid-425913df-e45b-29f3-f4f1-e8332e6f1740"></b></span></b></div><div dir="ltr" style="display: inline !important; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-425913df-e45b-29f3-f4f1-e8332e6f1740"><span style="font-family: Arial, Helvetica, sans-serif;"><b id="docs-internal-guid-425913df-e45b-29f3-f4f1-e8332e6f1740"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">With more than</span><a href="http://insidesearch.blogspot.com/2013/03/billions-of-times-day-in-blink-of-eye.html" style="text-decoration: none;"><span style="color: black; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">30 trillion individual pages</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> on the web, online piracy and counterfeit remains a challenge. Google takes that challenge seriously. Using cutting-edge technology like</span><a href="http://www.youtube.com/t/contentid" style="text-decoration: none;"><span style="color: black; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">YouTube’s Content ID</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> and innovative copyright removal tools for</span><a href="http://googlepublicpolicy.blogspot.com/2011/09/making-copyright-work-better-online.html" style="text-decoration: none;"><span style="color: black; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Web Search</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, we develop and deploy antipiracy solutions with the support of hundreds of Google employees. &nbsp;In addition to developing legitimate, innovative, and convenient content offerings (such as</span><a href="https://play.google.com/%E2%80%8E" style="text-decoration: none;"><span style="color: black; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google Play</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> and</span><a href="http://www.youtube.com/" style="text-decoration: none;"><span style="color: black; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">YouTube</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, through which our partners together generate hundreds of millions of dollars), we continue to develop solutions to help fight piracy and counterfeit online. We think one of the most effective ways to do this is to cut off the money supply to rogue sites that specialize in piracy or counterfeiting. To that end, in 2012 we disabled ad serving to 46,000 sites for violating our policies on copyright infringing content and shut down more than 82,000 accounts for attempting to advertise counterfeit goods. Nearly 99% of our account suspensions were discovered through our own detection efforts and risk models. &nbsp;</span></b></span></b></div><br /><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-425913df-e45b-29f3-f4f1-e8332e6f1740"><span style="font-family: Arial, Helvetica, sans-serif;"></span></b></div><div dir="ltr" style="display: inline !important; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-425913df-e45b-29f3-f4f1-e8332e6f1740"><span style="font-family: Arial, Helvetica, sans-serif;"><b id="docs-internal-guid-425913df-e45b-29f3-f4f1-e8332e6f1740"></b></span></b></div><div dir="ltr" style="display: inline !important; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-425913df-e45b-29f3-f4f1-e8332e6f1740"><span style="font-family: Arial, Helvetica, sans-serif;"><b id="docs-internal-guid-425913df-e45b-29f3-f4f1-e8332e6f1740"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">There's always more that can be done by the industry to starve these infringing sites of advertising revenues. Today, working with the</span><a href="http://www.whitehouse.gov/omb/intellectualproperty" style="text-decoration: none;"><span style="color: black; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">White House’s Office of the U.S. Intellectual Property Enforcement Coordinator (IPEC)</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, the</span><a href="http://www.iab.net/" style="text-decoration: none;"><span style="color: black; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Interactive Advertising Bureau (IAB)</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, and other leading ad networks, we are pleased to participate in a set of voluntary</span><a href="http://www.2013ippractices.com/bestpracticesguidelinesforadnetworkstoaddresspiracyandcounterfeiting.html" style="text-decoration: none;"><span style="color: black; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Best Practices and Guidelines for Ad Networks to Address Piracy and Counterfeiting</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. &nbsp;Under these best practices, Ad Networks will maintain and post policies prohibiting websites that are principally dedicated to selling counterfeit goods or engaging in copyright piracy from participating in the Ad Network’s advertising programs. By working across the industry, these best practices should help reduce the financial incentives for pirate sites by cutting off their revenue supply while maintaining a healthy Internet and promoting innovation. &nbsp;</span></b></span></b></div><br /><br /><div><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div></span></b><br />]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/ad-networks-agree-on-industry-best-practices-to-combat-piracy-and-counterfeiting/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Securing your WiFi network</title>
		<link>https://googledata.org/uncategorized/securing-your-wifi-network-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=securing-your-wifi-network-2</link>
		<comments>https://googledata.org/uncategorized/securing-your-wifi-network-2/#comments</comments>
		<pubDate>Thu, 27 Jun 2013 15:03:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=8446ee3ab194138b1bcc3d61e996d8b3</guid>
		<description><![CDATA[<span><span>Posted by John Munoz, Technical Program Manager</span>&#160;</span><br /><i><span><br /></span></i><span><i>This post is part of a regular series of privacy and security tips to help you and your family stay safe and secure online. Privacy and security are important topics&#8212;they matter to us, and they matter to you. Building on our Good to Know site with advice for safe and savvy Internet use, we hope this information helps you understand the choices and control that you have over your online information. </i> -Ed.&#160;</span><br /><span><br /></span><span>More than a quarter of Internet users worldwide <a href="http://www.businesswire.com/news/home/20120404006331/en/Strategy-Analytics-Quarter-Households-Worldwide-Wireless-Home">use WiFi at home</a> to connect to the web, but many aren't sure how to protect their home network, or why it is important to do so. The best way to think of your home WiFi network is to think of it like your front door: you want a strong lock on both to ensure your safety and security.&#160;</span><br /><span><br /></span><span>When data is in transit over an unsecured WiFi network, the information you&#8217;re sending or receiving could be intercepted by someone nearby. Your neighbors might also be able to use the network for their own Internet activities, which might slow down your connection. Securing your network can help keep your information safe when you&#8217;re connecting wirelessly, and can also help protect the devices that are connected to your network.&#160;</span><br /><br /><span>If you&#8217;re interested in improving your home WiFi security, the steps below can help make your home network safer.&#160;</span><br /><br /><span><b>1. Check to see what kind of home WiFi security you already have. </b>Do your friends need to enter a password to get on your network when they visit your house for the first time and ask to use your WiFi? If they don&#8217;t, your network isn&#8217;t as secure as it could be. Even if they do need to enter a password, there are a few different methods of securing your network, and some are better than others. Check what kind of security you have for your network at home by looking at your WiFi settings. Your network will likely either be unsecured, or secured with WEP, WPA or WPA2. WEP is the oldest wireless security protocol, and it&#8217;s pretty weak. WPA is better than WEP, but WPA2 is best.&#160;</span><br /><br /><span><b>2. Change your network security settings to WPA2.</b>Your wireless router is the machine that creates the WiFi network. If you don&#8217;t have your home network secured with WPA2, you&#8217;ll need to access your router&#8217;s settings page to make the change. You can check your router&#8217;s user manual to figure out how to access this page, or look for instructions online for your specific router. Any device with a WiFi trademark sold since 2006 is required to support WPA2. If you have a router that was made before then, we suggest upgrading to a new router that does offer WPA2. It&#8217;s safer and can be much faster.</span><br /><b><span><br /></span></b><span><b>3. Create a strong password for your WiFi network.</b>To secure your network with WPA2, you&#8217;ll need to create a password. It&#8217;s important that you <a href="http://googleblog.blogspot.com/2013/05/helping-passwords-better-protect-you.html">choose a unique password</a>, with a long mix of numbers, letters and symbols so others can&#8217;t easily guess it. If you&#8217;re in a private space such as your home, it&#8217;s OK to write this password down so you can remember it, and keep it somewhere safe so you don&#8217;t lose it. You might also need it handy in case your friends come to visit and want to connect to the Internet via your network. Just like you wouldn&#8217;t give a stranger a key to your house, you should only give your WiFi password to people you trust.&#160;</span><br /><b><span><br /></span></b><span><b>4. Secure your router too, so nobody can change your settings.</b>Your router needs its own password, separate from the password you use to secure your network. Routers come without a password, or if they do have one, it&#8217;s a simple default password that many online criminals may already know. If you don&#8217;t reset your router password, criminals anywhere in the world have an easy way to launch an attack on your network, the data shared on it and the computers connected to your network. For many routers, you can reset the password from the router settings page. Keep this password to yourself, and make it different from the one you use to connect to the WiFi network (as described in step 3). If you make these passwords the same, then anyone who has the password to connect to your network will also be able to change your wireless router settings.&#160;</span><br /><span><br /></span><span>&#160;<b>5. If you need help, look up the instructions.</b>If you&#8217;ve misplaced your router&#8217;s manual, type the model number of your base station or router into a search engine&#8212;in many cases the info is available online. Otherwise, contact the company that manufactured the router or your Internet Service Provider for assistance.  Please check out the video below to learn more about the simple but important steps you can take to improve the security of your Internet browsing.</span><br /><span><br /></span><span>&#160;  </span><br /><span><br /></span><span>For more advice on how to protect yourself and your family online, visit our <a href="http://www.google.com/goodtoknow/">Good to Know site</a>, and stay tuned for more posts in our security series. </span>]]></description>
				<content:encoded><![CDATA[<span style="font-family: Arial, Helvetica, sans-serif;"><span class="byline-author">Posted by John Munoz, Technical Program Manager</span>&nbsp;</span><br /><i><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></i><span style="font-family: Arial, Helvetica, sans-serif;"><i>This post is part of a regular series of privacy and security tips to help you and your family stay safe and secure online. Privacy and security are important topics—they matter to us, and they matter to you. Building on our Good to Know site with advice for safe and savvy Internet use, we hope this information helps you understand the choices and control that you have over your online information. </i> -Ed.&nbsp;</span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">More than a quarter of Internet users worldwide <a href="http://www.businesswire.com/news/home/20120404006331/en/Strategy-Analytics-Quarter-Households-Worldwide-Wireless-Home">use WiFi at home</a> to connect to the web, but many aren't sure how to protect their home network, or why it is important to do so. The best way to think of your home WiFi network is to think of it like your front door: you want a strong lock on both to ensure your safety and security.&nbsp;</span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">When data is in transit over an unsecured WiFi network, the information you’re sending or receiving could be intercepted by someone nearby. Your neighbors might also be able to use the network for their own Internet activities, which might slow down your connection. Securing your network can help keep your information safe when you’re connecting wirelessly, and can also help protect the devices that are connected to your network.&nbsp;</span><br /><br /><span style="font-family: Arial, Helvetica, sans-serif;">If you’re interested in improving your home WiFi security, the steps below can help make your home network safer.&nbsp;</span><br /><br /><span style="font-family: Arial, Helvetica, sans-serif;"><b>1. Check to see what kind of home WiFi security you already have. </b>Do your friends need to enter a password to get on your network when they visit your house for the first time and ask to use your WiFi? If they don’t, your network isn’t as secure as it could be. Even if they do need to enter a password, there are a few different methods of securing your network, and some are better than others. Check what kind of security you have for your network at home by looking at your WiFi settings. Your network will likely either be unsecured, or secured with WEP, WPA or WPA2. WEP is the oldest wireless security protocol, and it’s pretty weak. WPA is better than WEP, but WPA2 is best.&nbsp;</span><br /><br /><span style="font-family: Arial, Helvetica, sans-serif;"><b>2. Change your network security settings to WPA2.</b>Your wireless router is the machine that creates the WiFi network. If you don’t have your home network secured with WPA2, you’ll need to access your router’s settings page to make the change. You can check your router’s user manual to figure out how to access this page, or look for instructions online for your specific router. Any device with a WiFi trademark sold since 2006 is required to support WPA2. If you have a router that was made before then, we suggest upgrading to a new router that does offer WPA2. It’s safer and can be much faster.</span><br /><b><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><span style="font-family: Arial, Helvetica, sans-serif;"><b>3. Create a strong password for your WiFi network.</b>To secure your network with WPA2, you’ll need to create a password. It’s important that you <a href="http://googleblog.blogspot.com/2013/05/helping-passwords-better-protect-you.html">choose a unique password</a>, with a long mix of numbers, letters and symbols so others can’t easily guess it. If you’re in a private space such as your home, it’s OK to write this password down so you can remember it, and keep it somewhere safe so you don’t lose it. You might also need it handy in case your friends come to visit and want to connect to the Internet via your network. Just like you wouldn’t give a stranger a key to your house, you should only give your WiFi password to people you trust.&nbsp;</span><br /><b><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b><span style="font-family: Arial, Helvetica, sans-serif;"><b>4. Secure your router too, so nobody can change your settings.</b>Your router needs its own password, separate from the password you use to secure your network. Routers come without a password, or if they do have one, it’s a simple default password that many online criminals may already know. If you don’t reset your router password, criminals anywhere in the world have an easy way to launch an attack on your network, the data shared on it and the computers connected to your network. For many routers, you can reset the password from the router settings page. Keep this password to yourself, and make it different from the one you use to connect to the WiFi network (as described in step 3). If you make these passwords the same, then anyone who has the password to connect to your network will also be able to change your wireless router settings.&nbsp;</span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">&nbsp;<b>5. If you need help, look up the instructions.</b>If you’ve misplaced your router’s manual, type the model number of your base station or router into a search engine—in many cases the info is available online. Otherwise, contact the company that manufactured the router or your Internet Service Provider for assistance.  Please check out the video below to learn more about the simple but important steps you can take to improve the security of your Internet browsing.</span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">&nbsp;  <iframe allowfullscreen="" frameborder="0" height="360" src="http://www.youtube.com/embed/_WHynHcXm7c" width="640"></iframe></span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">For more advice on how to protect yourself and your family online, visit our <a href="http://www.google.com/goodtoknow/">Good to Know site</a>, and stay tuned for more posts in our security series. </span>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/securing-your-wifi-network-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Transparency Report: Making the web a safer place</title>
		<link>https://googledata.org/uncategorized/transparency-report-making-the-web-a-safer-place-3/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=transparency-report-making-the-web-a-safer-place-3</link>
		<comments>https://googledata.org/uncategorized/transparency-report-making-the-web-a-safer-place-3/#comments</comments>
		<pubDate>Tue, 25 Jun 2013 15:05:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=5bdf34a17f863649c5266dbf3fe451d8</guid>
		<description><![CDATA[<span><div dir="ltr"><span><span><span><span><span>P</span><span>osted by Lucas Ballard, Software Engineer</span></span></span></span></span></div></span><b><span><span><br /></span></span></b><b><span><span>Two of the biggest threats online are malicious software (known as malware) that can take control of your computer, and phishing scams that try to trick you into sharing passwords or other private information.</span></span></b><br /><b><span><br /><span></span></span><div dir="ltr"><span><span>So in 2006 we started a</span><a href="http://googleonlinesecurity.blogspot.com/2012/06/safe-browsing-protecting-web-users-for.html"><span> </span><span>Safe Browsing program</span></a><span> to find and flag suspect websites. This means that when you are surfing the web, we can now warn you when a site is unsafe. We're currently flagging up to 10,000 sites a day--and because we share this technology with other browsers there are about 1 billion users we can help keep safe.</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>But we're always looking for new ways to protect users' security. So today we're launching a new section on our</span><a href="http://www.google.com/transparencyreport/"><span> </span><span>Transparency Report</span></a><span> that will shed more light on the sources of malware and phishing attacks. &#160;You can now learn how many people see Safe Browsing warnings each week, where malicious sites are hosted around the world, how quickly websites become reinfected after their owners clean malware from their sites, and other tidbits we&#8217;ve surfaced.</span></span></div><div dir="ltr"><span><span><br /></span></span></div><span><br /></span><div><b><span><img height="278px;" src="https://lh5.googleusercontent.com/2PTjed9m2hujV4h2xgLBULNhPjJ5LRxXXdBCc-hMx05LbZl9hTySD_H1KndaYu4RpwsXuOtHrpN76fQuWqNRMsVIVS5GFSuminLcJ8leLqaXHsr5qFIqDhLW" width="483px;"></span></b></div><span><span></span><span></span></span><div dir="ltr"><span><span><br /></span></span></div><div dir="ltr"><span><span>Sharing this information also aligns well with our Transparency Report, which already gives information about government requests for user data, government requests to remove content, and current disruptions to our services.</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>To learn more, explore the new Safe Browsing information on </span><a href="http://www.google.com/transparencyreport/safebrowsing"><span>this page</span></a><span>. Webmasters and network administrators can find recommendations for dealing with malware infections, including resources like</span><a href="http://www.google.com/webmasters/tools/"><span> </span><span>Google Webmaster Tools</span></a><span> and</span><a href="http://www.google.com/safebrowsing/alerts/"><span> </span><span>Safe Browsing Alerts for Network Administrators</span></a><span>.</span></span></div><div><span><br /></span></div></b>]]></description>
				<content:encoded><![CDATA[<span id="docs-internal-guid-7c31e7b1-7b90-0991-23ff-06121fb44175"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt;"><span id="docs-internal-guid-7c31e7b1-7b8e-df6d-8cc1-369c259f70dc"><span style="background-color: white; vertical-align: baseline;"><span id="docs-internal-guid-7c31e7b1-7b90-0991-23ff-06121fb44175" style="background-color: transparent;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="vertical-align: baseline;">P</span><span style="color: #222222; line-height: 1.15; vertical-align: baseline; white-space: pre-wrap;">osted by Lucas Ballard, Software Engineer</span></span></span></span></span></div></span><b style="line-height: 1.15;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></b><b style="line-height: 1.15;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Two of the biggest threats online are malicious software (known as malware) that can take control of your computer, and phishing scams that try to trick you into sharing passwords or other private information.</span></span></b><br /><b id="docs-internal-guid-7c31e7b1-7b8e-df6d-8cc1-369c259f70dc"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">So in 2006 we started a</span><a href="http://googleonlinesecurity.blogspot.com/2012/06/safe-browsing-protecting-web-users-for.html"><span style="background-color: white; color: #222222; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: white; color: #1155cc; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Safe Browsing program</span></a><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> to find and flag suspect websites. This means that when you are surfing the web, we can now warn you when a site is unsafe. We're currently flagging up to 10,000 sites a day--and because we share this technology with other browsers there are about 1 billion users we can help keep safe.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">But we're always looking for new ways to protect users' security. So today we're launching a new section on our</span><a href="http://www.google.com/transparencyreport/" style="text-decoration: none;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: white; color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Transparency Report</span></a><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> that will shed more light on the sources of malware and phishing attacks. &nbsp;You can now learn how many people see Safe Browsing warnings each week, where malicious sites are hosted around the world, how quickly websites become reinfected after their owners clean malware from their sites, and other tidbits we’ve surfaced.</span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><div style="text-align: center;"><b id="docs-internal-guid-7c31e7b1-7b8e-df6d-8cc1-369c259f70dc"><span style="font-family: Arial, Helvetica, sans-serif;"><img height="278px;" src="https://lh5.googleusercontent.com/2PTjed9m2hujV4h2xgLBULNhPjJ5LRxXXdBCc-hMx05LbZl9hTySD_H1KndaYu4RpwsXuOtHrpN76fQuWqNRMsVIVS5GFSuminLcJ8leLqaXHsr5qFIqDhLW" width="483px;" /></span></b></div><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Sharing this information also aligns well with our Transparency Report, which already gives information about government requests for user data, government requests to remove content, and current disruptions to our services.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">To learn more, explore the new Safe Browsing information on </span><a href="http://www.google.com/transparencyreport/safebrowsing" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">this page</span></a><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. Webmasters and network administrators can find recommendations for dealing with malware infections, including resources like</span><a href="http://www.google.com/webmasters/tools/" style="text-decoration: none;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: white; color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google Webmaster Tools</span></a><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> and</span><a href="http://www.google.com/safebrowsing/alerts/" style="text-decoration: none;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: white; color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Safe Browsing Alerts for Network Administrators</span></a><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">.</span></span></div><div><span style="background-color: white; color: #222222; font-family: Arial; font-size: 13px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div></b>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/transparency-report-making-the-web-a-safer-place-3/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>America’s businesses are growing. The web is helping.</title>
		<link>https://googledata.org/uncategorized/americas-businesses-are-growing-the-web-is-helping-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=americas-businesses-are-growing-the-web-is-helping-2</link>
		<comments>https://googledata.org/uncategorized/americas-businesses-are-growing-the-web-is-helping-2/#comments</comments>
		<pubDate>Thu, 20 Jun 2013 18:03:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=885877fec51db2ca0d350c83f2933d91</guid>
		<description><![CDATA[<span>Posted by&#160;<b><span>Allan Thygesen, Vice President, Global SMB Sales</span></b></span><br /><b><span><span><br /></span></span></b><b><span><span><i>(Cross-posted from the <a href="http://googleblog.blogspot.com/2013/06/americas-businesses-are-growing-web-is.html">Official Google Blog)</a></i> </span></span></b><br /><b><span><span><br /></span></span></b><b></b><br /><div dir="ltr"><b><span><span>Michael Edlavitch was a middle school math teacher in Minnesota when he started a website with free math games to engage his students. With free online tools, a passion for math and an initial investment of just $10 to register his domain, </span><a href="http://www.hoodamath.com/"><span>www.hoodamath.com</span></a><span> was born. Eventually Michael&#8217;s website became popular with more than just his students. So Michael gave </span><a href="http://www.google.com/adsense/start/"><span>Google AdSense</span></a><span> a try as a way to earn money by placing ads next to his content. As word spread and traffic grew, the revenue generated from his site allowed Michael to devote himself full time to Hooda Math. Today, www.hoodamath.com has more than 350 educational games and has had more than 100 million unique visitors to the site. Beyond building a business for himself, Michael is helping students everywhere learn math while having fun. </span></span></b></div><b><span><br /><span></span></span><div dir="ltr"><span><span>Over in New York, Roberto Gil designs and builds children&#8217;s furniture&#8212;loft beds, bunk beds and entire custom rooms. </span><a href="http://www.casakids.com/"><span>Casa Kids</span></a><span>&#8217; furniture is custom designed for the family to grow along with the child. </span><span>Roberto works out of his Brooklyn workshop and doesn&#8217;t sell to large furniture stores, which means the Casa Kids website is an essential tool for him to connect with potential customers.To grow even further, Roberto began using </span><span><a href="http://www.google.com/ads/compare/?utm_source=awx&#38;utm_medium=ot&#38;utm_campaign=us-en-ot-awx-q213-smbweek_blog">AdWords</a></span><span> in 2010. In the first few months traffic to his site went up 30 percent. Today, two-thirds of his new customers come from Google. Meet Roberto and learn more about how he is making the web work for Casa Kids:</span></span></div><span><br /><span></span></span><div dir="ltr"><span></span></div><div dir="ltr"><span><br /></span></div><span><span></span></span><div dir="ltr"><span><span>These are just two examples of how the web is working for American businesses. According to a </span><a href="http://www.mckinsey.com/insights/high_tech_telecoms_internet/internet_matters"><span>McKinsey study</span></a><span>, small businesses that make use of the web are growing twice as fast as those that are not on the web. &#160;That&#8217;s because the web is where we go for information and inspiration&#8212;from math games to practice over the summer to someone to design and build that perfect bunk bed for your kids. Ninety-seven percent of American Internet users look online for local products and services. Whether we&#8217;re on our smartphones, tablets or computers, the web helps us find what we are looking for. </span><span></span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Here at Google, we see firsthand how the web is helping American businesses grow and thrive. </span><span>Through our search and advertising programs, businesses like Casa Kids find customers, publishers like Hooda Math earn money from their content, and nonprofits solicit donations and volunteers.</span><span> </span><span>These tools are how we make money, and they&#8217;re also how millions of other U.S. businesses do, too. </span><span>&#160;</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>In 2012, Google's search and advertising tools helped provide</span><a href="http://google.com/economicimpact"><span> $94 billion of economic activity for more than 1.9 million American businesses</span></a><span>&#8212;advertisers, publishers and nonprofits. This represents a 17 percent increase from 2011. Check out the impact made in </span><a href="http://www.google.com/economicimpact"><span>each state</span></a><span>, along with stories of local businesses using the web to grow. </span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Whether it&#8217;s building skills or building furniture, Google helps to build businesses. We're thrilled to be part of such a vibrant industry and are committed to continuing to help make the web work for people and businesses everywhere.</span></span></div><div><span><br /></span></div></b>]]></description>
				<content:encoded><![CDATA[<span style="font-family: Arial, Helvetica, sans-serif;">Posted by&nbsp;<b id="docs-internal-guid-2e43a01f-62c2-e1ae-ad69-66e63f050cd5"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Allan Thygesen, Vice President, Global SMB Sales</span></b></span><br /><b><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></b><b><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><i>(Cross-posted from the <a href="http://googleblog.blogspot.com/2013/06/americas-businesses-are-growing-web-is.html">Official Google Blog)</a></i> </span></span></b><br /><b><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></b><b id="docs-internal-guid-2e43a01f-62c2-493f-88d0-50fdb7fcbabb"></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-2e43a01f-62c2-493f-88d0-50fdb7fcbabb"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Michael Edlavitch was a middle school math teacher in Minnesota when he started a website with free math games to engage his students. With free online tools, a passion for math and an initial investment of just $10 to register his domain, </span><a href="http://www.hoodamath.com/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">www.hoodamath.com</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> was born. Eventually Michael’s website became popular with more than just his students. So Michael gave </span><a href="http://www.google.com/adsense/start/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google AdSense</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> a try as a way to earn money by placing ads next to his content. As word spread and traffic grew, the revenue generated from his site allowed Michael to devote himself full time to Hooda Math. Today, www.hoodamath.com has more than 350 educational games and has had more than 100 million unique visitors to the site. Beyond building a business for himself, Michael is helping students everywhere learn math while having fun. </span></span></b></div><b id="docs-internal-guid-2e43a01f-62c2-493f-88d0-50fdb7fcbabb"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Over in New York, Roberto Gil designs and builds children’s furniture—loft beds, bunk beds and entire custom rooms. </span><a href="http://www.casakids.com/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Casa Kids</span></a><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">’ furniture is custom designed for the family to grow along with the child. </span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Roberto works out of his Brooklyn workshop and doesn’t sell to large furniture stores, which means the Casa Kids website is an essential tool for him to connect with potential customers.To grow even further, Roberto began using </span><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;"><a href="http://www.google.com/ads/compare/?utm_source=awx&amp;utm_medium=ot&amp;utm_campaign=us-en-ot-awx-q213-smbweek_blog">AdWords</a></span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> in 2010. In the first few months traffic to his site went up 30 percent. Today, two-thirds of his new customers come from Google. Meet Roberto and learn more about how he is making the web work for Casa Kids:</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/s7XPq8ilAJg" width="560"></iframe></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">These are just two examples of how the web is working for American businesses. According to a </span><a href="http://www.mckinsey.com/insights/high_tech_telecoms_internet/internet_matters" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">McKinsey study</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, small businesses that make use of the web are growing twice as fast as those that are not on the web. &nbsp;That’s because the web is where we go for information and inspiration—from math games to practice over the summer to someone to design and build that perfect bunk bed for your kids. Ninety-seven percent of American Internet users look online for local products and services. Whether we’re on our smartphones, tablets or computers, the web helps us find what we are looking for. </span><span style="font-weight: normal; text-decoration: line-through; vertical-align: baseline; white-space: pre-wrap;"></span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Here at Google, we see firsthand how the web is helping American businesses grow and thrive. </span><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Through our search and advertising programs, businesses like Casa Kids find customers, publishers like Hooda Math earn money from their content, and nonprofits solicit donations and volunteers.</span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">These tools are how we make money, and they’re also how millions of other U.S. businesses do, too. </span><span style="background-color: white; color: #444444; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">&nbsp;</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: white; color: #444444; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">In 2012, Google's search and advertising tools helped provide</span><a href="http://google.com/economicimpact" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;"> $94 billion of economic activity for more than 1.9 million American businesses</span></a><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">—advertisers, publishers and nonprofits. This represents a 17 percent increase from 2011. Check out the impact made in </span><a href="http://www.google.com/economicimpact" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">each state</span></a><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, along with stories of local businesses using the web to grow. </span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Whether it’s building skills or building furniture, Google helps to build businesses. We're thrilled to be part of such a vibrant industry and are committed to continuing to help make the web work for people and businesses everywhere.</span></span></div><div><span style="background-color: white; font-family: Arial; font-size: 15px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div></b>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/americas-businesses-are-growing-the-web-is-helping-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Combating rogue online pharmacies</title>
		<link>https://googledata.org/uncategorized/combating-rogue-online-pharmacies/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=combating-rogue-online-pharmacies</link>
		<comments>https://googledata.org/uncategorized/combating-rogue-online-pharmacies/#comments</comments>
		<pubDate>Tue, 18 Jun 2013 15:13:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=70d9e8564136dd2e41c694972b58d0f3</guid>
		<description><![CDATA[<span><b></b><br /></span><div dir="ltr"><b><span><span>Posted by </span><b><b><span>Adam Barea, Legal Director</span></b></b></span></b></div><div dir="ltr"><b><b><b><span><br /></span></b></b></b></div><div dir="ltr"><b><span><span>Editor&#8217;s note: &#160;Over the years, we have run </span><a href="http://googleblog.blogspot.com/2012/03/making-our-ads-better-for-everyone.html"><span>a</span></a><span> </span><a href="http://googleblog.blogspot.com/2012/04/inside-view-on-ads-review.html"><span>series</span></a><span> </span><a href="http://googleblog.blogspot.com/2012/06/ads-integrity-alliance-working-together.html"><span>of</span></a><span> </span><a href="http://googleblog.blogspot.com/2012/05/fight-against-scam-adsby-numbers.html"><span>blogposts</span></a><span> </span><a href="http://adwords.blogspot.com/2012/09/taking-extra-precautions-to-keep-ads.html"><span>detailing</span></a><span> </span><a href="http://adwords.blogspot.com/2013/01/ads-security-2012-retrospective.html"><span>our</span></a><span> efforts to remove bad ads from our systems, and describing </span><a href="http://googleblog.blogspot.com/2010/04/controversial-content-and-free.html"><span>our approach</span></a><span> to handling </span><a href="http://googleblog.blogspot.com/2007/11/free-expression-and-controversial.html"><span>controversial</span></a><span> content on our services. &#160;As part of this ongoing series, here&#8217;s an update on some of the ways we tackle the problem of rogue online pharmacies gaming our systems.</span></span></b></div><b><span><br /><span></span></span></b><div dir="ltr"><b><span><span>For the last several years, Google has worked closely with a number of organizations, government agencies, and businesses to combat rogue online pharmacies from all angles. &#160;</span></span></b></div><b><span><br /><span></span></span><div dir="ltr"><span><span>Collectively, we are making it increasingly difficult for these operators to effectively promote their rogue pharmacies online. A variety of websites and web services are refusing ads from suspected rogue pharmacies. Domain name registrars are removing suspect rogue pharmacies from their networks. &#160;Payment processors are blocking payments to these operators, and social networking sites are removing them from their systems too.</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>As a result, rogue pharmacies continually adapt their online marketing practices, meaning this is an ongoing battle. &#160;We wanted to share some of the steps Google takes to combat them.</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Keeping ads safe</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Making sure ads appearing on Google and our partner sites are </span><a href="http://googleblog.blogspot.com/2012/03/making-our-ads-better-for-everyone.html"><span>safe</span></a><span> continues to be a top priority. &#160;We have extremely stringent ads policies, and use sophisticated automated systems, along with some human review, to identify, block and remove ads suspected of linking to rogue pharmacies. &#160;We disrupt their marketing efforts by making it difficult for rogue pharmacies to abuse our services and evade our filters.</span></span></div><span><br /><span></span></span><ul><li><div dir="ltr"><span><span>Since 2010, we&#8217;ve only permitted U.S.-based online pharmacies accredited under the </span><a href="http://www.nabp.net/programs/accreditation/vipps"><span>National Association Boards of Pharmacy &#8220;VIPPS&#8221; program</span></a><span> to run pharma ads in our AdWords program. &#160;We were the first online search provider to require this certification - there are less than 40 VIPPS certified pharmacies operating in the U.S. </span><span></span></span></div></li></ul><ul><li><div dir="ltr"><span><span>We partner with LegitScript, an independent company with deep knowledge about online pharmacies, to conduct weekly &#8220;sweeps&#8221; of ads on Google to help ensure that we are keeping our ads safe.</span></span></div></li></ul><ul><li><div dir="ltr"><span><span>According to LegitScript, the number of illegal drug and pharmacy ads on major search engines like Google and Bing has declined by 99.9% percent since 2010.</span></span></div></li><li><div dir="ltr"><span><span>In the last two years alone, Google has blocked or removed from its systems more than 3 million ads by suspected rogue pharmacies.</span><span></span></span></div></li></ul><span><br /><span></span></span><div dir="ltr"><span><span>Search results</span><span></span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Our stance on filtering our search results is </span><a href="http://googleblog.blogspot.com/2010/04/controversial-content-and-free.html"><span>well-publicized</span></a><span>. </span><span>We do not remove content from search results except in narrow circumstances (e.g., </span><span>child sexual abuse imagery</span><span>, certain links to copyrighted material; spam; malware).</span><span> </span><span></span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Search results reflect the web and what&#8217;s online - the good and the bad. &#160;Filtering a website from search results won&#8217;t remove it from the web, or block other websites that link to that website. &#160;It's not Google's place to determine what content should be censored - that responsibility belongs with the courts and the lawmakers.</span><span></span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Google will abide by</span><span> court decisions deciding which content on the web is and is not legal</span><span>. &#160;&#160;We have always removed from our search results any page found by a legitimate court to be unlawful, whether an online rogue pharmacy or otherwise.</span><span></span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Rogue pharmacies are clearly a matter of public concern. This is why we work closely with the <a href="http://www.safemedsonline.org/">Center for Safe Internet Pharmacies</a> (&#8220;CSIP&#8221;), a 501(c)(3) organization dedicated to stopping rogue online pharmacies and keeping consumers safe on the web. &#160;If a user searches on Google for terms related to online pharmacies or buying pharmaceuticals, a prominent advertisement from CSIP will often appear on the search results page, urging caution and linking to the </span><a href="http://www.safemedsonline.org/protecting-consumers/check-your-pharmacy/"><span>LegitScript pharmacy verification tool</span></a><span>. </span></span></div><span><br /><div><b><span><img height="221px;" src="https://lh3.googleusercontent.com/nL_3AtEkmrCT8QTnDUxNE3CQZ0TpyYNwmG6VB837wsjgwMKJNAqoBudlE7gXbAOXMTW-X7ZVubpjTmb7S6VBg_nzDHjSAeiwYrr-meC56rsLIWirbF70ozMG6Q" width="616px;"></span></b></div><span></span><span></span></span><div dir="ltr"><span><span><br /></span></span></div><div dir="ltr"><span><span>CSIP&#8217;s ad campaign on Google is funded by a </span><a href="http://www.google.com/grants/"><span>Google Grant</span></a><span>, which provides non-profits like CSIP with financial and technical assistance to promote their important missions online. &#160;Campaigns like these help users to better understand the risks involved with rogue pharmacies and fake drugs, at the moment they&#8217;re searching for them, and provides users with a simple way to check if any pharmacy they find online is legitimate.</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Updating autocomplete predictions</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Autocomplete helps our users search faster. &#160;While a user types, autocomplete predicts the user&#8217;s most likely search queries based on what the user has already typed. These predictions are an algorithmic reflection of the search terms </span><span>that are popular with users and on the Internet</span><span>. &#160;We occasionally tweak autocomplete to prevent shocking or offensive entries from being displayed, but don&#8217;t otherwise decide which entries appear in autocomplete. &#160;</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Because the feature is algorithmic, some autocomplete entries may include phrases that potentially relate to rogue pharmacies. &#160;We&#8217;re evaluating how best to address this issue, have already started running tests on the subject, and always welcome feedback. &#160;</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>It is still important to understand that - whether or not a predicted query is shown in autocomplete - people can still search for objectionable content that might exist on the web.</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Enforcing YouTube guidelines</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>YouTube has implemented robust </span><a href="http://www.youtube.com/t/community_guidelines"><span>community guidelines</span></a><span> governing uploaded content and user activity on YouTube. &#160;These guidelines prohibit spam, which includes the posting of large amounts of untargeted, unwanted, and repetitive content. YouTube's guidelines also prohibit the sale of illegal goods or promotion of dangerous activities. Our teams respond around the clock when such content is reported to us. To make the notification process as effective as possible, YouTube provides a flagging tool under every video on the site that lets users and law enforcement easily alert us whenever a video contains content that violates YouTube&#8217;s policies regarding pharmaceuticals or illegal drugs.</span></span></div><div dir="ltr"><span><span><br /></span></span></div><span><br /><div><b><span><img height="417px;" src="https://lh4.googleusercontent.com/_WSZecx91I1z3J6Yl7RKp-Or-ndCo5VC5mmtF-fpz-5rFyJS16EJCuSV1SOxvw_F-IZkysmlAUXZ_tTPpNnnInmik5QhEJXr1r42Gri7M-WzUrOWrtrCeFrC" width="506px;"></span></b></div><span></span><span></span></span><div dir="ltr"><span><span><br /></span><span></span></span></div><div dir="ltr"><span><span>Earlier this month, YouTube was notified of a number of videos promoting pharmaceuticals that violated its guidelines, and immediately removed them. &#160;YouTube will continue doing so when notified.</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Working together with regulators and the industry </span><span></span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>In 2010, following discussions with the White House, Google teamed-up with organizations across different industries &#8212;&#160;including GoDaddy, Microsoft, Visa, Yahoo! &#8212;&#160; and took the important step of founding the industry group CSIP. In addition to its public awareness campaigns (such as the one mentioned above), CSIP recently highlighted some industry initiatives by its member companies against rogue pharmacies, and specifically called out the efforts of companies like Google </span><a href="http://www.safemedsonline.org/2013/05/companies-join-forces-to-protect-consumers-from-the-prevalent-threat-of-illegal-online-pharmacies/"><span>here</span></a><span>. </span><span></span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Over the last few years, Google has made thousands of referrals to law enforcement concerning suspected rogue online pharmacies, and will continue to do so. &#160;</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>In October 2012, we participated in the successful </span><a href="http://www.fda.gov/NewsEvents/Newsroom/PressAnnouncements/ucm322492.htm"><span>Operation Pangea</span></a><span>, in which the U.S. Food and Drug Administration, in partnership with international regulatory and law enforcement agencies, took action against more than 4,100 Internet pharmacies worldwide.  We also regularly keep officials up to date on our efforts - in writing and in person. &#160;&#160;For example, when the National Association of Attorneys General Intellectual Property Committee invited multiple search engines to participate in discussions with the Committee on November 28, 2012, Google was the only search engine to do so. </span><span></span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>*****</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>The industry as a whole has made significant strides in the fight against rogue pharmacies. &#160;Working together, companies in the private sector, non-profit organizations, and law enforcement have made it increasingly difficult for rogue pharmacies to effectively market their illegal products online, and operators of these sites are being forced to turn to much less effective marketing techniques from the outskirts of the Internet. &#160;</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>This is great progress, and Google remains committed to working with others in this important fight to protect our users.</span></span></div><div><span><br /></span></div></b>]]></description>
				<content:encoded><![CDATA[<span style="font-family: Arial, Helvetica, sans-serif;"><b id="docs-internal-guid-61bf5f2a-57ac-0eb7-7317-e8b012efb6c7"></b><br /></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-61bf5f2a-57ac-0eb7-7317-e8b012efb6c7"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Posted by </span><b id="docs-internal-guid-61bf5f2a-57ac-0eb7-7317-e8b012efb6c7"><b id="docs-internal-guid-61bf5f2a-57ae-e5f9-4946-eac73092dd48"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Adam Barea, Legal Director</span></b></b></span></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-61bf5f2a-57ac-0eb7-7317-e8b012efb6c7"><b><b><span style="font-family: Arial, Helvetica, sans-serif; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br /></span></b></b></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-61bf5f2a-57ac-0eb7-7317-e8b012efb6c7"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-style: italic; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Editor’s note: &nbsp;Over the years, we have run </span><a href="http://googleblog.blogspot.com/2012/03/making-our-ads-better-for-everyone.html" style="text-decoration: none;"><span style="color: #1155cc; font-style: italic; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">a</span></a><span style="font-style: italic; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><a href="http://googleblog.blogspot.com/2012/04/inside-view-on-ads-review.html" style="text-decoration: none;"><span style="color: #1155cc; font-style: italic; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">series</span></a><span style="font-style: italic; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><a href="http://googleblog.blogspot.com/2012/06/ads-integrity-alliance-working-together.html" style="text-decoration: none;"><span style="color: #1155cc; font-style: italic; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">of</span></a><span style="font-style: italic; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><a href="http://googleblog.blogspot.com/2012/05/fight-against-scam-adsby-numbers.html" style="text-decoration: none;"><span style="color: #1155cc; font-style: italic; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">blogposts</span></a><span style="font-style: italic; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><a href="http://adwords.blogspot.com/2012/09/taking-extra-precautions-to-keep-ads.html" style="text-decoration: none;"><span style="color: #1155cc; font-style: italic; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">detailing</span></a><span style="font-style: italic; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><a href="http://adwords.blogspot.com/2013/01/ads-security-2012-retrospective.html" style="text-decoration: none;"><span style="color: #1155cc; font-style: italic; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">our</span></a><span style="font-style: italic; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> efforts to remove bad ads from our systems, and describing </span><a href="http://googleblog.blogspot.com/2010/04/controversial-content-and-free.html" style="text-decoration: none;"><span style="color: #1155cc; font-style: italic; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">our approach</span></a><span style="font-style: italic; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> to handling </span><a href="http://googleblog.blogspot.com/2007/11/free-expression-and-controversial.html" style="text-decoration: none;"><span style="color: #1155cc; font-style: italic; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">controversial</span></a><span style="font-style: italic; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> content on our services. &nbsp;As part of this ongoing series, here’s an update on some of the ways we tackle the problem of rogue online pharmacies gaming our systems.</span></span></b></div><b id="docs-internal-guid-61bf5f2a-57ac-0eb7-7317-e8b012efb6c7"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-61bf5f2a-57ac-0eb7-7317-e8b012efb6c7"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">For the last several years, Google has worked closely with a number of organizations, government agencies, and businesses to combat rogue online pharmacies from all angles. &nbsp;</span></span></b></div><b id="docs-internal-guid-61bf5f2a-57ac-0eb7-7317-e8b012efb6c7"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Collectively, we are making it increasingly difficult for these operators to effectively promote their rogue pharmacies online. A variety of websites and web services are refusing ads from suspected rogue pharmacies. Domain name registrars are removing suspect rogue pharmacies from their networks. &nbsp;Payment processors are blocking payments to these operators, and social networking sites are removing them from their systems too.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">As a result, rogue pharmacies continually adapt their online marketing practices, meaning this is an ongoing battle. &nbsp;We wanted to share some of the steps Google takes to combat them.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Keeping ads safe</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Making sure ads appearing on Google and our partner sites are </span><a href="http://googleblog.blogspot.com/2012/03/making-our-ads-better-for-everyone.html" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">safe</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> continues to be a top priority. &nbsp;We have extremely stringent ads policies, and use sophisticated automated systems, along with some human review, to identify, block and remove ads suspected of linking to rogue pharmacies. &nbsp;We disrupt their marketing efforts by making it difficult for rogue pharmacies to abuse our services and evade our filters.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><ul style="margin-bottom: 0pt; margin-top: 0pt;"><li dir="ltr" style="font-weight: normal; list-style-type: disc; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="vertical-align: baseline; white-space: pre-wrap;">Since 2010, we’ve only permitted U.S.-based online pharmacies accredited under the </span><a href="http://www.nabp.net/programs/accreditation/vipps" style="text-decoration: none;"><span style="color: #1155cc; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">National Association Boards of Pharmacy “VIPPS” program</span></a><span style="vertical-align: baseline; white-space: pre-wrap;"> to run pharma ads in our AdWords program. &nbsp;We were the first online search provider to require this certification - there are less than 40 VIPPS certified pharmacies operating in the U.S. </span><span style="text-decoration: line-through; vertical-align: baseline; white-space: pre-wrap;"></span></span></div></li></ul><ul style="margin-bottom: 0pt; margin-top: 0pt;"><li dir="ltr" style="font-weight: normal; list-style-type: disc; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">We partner with LegitScript, an independent company with deep knowledge about online pharmacies, to conduct weekly “sweeps” of ads on Google to help ensure that we are keeping our ads safe.</span></span></div></li></ul><ul style="margin-bottom: 0pt; margin-top: 0pt;"><li dir="ltr" style="font-weight: normal; list-style-type: disc; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="color: #272727; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">According to LegitScript, the number of illegal drug and pharmacy ads on major search engines like Google and Bing has declined by 99.9% percent since 2010.</span></span></div></li><li dir="ltr" style="font-weight: normal; list-style-type: disc; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="color: #272727; vertical-align: baseline; white-space: pre-wrap;">In the last two years alone, Google has blocked or removed from its systems more than 3 million ads by suspected rogue pharmacies.</span><span style="vertical-align: baseline; white-space: pre-wrap;"></span></span></div></li></ul><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="vertical-align: baseline; white-space: pre-wrap;">Search results</span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Our stance on filtering our search results is </span><a href="http://googleblog.blogspot.com/2010/04/controversial-content-and-free.html" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">well-publicized</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. </span><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">We do not remove content from search results except in narrow circumstances (e.g., </span><span style="background-color: white; color: #222222; font-weight: normal; line-height: normal;">child sexual abuse imagery</span><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, certain links to copyrighted material; spam; malware).</span><span style="background-color: white; color: #444444; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Search results reflect the web and what’s online - the good and the bad. &nbsp;Filtering a website from search results won’t remove it from the web, or block other websites that link to that website. &nbsp;It's not Google's place to determine what content should be censored - that responsibility belongs with the courts and the lawmakers.</span><span style="background-color: #fcfac6; color: #666666; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Google will abide by</span><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> court decisions deciding which content on the web is and is not legal</span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. &nbsp;&nbsp;We have always removed from our search results any page found by a legitimate court to be unlawful, whether an online rogue pharmacy or otherwise.</span><span style="background-color: cyan; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Rogue pharmacies are clearly a matter of public concern. This is why we work closely with the <a href="http://www.safemedsonline.org/">Center for Safe Internet Pharmacies</a> (“CSIP”), a 501(c)(3) organization dedicated to stopping rogue online pharmacies and keeping consumers safe on the web. &nbsp;If a user searches on Google for terms related to online pharmacies or buying pharmaceuticals, a prominent advertisement from CSIP will often appear on the search results page, urging caution and linking to the </span><a href="http://www.safemedsonline.org/protecting-consumers/check-your-pharmacy/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">LegitScript pharmacy verification tool</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. </span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><div style="text-align: center;"><b id="docs-internal-guid-61bf5f2a-57ac-0eb7-7317-e8b012efb6c7"><span style="font-family: Arial, Helvetica, sans-serif;"><img height="221px;" src="https://lh3.googleusercontent.com/nL_3AtEkmrCT8QTnDUxNE3CQZ0TpyYNwmG6VB837wsjgwMKJNAqoBudlE7gXbAOXMTW-X7ZVubpjTmb7S6VBg_nzDHjSAeiwYrr-meC56rsLIWirbF70ozMG6Q" width="616px;" /></span></b></div><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br /></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">CSIP’s ad campaign on Google is funded by a </span><a href="http://www.google.com/grants/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Google Grant</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, which provides non-profits like CSIP with financial and technical assistance to promote their important missions online. &nbsp;Campaigns like these help users to better understand the risks involved with rogue pharmacies and fake drugs, at the moment they’re searching for them, and provides users with a simple way to check if any pharmacy they find online is legitimate.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Updating autocomplete predictions</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Autocomplete helps our users search faster. &nbsp;While a user types, autocomplete predicts the user’s most likely search queries based on what the user has already typed. These predictions are an algorithmic reflection of the search terms </span><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">that are popular with users and on the Internet</span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. &nbsp;We occasionally tweak autocomplete to prevent shocking or offensive entries from being displayed, but don’t otherwise decide which entries appear in autocomplete. &nbsp;</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Because the feature is algorithmic, some autocomplete entries may include phrases that potentially relate to rogue pharmacies. &nbsp;We’re evaluating how best to address this issue, have already started running tests on the subject, and always welcome feedback. &nbsp;</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">It is still important to understand that - whether or not a predicted query is shown in autocomplete - people can still search for objectionable content that might exist on the web.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Enforcing YouTube guidelines</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">YouTube has implemented robust </span><a href="http://www.youtube.com/t/community_guidelines" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">community guidelines</span></a><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> governing uploaded content and user activity on YouTube. &nbsp;These guidelines prohibit spam, which includes the posting of large amounts of untargeted, unwanted, and repetitive content. YouTube's guidelines also prohibit the sale of illegal goods or promotion of dangerous activities. Our teams respond around the clock when such content is reported to us. To make the notification process as effective as possible, YouTube provides a flagging tool under every video on the site that lets users and law enforcement easily alert us whenever a video contains content that violates YouTube’s policies regarding pharmaceuticals or illegal drugs.</span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br /></span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><div style="text-align: center;"><b id="docs-internal-guid-61bf5f2a-57ac-0eb7-7317-e8b012efb6c7"><span style="font-family: Arial, Helvetica, sans-serif;"><img height="417px;" src="https://lh4.googleusercontent.com/_WSZecx91I1z3J6Yl7RKp-Or-ndCo5VC5mmtF-fpz-5rFyJS16EJCuSV1SOxvw_F-IZkysmlAUXZ_tTPpNnnInmik5QhEJXr1r42Gri7M-WzUrOWrtrCeFrC" width="506px;" /></span></b></div><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Earlier this month, YouTube was notified of a number of videos promoting pharmaceuticals that violated its guidelines, and immediately removed them. &nbsp;YouTube will continue doing so when notified.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="vertical-align: baseline; white-space: pre-wrap;">Working together with regulators and the industry </span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">In 2010, following discussions with the White House, Google teamed-up with organizations across different industries —&nbsp;including GoDaddy, Microsoft, Visa, Yahoo! —&nbsp; and took the important step of founding the industry group CSIP. In addition to its public awareness campaigns (such as the one mentioned above), CSIP recently highlighted some industry initiatives by its member companies against rogue pharmacies, and specifically called out the efforts of companies like Google </span><a href="http://www.safemedsonline.org/2013/05/companies-join-forces-to-protect-consumers-from-the-prevalent-threat-of-illegal-online-pharmacies/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">here</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. </span><span style="color: #272727; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="color: #272727; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="color: #272727; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Over the last few years, Google has made thousands of referrals to law enforcement concerning suspected rogue online pharmacies, and will continue to do so. &nbsp;</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="color: #272727; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="color: #272727; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">In October 2012, we participated in the successful </span><a href="http://www.fda.gov/NewsEvents/Newsroom/PressAnnouncements/ucm322492.htm" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Operation Pangea</span></a><span style="color: #272727; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, in which the U.S. Food and Drug Administration, in partnership with international regulatory and law enforcement agencies, took action against more than 4,100 Internet pharmacies worldwide.  We also regularly keep officials up to date on our efforts - in writing and in person. &nbsp;&nbsp;For example, when the National Association of Attorneys General Intellectual Property Committee invited multiple search engines to participate in discussions with the Committee on November 28, 2012, Google was the only search engine to do so. </span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">*****</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">The industry as a whole has made significant strides in the fight against rogue pharmacies. &nbsp;Working together, companies in the private sector, non-profit organizations, and law enforcement have made it increasingly difficult for rogue pharmacies to effectively market their illegal products online, and operators of these sites are being forced to turn to much less effective marketing techniques from the outskirts of the Internet. &nbsp;</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">This is great progress, and Google remains committed to working with others in this important fight to protect our users.</span></span></div><div><span style="font-family: Arial; font-size: 15px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div></b>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/combating-rogue-online-pharmacies/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Iranian phishing on the rise as elections approach</title>
		<link>https://googledata.org/uncategorized/iranian-phishing-on-the-rise-as-elections-approach-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=iranian-phishing-on-the-rise-as-elections-approach-2</link>
		<comments>https://googledata.org/uncategorized/iranian-phishing-on-the-rise-as-elections-approach-2/#comments</comments>
		<pubDate>Wed, 12 Jun 2013 22:09:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=ea3aaf3ad5699282e7b109eddde3b41e</guid>
		<description><![CDATA[<span>Posted by Eric Grosse, VP Security Engineering</span><br /><i><br /></i><i>Cross-posted from the <a href="http://googleonlinesecurity.blogspot.com/2013/06/iranian-phishing-on-rise-as-elections.html">Google Online Security Blog</a></i><br /><br />For almost three weeks, we have detected and disrupted multiple email-based phishing campaigns aimed at compromising the accounts owned by tens of thousands of Iranian users. These campaigns, which originate from within Iran, represent a significant jump in the overall volume of phishing activity in the region. The timing and targeting of the campaigns suggest that the attacks are politically motivated in connection with the Iranian presidential election on Friday.  <br /><br /><div><a href="http://2.bp.blogspot.com/-PYvRXllnKMM/UbjtA0uvi6I/AAAAAAAAFlI/jEyaVEHW-4c/s1600/blog.png"><img border="0" height="245" src="http://2.bp.blogspot.com/-PYvRXllnKMM/UbjtA0uvi6I/AAAAAAAAFlI/jEyaVEHW-4c/s320/blog.png" width="320"></a></div><br />Our Chrome browser previously helped detect what appears to be the same group using SSL certificates to conduct attacks that <a href="http://googleonlinesecurity.blogspot.com/2011/09/gmail-account-security-in-iran.html">targeted users within Iran</a>. In this case, the phishing technique we detected is more routine: users receive an email containing a link to a web page that purports to provide a way to perform account maintenance. If the user clicks the link, they see a fake Google sign-in page that will steal their username and password.<br /><br />Protecting our users&#8217; accounts is one of our top priorities, so we notify targets of <a href="http://googleonlinesecurity.blogspot.com/2012/06/security-warnings-for-suspected-state.html">state-sponsored attacks</a> and other <a href="http://googleonlinesecurity.blogspot.com/2010/03/detecting-suspicious-account-activity.html">suspicious activity</a>, and we take other appropriate actions to limit the impact of these attacks on our users. Especially if you are in Iran, we encourage you to <a href="https://support.google.com/mail/answer/2591015">take extra steps to protect your account</a>. Watching out for phishing, using a modern browser like Chrome and <a href="http://google.com/2step">enabling 2-step verification</a> can make you significantly more secure against these and many other types of attacks. Also, before typing your Google password, always verify that the URL in the address bar of your browser begins with https://accounts.google.com/. If the website's address does not match this text, please don&#8217;t enter your Google password.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Eric Grosse, VP Security Engineering</span><br /><i><br /></i><i>Cross-posted from the <a href="http://googleonlinesecurity.blogspot.com/2013/06/iranian-phishing-on-rise-as-elections.html">Google Online Security Blog</a></i><br /><br />For almost three weeks, we have detected and disrupted multiple email-based phishing campaigns aimed at compromising the accounts owned by tens of thousands of Iranian users. These campaigns, which originate from within Iran, represent a significant jump in the overall volume of phishing activity in the region. The timing and targeting of the campaigns suggest that the attacks are politically motivated in connection with the Iranian presidential election on Friday.  <br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-PYvRXllnKMM/UbjtA0uvi6I/AAAAAAAAFlI/jEyaVEHW-4c/s1600/blog.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="245" src="http://2.bp.blogspot.com/-PYvRXllnKMM/UbjtA0uvi6I/AAAAAAAAFlI/jEyaVEHW-4c/s320/blog.png" width="320" /></a></div><br />Our Chrome browser previously helped detect what appears to be the same group using SSL certificates to conduct attacks that <a href="http://googleonlinesecurity.blogspot.com/2011/09/gmail-account-security-in-iran.html">targeted users within Iran</a>. In this case, the phishing technique we detected is more routine: users receive an email containing a link to a web page that purports to provide a way to perform account maintenance. If the user clicks the link, they see a fake Google sign-in page that will steal their username and password.<br /><br />Protecting our users’ accounts is one of our top priorities, so we notify targets of <a href="http://googleonlinesecurity.blogspot.com/2012/06/security-warnings-for-suspected-state.html">state-sponsored attacks</a> and other <a href="http://googleonlinesecurity.blogspot.com/2010/03/detecting-suspicious-account-activity.html">suspicious activity</a>, and we take other appropriate actions to limit the impact of these attacks on our users. Especially if you are in Iran, we encourage you to <a href="https://support.google.com/mail/answer/2591015">take extra steps to protect your account</a>. Watching out for phishing, using a modern browser like Chrome and <a href="http://google.com/2step">enabling 2-step verification</a> can make you significantly more secure against these and many other types of attacks. Also, before typing your Google password, always verify that the URL in the address bar of your browser begins with https://accounts.google.com/. If the website's address does not match this text, please don’t enter your Google password.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/iranian-phishing-on-the-rise-as-elections-approach-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Asking the U.S. government to allow Google to publish more national security request data</title>
		<link>https://googledata.org/uncategorized/asking-the-u-s-government-to-allow-google-to-publish-more-national-security-request-data-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=asking-the-u-s-government-to-allow-google-to-publish-more-national-security-request-data-2</link>
		<comments>https://googledata.org/uncategorized/asking-the-u-s-government-to-allow-google-to-publish-more-national-security-request-data-2/#comments</comments>
		<pubDate>Tue, 11 Jun 2013 17:39:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=46f1d3b3eba05fce2c8e31e597fe0686</guid>
		<description><![CDATA[<i><br /></i><i>This morning we sent the following letter to the offices of the Attorney General and the Federal Bureau of Investigation. Read the full text below. </i>-Ed.&#160; <br /><br />Dear Attorney General Holder and Director Mueller<br /><br />Google has worked tremendously hard over the past fifteen years to earn our users&#8217; trust.  For example, we offer encryption across our services; we have hired some of the best security engineers in the world; and we have consistently pushed back on overly broad government requests for our users&#8217; data.<br /><br />We have always made clear that we comply with valid legal requests.  And last week, the Director of National Intelligence acknowledged that service providers have received Foreign Intelligence Surveillance Act (FISA) requests.<br /><br />Assertions in the press that our compliance with these requests gives the U.S. government unfettered access to our users&#8217; data are simply untrue.  However, government nondisclosure obligations regarding the number of FISA national security requests that Google receives, as well as the number of accounts covered by those requests, fuel that speculation.<br /><br />We therefore ask you to help make it possible for Google to publish in our Transparency Report aggregate numbers of national security requests, including FISA disclosures&#8212;in terms of both the number we receive and their scope.  Google&#8217;s numbers would clearly show that our compliance with these requests falls far short of the claims being made.  Google has nothing to hide.<br /><br />Google appreciates that you authorized the recent disclosure of general numbers for national security letters. There have been no adverse consequences arising from their publication, and in fact more companies are receiving your approval to do so as a result of Google&#8217;s initiative.  Transparency here will likewise serve the public interest without harming national security.<br /><br />We will be making this letter public and await your response.<br /><br />David Drummond<br />Chief Legal Officer]]></description>
				<content:encoded><![CDATA[<i><br /></i><i>This morning we sent the following letter to the offices of the Attorney General and the Federal Bureau of Investigation. Read the full text below. </i>-Ed.&nbsp; <br /><br />Dear Attorney General Holder and Director Mueller<br /><br />Google has worked tremendously hard over the past fifteen years to earn our users’ trust.  For example, we offer encryption across our services; we have hired some of the best security engineers in the world; and we have consistently pushed back on overly broad government requests for our users’ data.<br /><br />We have always made clear that we comply with valid legal requests.  And last week, the Director of National Intelligence acknowledged that service providers have received Foreign Intelligence Surveillance Act (FISA) requests.<br /><br />Assertions in the press that our compliance with these requests gives the U.S. government unfettered access to our users’ data are simply untrue.  However, government nondisclosure obligations regarding the number of FISA national security requests that Google receives, as well as the number of accounts covered by those requests, fuel that speculation.<br /><br />We therefore ask you to help make it possible for Google to publish in our Transparency Report aggregate numbers of national security requests, including FISA disclosures—in terms of both the number we receive and their scope.  Google’s numbers would clearly show that our compliance with these requests falls far short of the claims being made.  Google has nothing to hide.<br /><br />Google appreciates that you authorized the recent disclosure of general numbers for national security letters. There have been no adverse consequences arising from their publication, and in fact more companies are receiving your approval to do so as a result of Google’s initiative.  Transparency here will likewise serve the public interest without harming national security.<br /><br />We will be making this letter public and await your response.<br /><br />David Drummond<br />Chief Legal Officer ]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/asking-the-u-s-government-to-allow-google-to-publish-more-national-security-request-data-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Protecting Seniors from Identity Theft</title>
		<link>https://googledata.org/uncategorized/protecting-seniors-from-identity-theft/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-seniors-from-identity-theft</link>
		<comments>https://googledata.org/uncategorized/protecting-seniors-from-identity-theft/#comments</comments>
		<pubDate>Tue, 07 May 2013 11:51:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=67cbb2d2adeea4063f0279a8fe04c329</guid>
		<description><![CDATA[<b><span></span></b><br /><div dir="ltr"><b><span><span>Posted by Jenny Backus, Public Policy Team </span></span></b></div><div dir="ltr"><b><span><span><br /></span></span></b></div><div dir="ltr"><b><span><span>Every day in this country, someone&#8217;s mother, grandfather, or older neighbor is a victim of identity theft. Whether the identity thieves attack through a confusing telemarketing scam, a misleading piece of mail, or over the Internet, seniors and their families are increasingly at risk of long-term financial and emotional damage that can take years to undo.</span></span></b></div><b><span><br /><span></span></span></b><br /><div dir="ltr"><b><span><span>In order to address this issue, the Federal Trade Commission and a coalition of public and private partners like the National Consumer League&#8217;s </span><a href="http://www.fraud.org/"><span>Fraud.org</span></a><span> are working together to protect seniors from identity theft. Google will also be recognizing Older Americans Month this May by offering tips for seniors to help them stay safe and secure online.</span></span></b></div><b><span><br /><span></span></span></b><br /><div dir="ltr"><b><span><span>The FTC&#8217;s </span><a href="http://ftc.gov/sentinel/reports/sentinel-annual-reports/sentinel-cy2012.pdf"><span>report</span></a><span> of 2012 consumer complaint data recently showed that complaints about identity theft from older Americans are increasing at a faster rate than for any other age group. In fact, identity theft complaints from those over 70 increased by almost 70% since 2010, while complaints from 60 to 70 year olds increased by 53% in the same period. </span><span>&#160;</span><span></span></span></b></div><b><span><br /><span></span><div dir="ltr"><span>Google&#8217;s </span><a href="http://www.google.com/goodtoknow/"><span>Good to Know</span></a><span> site is designed to help educate consumers of all ages about online threats and tools they can use to protect themselves, including information on </span><a href="http://www.google.com/goodtoknow/online-safety/identity-theft/"><span>how to protect themselves from identity theft</span></a><span>.</span></div><br /><span></span><div dir="ltr"><span>Here are five tips from our security experts:</span></div><br /><span></span><ul><li><div dir="ltr"><span>Don&#8217;t reply if you see a suspicious email, instant message or webpage asking for your personal or financial information. Identity thieves can steal your information and then use it to withdraw money from your bank account.</span></div></li><li><div dir="ltr"><span>Never enter your password if you&#8217;ve arrived at a site by following a link in an email or chat that you don&#8217;t trust.</span></div></li><li><div dir="ltr"><span>If you see a message from someone you know that doesn&#8217;t seem like them, their account might have been compromised by a cyber criminal who is trying to get money or information from you. Think before responding!</span></div></li><li><div dir="ltr"><span>Don&#8217;t send your password via email, and don&#8217;t share your password with others. Legitimate sites won&#8217;t ask you to send them your passwords via email, so don&#8217;t respond if you get requests for your passwords to online sites.</span></div></li><li><div dir="ltr"><span>Report any suspicious emails and scams. Many email providers, including Gmail, provide an easy way for you to report fishy emails and scams, and it can help our teams stop similar mail from being sent to you and others.</span></div></li></ul><br /><span></span><div dir="ltr"><span>Seniors around the country can also learn more by attending or viewing by webcast the FTC&#8217;s workshop today on </span><a href="http://www.ftc.gov/bcp/workshops/senior-identity-theft/"><span>protecting seniors from identity theft</span></a><span>. With speakers from some of the most trusted consumer groups, local, state and government leaders, and lead experts on fraud prevention, the FTC workshop will focus on forms of ID theft that are particularly significant for seniors, from the risks that seniors face in nursing homes to the identity theft concerns that arise when they file their taxes or seek government assistance, which is increasingly happening online.</span></div><br /><span></span><span>Stopping bad actors who target seniors and preventing the rise of identity theft is a shared mission for all of us. Google is committed to making the Internet safer, and protecting our users of all ages.</span></span></b>]]></description>
				<content:encoded><![CDATA[<b id="docs-internal-guid-36550733-7cac-4dc5-a421-f38fca77f99d"><span style="font-family: Arial, Helvetica, sans-serif;"></span></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-36550733-7cac-4dc5-a421-f38fca77f99d"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Posted by Jenny Backus, Public Policy Team </span></span></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-36550733-7cac-4dc5-a421-f38fca77f99d"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br /></span></span></b></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-36550733-7cac-4dc5-a421-f38fca77f99d"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Every day in this country, someone’s mother, grandfather, or older neighbor is a victim of identity theft. Whether the identity thieves attack through a confusing telemarketing scam, a misleading piece of mail, or over the Internet, seniors and their families are increasingly at risk of long-term financial and emotional damage that can take years to undo.</span></span></b></div><b id="docs-internal-guid-36550733-7cac-4dc5-a421-f38fca77f99d"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="color: red; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-36550733-7cac-4dc5-a421-f38fca77f99d"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">In order to address this issue, the Federal Trade Commission and a coalition of public and private partners like the National Consumer League’s </span><a href="http://www.fraud.org/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Fraud.org</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> are working together to protect seniors from identity theft. Google will also be recognizing Older Americans Month this May by offering tips for seniors to help them stay safe and secure online.</span></span></b></div><b id="docs-internal-guid-36550733-7cac-4dc5-a421-f38fca77f99d"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-36550733-7cac-4dc5-a421-f38fca77f99d"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">The FTC’s </span><a href="http://ftc.gov/sentinel/reports/sentinel-annual-reports/sentinel-cy2012.pdf" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">report</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> of 2012 consumer complaint data recently showed that complaints about identity theft from older Americans are increasing at a faster rate than for any other age group. In fact, identity theft complaints from those over 70 increased by almost 70% since 2010, while complaints from 60 to 70 year olds increased by 53% in the same period. </span><span style="color: red; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">&nbsp;</span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></b></div><b id="docs-internal-guid-36550733-7cac-4dc5-a421-f38fca77f99d"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Google’s </span><a href="http://www.google.com/goodtoknow/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Good to Know</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> site is designed to help educate consumers of all ages about online threats and tools they can use to protect themselves, including information on </span><a href="http://www.google.com/goodtoknow/online-safety/identity-theft/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">how to protect themselves from identity theft</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">.</span></div><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Here are five tips from our security experts:</span></div><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><ul style="margin-bottom: 0pt; margin-top: 0pt;"><li dir="ltr" style="font-weight: normal; list-style-type: disc; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="vertical-align: baseline; white-space: pre-wrap;">Don’t reply if you see a suspicious email, instant message or webpage asking for your personal or financial information. Identity thieves can steal your information and then use it to withdraw money from your bank account.</span></div></li><li dir="ltr" style="font-weight: normal; list-style-type: disc; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="vertical-align: baseline; white-space: pre-wrap;">Never enter your password if you’ve arrived at a site by following a link in an email or chat that you don’t trust.</span></div></li><li dir="ltr" style="font-weight: normal; list-style-type: disc; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="vertical-align: baseline; white-space: pre-wrap;">If you see a message from someone you know that doesn’t seem like them, their account might have been compromised by a cyber criminal who is trying to get money or information from you. Think before responding!</span></div></li><li dir="ltr" style="font-weight: normal; list-style-type: disc; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="vertical-align: baseline; white-space: pre-wrap;">Don’t send your password via email, and don’t share your password with others. Legitimate sites won’t ask you to send them your passwords via email, so don’t respond if you get requests for your passwords to online sites.</span></div></li><li dir="ltr" style="font-weight: normal; list-style-type: disc; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="vertical-align: baseline; white-space: pre-wrap;">Report any suspicious emails and scams. Many email providers, including Gmail, provide an easy way for you to report fishy emails and scams, and it can help our teams stop similar mail from being sent to you and others.</span></div></li></ul><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Seniors around the country can also learn more by attending or viewing by webcast the FTC’s workshop today on </span><a href="http://www.ftc.gov/bcp/workshops/senior-identity-theft/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">protecting seniors from identity theft</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. With speakers from some of the most trusted consumer groups, local, state and government leaders, and lead experts on fraud prevention, the FTC workshop will focus on forms of ID theft that are particularly significant for seniors, from the risks that seniors face in nursing homes to the identity theft concerns that arise when they file their taxes or seek government assistance, which is increasingly happening online.</span></div><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Stopping bad actors who target seniors and preventing the rise of identity theft is a shared mission for all of us. Google is committed to making the Internet safer, and protecting our users of all ages.</span></span></b>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/protecting-seniors-from-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Congress, now live on YouTube</title>
		<link>https://googledata.org/uncategorized/congress-now-live-on-youtube/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=congress-now-live-on-youtube</link>
		<comments>https://googledata.org/uncategorized/congress-now-live-on-youtube/#comments</comments>
		<pubDate>Tue, 30 Apr 2013 18:39:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=65674c270b08097c6bc1d485c2d612d7</guid>
		<description><![CDATA[<b></b><br /><div dir="ltr"><b><span><b><b></b></b></span></b></div><div dir="ltr"><b><span><b><b><span>Posted by </span></b></b></span></b></div><b><span><span>Robert Kyncl, Vice President, Global Head of Content Partnerships for YouTube</span><b><b><div dir="ltr"><span> &#38; Susan Molinari, Vice President, Public Policy and Government Relations</span></div></b></b></span><br /><div dir="ltr"><span><span><br /></span></span></div><div dir="ltr"><span><span>Video plays a powerful role in bringing us closer together, especially when it connects people in real time. By transcending borders, empowering citizens, and increasing transparency, it&#8217;s one of the many ways technology allows democracy to thrive. Starting this week, all members of the U.S. Congress will </span><span>have the opportunity to access enhanced features on their YouTube channels, including the ability to live stream video.</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Live video is already allowing elected officials and their constituents to reach one another in innovative ways. Thousands tuned in to YouTube to watch the president&#8217;s </span><a href="http://www.youtube.com/watch?v=S7doAXkmGJw"><span>State of the Union address</span></a><span> and the corresponding </span><a href="http://www.youtube.com/watch?v=zW6hkbYVsqM"><span>Republican response</span></a><span> this February. Engagement is growing across many types of platforms &#8212; Google+ Hang</span><span>outs, for example,</span><span> have sparked face-to-face conversations on topics ranging from </span><a href="http://www.youtube.com/watch?v=7LYlkknrku4"><span>gun control</span></a><span> to the </span><a href="http://www.youtube.com/watch?v=92Psze5HSHE"><span>national economy</span></a><span> and have allowed people on the other side of the world to </span><a href="http://www.foreign.senate.gov/hearings/assessing-developments-in-mali-restoring-democracy-and-reclaiming-the-north"><span>share their stories at Congressional hearings</span></a><span>. </span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>If you&#8217;re a member of Congress and would like to know more, check out these Dear Colleague letters issued by the </span><a href="https://docs.google.com/document/d/1Ir1B1PdA82OwLzxUWhVW8lvlTRv2ZXj6dh1dAFKn47o/edit"><span>House</span></a><span> and </span><a href="https://docs.google.com/file/d/0B4TqeSM3PxtdSkFZb2ZrNHFIdDQ/edit?usp=sharing"><span>Senate</span></a><span>. Whether it&#8217;s to share a look into your daily work, broadcast speeches and meetings, or showcase events in your state or district, we can&#8217;t wait to see how you connect with your constituents.</span></span></div></b>]]></description>
				<content:encoded><![CDATA[<b id="docs-internal-guid-511921ff-5c2d-dc40-4edb-78b21e2b25a4"></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-511921ff-5c2d-dc40-4edb-78b21e2b25a4"><span style="font-family: Arial, Helvetica, sans-serif;"><b id="docs-internal-guid-511921ff-5c2d-dc40-4edb-78b21e2b25a4"><b id="docs-internal-guid-511921ff-5c2d-dc40-4edb-78b21e2b25a4"></b></b></span></b></div><div dir="ltr" style="display: inline !important; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-511921ff-5c2d-dc40-4edb-78b21e2b25a4"><span style="font-family: Arial, Helvetica, sans-serif;"><b id="docs-internal-guid-511921ff-5c2d-dc40-4edb-78b21e2b25a4"><b id="docs-internal-guid-511921ff-5c2d-dc40-4edb-78b21e2b25a4"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Posted by </span></b></b></span></b></div><b id="docs-internal-guid-511921ff-5c2d-dc40-4edb-78b21e2b25a4"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #222222; font-weight: normal; line-height: normal; text-align: left;">Robert Kyncl, Vice President, Global Head of Content Partnerships for YouTube</span><b><b><div dir="ltr" style="display: inline !important; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> &amp; Susan Molinari, Vice President, Public Policy and Government Relations</span></div></b></b></span><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Video plays a powerful role in bringing us closer together, especially when it connects people in real time. By transcending borders, empowering citizens, and increasing transparency, it’s one of the many ways technology allows democracy to thrive. Starting this week, all members of the U.S. Congress will </span><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">have the opportunity to access enhanced features on their YouTube channels, including the ability to live stream video.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Live video is already allowing elected officials and their constituents to reach one another in innovative ways. Thousands tuned in to YouTube to watch the president’s </span><a href="http://www.youtube.com/watch?v=S7doAXkmGJw" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">State of the Union address</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> and the corresponding </span><a href="http://www.youtube.com/watch?v=zW6hkbYVsqM" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Republican response</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> this February. Engagement is growing across many types of platforms — Google+ Hang</span><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">outs, for example,</span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> have sparked face-to-face conversations on topics ranging from </span><a href="http://www.youtube.com/watch?v=7LYlkknrku4" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">gun control</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> to the </span><a href="http://www.youtube.com/watch?v=92Psze5HSHE" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">national economy</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> and have allowed people on the other side of the world to </span><a href="http://www.foreign.senate.gov/hearings/assessing-developments-in-mali-restoring-democracy-and-reclaiming-the-north" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">share their stories at Congressional hearings</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. </span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">If you’re a member of Congress and would like to know more, check out these Dear Colleague letters issued by the </span><a href="https://docs.google.com/document/d/1Ir1B1PdA82OwLzxUWhVW8lvlTRv2ZXj6dh1dAFKn47o/edit" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">House</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> and </span><a href="https://docs.google.com/file/d/0B4TqeSM3PxtdSkFZb2ZrNHFIdDQ/edit?usp=sharing" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Senate</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. Whether it’s to share a look into your daily work, broadcast speeches and meetings, or showcase events in your state or district, we can’t wait to see how you connect with your constituents.</span></span></div></b>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/congress-now-live-on-youtube/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>The Big Tent comes to Washington</title>
		<link>https://googledata.org/uncategorized/the-big-tent-comes-to-washington/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-big-tent-comes-to-washington</link>
		<comments>https://googledata.org/uncategorized/the-big-tent-comes-to-washington/#comments</comments>
		<pubDate>Fri, 26 Apr 2013 14:30:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=0453d294a3e1420e166bd1e696355d91</guid>
		<description><![CDATA[<b><span></span></b><br /><div dir="ltr"><b><span><b></b></span></b></div><div dir="ltr"><b><span><b><span>Posted by Susan Molinari, Vice President, Public Policy and Government Relations</span></b></span></b></div><span><b><span><br /><span></span></span></b></span><br /><div dir="ltr"><span><b><span><span>When we started holding our </span><a href="http://big-tent.appspot.com/en/"><span>Big Tent</span></a><span> events in London </span><a href="http://googleblog.blogspot.com/2011/05/inside-big-tent.html"><span>two years ago</span></a><span>, we wanted to stir up lively conversation about some of the hot topics relating to the Internet and society. After all, the political meaning of a </span><a href="http://en.wikipedia.org/wiki/Big_tent"><span>&#8220;big tent&#8221;</span></a><span> is to attract diverse viewpoints to come together in one place. Since then, we&#8217;ve held more than 20 Big Tents on three different continents to debate issues ranging from arts and culture online to the economic impact of the web.</span></span></b></span></div><span><b><span><br /><span></span></span></b></span><br /><div dir="ltr"><span><b><span><span>Later today, the Big Tent is </span><a href="http://www.google.com/events/bigtentdc2013/agenda.html"><span>coming to Washington, D.C</span></a><span>. for the first time. Along with our partner Bloomberg, we'll hear from some of the top names in media, government and the arts for discussions about one of the values we hold most dear: </span><a href="http://www.un.org/en/documents/udhr/index.shtml#a19"><span>the right to free expression</span></a><span>. </span></span></b></span></div><span><b><span><br /><span></span></span></b></span><br /><div dir="ltr"><span><b><span><span>Can free speech survive in the digital age? At a time when too many governments deny their citizens the right to dissent, we&#8217;ll ask if the Internet is reaching its promise of empowering people around the world. We&#8217;ll have sessions on the limits to free speech online, national security in the Internet age, and creativity and freedom on the web. </span></span></b></span></div><span><b><span><br /><span></span></span><div dir="ltr"><span><span>Google&#8217;s executive chairman Eric Schmidt and senior vice president and chief legal officer David Drummond will be joined by a variety of speakers, including former U.S. attorney general Alberto Gonzales, deputy secretary of homeland security Jane Holl Lute, Bloomberg chief content officer Norman Pearlstine, former New York Times executive editor Bill Keller, and Saudi Arabian comedian and YouTube star Omar Hussein. </span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Things kick off at 1:30pm EDT today&#8212;you can watch the entire event on </span><a href="http://bloomberg.com/livestream"><span>Bloomberg&#8217;s live stream</span></a><span> and tune in to the </span><a href="https://plus.google.com/+GoogleBigTent"><span>Big Tent Google+ page</span></a><span> for updates as the event unfolds. Later on, we&#8217;ll also upload video clips to the </span><a href="http://www.youtube.com/bigtent"><span>Big Tent YouTube channel</span></a><span>. We hope you&#8217;ll join us for exciting conversations about how to best keep the Internet free and open. </span></span></div><div><span><br /></span></div></b></span>]]></description>
				<content:encoded><![CDATA[<b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"><span style="font-family: Arial, Helvetica, sans-serif;"></span></b><br /><div dir="ltr" style="display: inline !important; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"><span style="font-family: Arial, Helvetica, sans-serif;"><b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"></b></span></b></div><div dir="ltr" style="display: inline !important; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"><span style="font-family: Arial, Helvetica, sans-serif;"><b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Posted by Susan Molinari, Vice President, Public Policy and Government Relations</span></b></span></b></div><span class="byline-author"><b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></b></span><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span class="byline-author"><b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">When we started holding our </span><a href="http://big-tent.appspot.com/en/" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Big Tent</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> events in London </span><a href="http://googleblog.blogspot.com/2011/05/inside-big-tent.html" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">two years ago</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, we wanted to stir up lively conversation about some of the hot topics relating to the Internet and society. After all, the political meaning of a </span><a href="http://en.wikipedia.org/wiki/Big_tent" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">“big tent”</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> is to attract diverse viewpoints to come together in one place. Since then, we’ve held more than 20 Big Tents on three different continents to debate issues ranging from arts and culture online to the economic impact of the web.</span></span></b></span></div><span class="byline-author"><b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></b></span><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span class="byline-author"><b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Later today, the Big Tent is </span><a href="http://www.google.com/events/bigtentdc2013/agenda.html" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">coming to Washington, D.C</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. for the first time. Along with our partner Bloomberg, we'll hear from some of the top names in media, government and the arts for discussions about one of the values we hold most dear: </span><a href="http://www.un.org/en/documents/udhr/index.shtml#a19" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">the right to free expression</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. </span></span></b></span></div><span class="byline-author"><b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></b></span><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span class="byline-author"><b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Can free speech survive in the digital age? At a time when too many governments deny their citizens the right to dissent, we’ll ask if the Internet is reaching its promise of empowering people around the world. We’ll have sessions on the limits to free speech online, national security in the Internet age, and creativity and freedom on the web. </span></span></b></span></div><span class="byline-author"><b id="docs-internal-guid-03bfdcf7-46be-1887-38b5-676211181a1e"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Google’s executive chairman Eric Schmidt and senior vice president and chief legal officer David Drummond will be joined by a variety of speakers, including former U.S. attorney general Alberto Gonzales, deputy secretary of homeland security Jane Holl Lute, Bloomberg chief content officer Norman Pearlstine, former New York Times executive editor Bill Keller, and Saudi Arabian comedian and YouTube star Omar Hussein. </span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Things kick off at 1:30pm EDT today—you can watch the entire event on </span><a href="http://bloomberg.com/livestream" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Bloomberg’s live stream</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> and tune in to the </span><a href="https://plus.google.com/+GoogleBigTent" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Big Tent Google+ page</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> for updates as the event unfolds. Later on, we’ll also upload video clips to the </span><a href="http://www.youtube.com/bigtent" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Big Tent YouTube channel</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. We hope you’ll join us for exciting conversations about how to best keep the Internet free and open. </span></span></div><div><span style="font-family: Arial; font-size: 13px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div></b></span>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/the-big-tent-comes-to-washington/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Transparency Report: More government removal requests than ever before</title>
		<link>https://googledata.org/uncategorized/transparency-report-more-government-removal-requests-than-ever-before-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=transparency-report-more-government-removal-requests-than-ever-before-2</link>
		<comments>https://googledata.org/uncategorized/transparency-report-more-government-removal-requests-than-ever-before-2/#comments</comments>
		<pubDate>Thu, 25 Apr 2013 16:08:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=a5220a373c6a0e6141c2535ab0c6830f</guid>
		<description><![CDATA[<span><span>Posted by Susan Infantino, Legal Director</span>&#160;</span><br /><span><br /></span><span>Three years ago when we <a href="http://googleblog.blogspot.com/2010/04/greater-transparency-around-government.html">launched</a> the <a href="http://www.google.com/transparencyreport">Transparency Report</a>, we said we hoped it would shine some light on the scale and scope of government requests for censorship and data around the globe. Today, for the seventh time, we&#8217;re releasing new numbers showing <a href="http://www.google.com/transparencyreport/removals/government/">requests from governments to remove content</a> from our services. From July to December 2012, we received 2,285 government requests to remove 24,179 pieces of content&#8212;an increase from the 1,811 requests to remove 18,070 pieces of content that we received during the first half of 2012.  </span><br /><span><br /></span><div><a href="http://2.bp.blogspot.com/-1SQIQxtu4OQ/UXlHVlGHNsI/AAAAAAAAMJ4/zwyDcGBE1RQ/s1600/13D7z7UpZ_1RSX1tDHDo_tyuxUwVmhzHYjarTjw.png"><span><img border="0" height="317" src="http://2.bp.blogspot.com/-1SQIQxtu4OQ/UXlHVlGHNsI/AAAAAAAAMJ4/zwyDcGBE1RQ/s400/13D7z7UpZ_1RSX1tDHDo_tyuxUwVmhzHYjarTjw.png" width="400"></span></a></div><span><br /></span><span>As we&#8217;ve gathered and released more data over time, it&#8217;s become increasingly clear that the scope of government attempts to censor content on Google services has grown. In more places than ever, we&#8217;ve been asked by governments to remove political content that people post on our services. In this particular time period, we received court orders in several countries to remove blog posts criticizing government officials or their associates.   You can read more about these requests by looking at the <a href="http://www.google.com/transparencyreport/removals/government/notes/?by=period">annotations</a> section of the Transparency Report. Of particular note were three occurrences that took place in the second half of 2012:  </span><br /><ul><li><span>There was a sharp increase in requests from <a href="http://www.google.com/transparencyreport/removals/government/BR/">Brazil</a>, where we received 697 requests to remove content from our platforms (of which 640 were court orders&#8212;meaning we received an average of 3.5 court orders per day during this time period), up from 191 during the first half of the year. The big reason for the spike was the <a href="http://en.wikipedia.org/wiki/Brazilian_municipal_elections,_2012">municipal elections</a>, which took place last fall. Nearly half of the total requests&#8212;316 to be exact&#8212;called for the removal of 756 pieces of content related to alleged violations of the <a href="http://www.planalto.gov.br/ccivil_03/leis/l4737.htm">Brazilian Electoral Code</a>, which forbids defamation and commentary that offends candidates. We&#8217;re appealing many of these cases, on the basis that the content is protected by freedom of expression under the Brazilian Constitution.</span></li><li><span>Another place where we saw an increase was from <a href="http://www.google.com/transparencyreport/removals/government/RU/">Russia</a>, where a <a href="http://www.bbc.co.uk/news/technology-20096274">new law took effect</a> last fall. In the first half of 2012, we received six requests, the most we had ever received in any given six-month period from Russia. But in the second half of the year, we received 114 requests to remove content&#8212;107 of them citing this new law. </span></li><li><span>During this period, we received inquiries from 20 countries regarding YouTube videos containing clips of the movie &#8220;Innocence of Muslims.&#8221; While the videos were within our <a href="http://www.youtube.com/t/community_guidelines">Community Guidelines</a>, we restricted videos from view in several countries in accordance with local law after receiving formal legal complaints. We also temporarily restricted videos from view in Egypt and Libya due to the particularly difficult circumstances there.</span></li></ul><span>We&#8217;ve also made a couple of improvements to the Transparency Report since our last update:  </span><br /><ul><li><span>We&#8217;re now breaking down government requests about YouTube videos to clarify whether we removed videos in response to government requests for violating Community Guidelines, or whether we restricted videos from view due to local laws. You can see the details by scrolling to the bottom of each country-specific page. </span></li><li><span>We&#8217;ve also refreshed the look of the <a href="http://www.google.com/transparencyreport/traffic">Traffic</a> section, making it easier to see where and when disruptions have occurred to Google services. You can see a map where our services are currently disrupted; you can see a map of all known disruptions since 2009; and you can more easily navigate between time periods and regions.</span></li></ul><span>The information we share on the Transparency Report is just a sliver of what happens on the Internet. But as we disclose more data and continue to expand it over time, we hope it helps draw attention to the laws around the world that govern the free flow of information online.  </span>]]></description>
				<content:encoded><![CDATA[<span style="font-family: Arial, Helvetica, sans-serif;"><span class="byline-author">Posted by Susan Infantino, Legal Director</span>&nbsp;</span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">Three years ago when we <a href="http://googleblog.blogspot.com/2010/04/greater-transparency-around-government.html">launched</a> the <a href="http://www.google.com/transparencyreport">Transparency Report</a>, we said we hoped it would shine some light on the scale and scope of government requests for censorship and data around the globe. Today, for the seventh time, we’re releasing new numbers showing <a href="http://www.google.com/transparencyreport/removals/government/">requests from governments to remove content</a> from our services. From July to December 2012, we received 2,285 government requests to remove 24,179 pieces of content—an increase from the 1,811 requests to remove 18,070 pieces of content that we received during the first half of 2012.  </span><br /><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-1SQIQxtu4OQ/UXlHVlGHNsI/AAAAAAAAMJ4/zwyDcGBE1RQ/s1600/13D7z7UpZ_1RSX1tDHDo_tyuxUwVmhzHYjarTjw.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="317" src="http://2.bp.blogspot.com/-1SQIQxtu4OQ/UXlHVlGHNsI/AAAAAAAAMJ4/zwyDcGBE1RQ/s400/13D7z7UpZ_1RSX1tDHDo_tyuxUwVmhzHYjarTjw.png" width="400" /></span></a></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">As we’ve gathered and released more data over time, it’s become increasingly clear that the scope of government attempts to censor content on Google services has grown. In more places than ever, we’ve been asked by governments to remove political content that people post on our services. In this particular time period, we received court orders in several countries to remove blog posts criticizing government officials or their associates.   You can read more about these requests by looking at the <a href="http://www.google.com/transparencyreport/removals/government/notes/?by=period">annotations</a> section of the Transparency Report. Of particular note were three occurrences that took place in the second half of 2012:  </span><br /><ul><li><span style="font-family: Arial, Helvetica, sans-serif;">There was a sharp increase in requests from <a href="http://www.google.com/transparencyreport/removals/government/BR/">Brazil</a>, where we received 697 requests to remove content from our platforms (of which 640 were court orders—meaning we received an average of 3.5 court orders per day during this time period), up from 191 during the first half of the year. The big reason for the spike was the <a href="http://en.wikipedia.org/wiki/Brazilian_municipal_elections,_2012">municipal elections</a>, which took place last fall. Nearly half of the total requests—316 to be exact—called for the removal of 756 pieces of content related to alleged violations of the <a href="http://www.planalto.gov.br/ccivil_03/leis/l4737.htm">Brazilian Electoral Code</a>, which forbids defamation and commentary that offends candidates. We’re appealing many of these cases, on the basis that the content is protected by freedom of expression under the Brazilian Constitution.</span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">Another place where we saw an increase was from <a href="http://www.google.com/transparencyreport/removals/government/RU/">Russia</a>, where a <a href="http://www.bbc.co.uk/news/technology-20096274">new law took effect</a> last fall. In the first half of 2012, we received six requests, the most we had ever received in any given six-month period from Russia. But in the second half of the year, we received 114 requests to remove content—107 of them citing this new law. </span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">During this period, we received inquiries from 20 countries regarding YouTube videos containing clips of the movie “Innocence of Muslims.” While the videos were within our <a href="http://www.youtube.com/t/community_guidelines">Community Guidelines</a>, we restricted videos from view in several countries in accordance with local law after receiving formal legal complaints. We also temporarily restricted videos from view in Egypt and Libya due to the particularly difficult circumstances there.</span></li></ul><span style="font-family: Arial, Helvetica, sans-serif;">We’ve also made a couple of improvements to the Transparency Report since our last update:  </span><br /><ul><li><span style="font-family: Arial, Helvetica, sans-serif;">We’re now breaking down government requests about YouTube videos to clarify whether we removed videos in response to government requests for violating Community Guidelines, or whether we restricted videos from view due to local laws. You can see the details by scrolling to the bottom of each country-specific page. </span></li><li><span style="font-family: Arial, Helvetica, sans-serif;">We’ve also refreshed the look of the <a href="http://www.google.com/transparencyreport/traffic">Traffic</a> section, making it easier to see where and when disruptions have occurred to Google services. You can see a map where our services are currently disrupted; you can see a map of all known disruptions since 2009; and you can more easily navigate between time periods and regions.</span></li></ul><span style="font-family: Arial, Helvetica, sans-serif;">The information we share on the Transparency Report is just a sliver of what happens on the Internet. But as we disclose more data and continue to expand it over time, we hope it helps draw attention to the laws around the world that govern the free flow of information online.  </span>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/transparency-report-more-government-removal-requests-than-ever-before-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>More momentum toward digital due process</title>
		<link>https://googledata.org/uncategorized/more-momentum-toward-digital-due-process/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=more-momentum-toward-digital-due-process</link>
		<comments>https://googledata.org/uncategorized/more-momentum-toward-digital-due-process/#comments</comments>
		<pubDate>Thu, 25 Apr 2013 15:01:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=cd4cad521952710bac6b6597e70c51c4</guid>
		<description><![CDATA[<b><span></span></b><br /><div dir="ltr"><b><span><b></b></span></b></div><div dir="ltr"><b><span><b><span>Posted by David Lieber, Privacy Policy Counsel</span></b></span></b></div><br /><b><span><br /><span></span><div dir="ltr"><span>Three years ago, Google </span><a href="http://googlepublicpolicy.blogspot.com/2010/05/important-step-toward-updating-ecpa.html"><span>helped found</span></a><span> a coalition </span><span>of technology companies, privacy advocates and academics to update the Electronic Communications Privacy Act (ECPA) of 1986. Today the </span><a href="http://digitaldueprocess.org/index.cfm?objectid=37940370-2551-11DF-8E02000C296BA163"><span>Digital Due Process coalition</span></a><span> includes more than 90 members, all devoted to bringing this federal law in line with how people use the web today.</span></div><br /><span></span><div dir="ltr"><span>ECPA no longer reflects the expectation of privacy that Google users and other users of the Internet reasonably have.</span><span> For example, an email may receive more robust privacy protections under ECPA depending on how old it is or whether it has been opened. The privacy of electronic communications should not hinge on such arbitrary factors. &#160;</span></div><br /><span></span><div dir="ltr"><span>Today, the Senate Judiciary Committee took a significant step toward updating ECPA by passing </span><a href="http://www.gpo.gov/fdsys/pkg/BILLS-113s607is/pdf/BILLS-113s607is.pdf"><span>legislation</span></a><span> that would require the government to obtain a warrant in order to compel service providers to disclose the content of emails and other electronic content that they store on behalf of users. The bill replaces a confusing array of distinctions that ECPA makes with a bright line, warrant-for-content rule.</span></div><br /><span></span><span>This is an important moment for all Internet users, and we&#8217;re deeply appreciative of Senators Leahy and Lee&#8217;s leadership in advancing this bill. We&#8217;ve also been </span><a href="http://googlepublicpolicy.blogspot.com/2013/03/testifying-before-us-house-of.html"><span>working closely</span></a><span> with the House Judiciary Committee on this issue and we look forward to continuing to work with Congress to update ECPA.</span></span></b>]]></description>
				<content:encoded><![CDATA[<b id="docs-internal-guid-37286f74-41ac-8af0-5cc8-2ae5d0ef7ea9"><span style="font-family: Arial, Helvetica, sans-serif;"></span></b><br /><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-37286f74-41ac-8af0-5cc8-2ae5d0ef7ea9"><span style="font-family: Arial, Helvetica, sans-serif;"><b id="docs-internal-guid-37286f74-41ac-8af0-5cc8-2ae5d0ef7ea9"></b></span></b></div><div dir="ltr" style="display: inline !important; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-37286f74-41ac-8af0-5cc8-2ae5d0ef7ea9"><span style="font-family: Arial, Helvetica, sans-serif;"><b id="docs-internal-guid-37286f74-41ac-8af0-5cc8-2ae5d0ef7ea9"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Posted by David Lieber, Privacy Policy Counsel</span></b></span></b></div><br /><b id="docs-internal-guid-37286f74-41ac-8af0-5cc8-2ae5d0ef7ea9"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Three years ago, Google </span><a href="http://googlepublicpolicy.blogspot.com/2010/05/important-step-toward-updating-ecpa.html" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">helped found</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> a coalition </span><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">of technology companies, privacy advocates and academics to update the Electronic Communications Privacy Act (ECPA) of 1986. Today the </span><a href="http://digitaldueprocess.org/index.cfm?objectid=37940370-2551-11DF-8E02000C296BA163" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Digital Due Process coalition</span></a><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> includes more than 90 members, all devoted to bringing this federal law in line with how people use the web today.</span></div><br /><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">ECPA no longer reflects the expectation of privacy that Google users and other users of the Internet reasonably have.</span><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> For example, an email may receive more robust privacy protections under ECPA depending on how old it is or whether it has been opened. The privacy of electronic communications should not hinge on such arbitrary factors. &nbsp;</span></div><br /><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Today, the Senate Judiciary Committee took a significant step toward updating ECPA by passing </span><a href="http://www.gpo.gov/fdsys/pkg/BILLS-113s607is/pdf/BILLS-113s607is.pdf" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">legislation</span></a><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> that would require the government to obtain a warrant in order to compel service providers to disclose the content of emails and other electronic content that they store on behalf of users. The bill replaces a confusing array of distinctions that ECPA makes with a bright line, warrant-for-content rule.</span></div><br /><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">This is an important moment for all Internet users, and we’re deeply appreciative of Senators Leahy and Lee’s leadership in advancing this bill. We’ve also been </span><a href="http://googlepublicpolicy.blogspot.com/2013/03/testifying-before-us-house-of.html" style="text-decoration: none;"><span style="background-color: white; color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">working closely</span></a><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> with the House Judiciary Committee on this issue and we look forward to continuing to work with Congress to update ECPA.</span></span></b>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/more-momentum-toward-digital-due-process/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>YouTube wins case against Viacom (again)</title>
		<link>https://googledata.org/youtube/youtube-wins-case-against-viacom-again/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=youtube-wins-case-against-viacom-again</link>
		<comments>https://googledata.org/youtube/youtube-wins-case-against-viacom-again/#comments</comments>
		<pubDate>Thu, 18 Apr 2013 22:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[Youtube]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=a19d152f397fd03c557ab4d0ad5df1ec</guid>
		<description><![CDATA[Posted by Kent Walker, Senior Vice President &#38; General Counsel, Google<br />&#160;<br /><i>Cross-posted from the<a href="http://youtube-global.blogspot.com/2013/04/youtube-wins-case-against-viacom-again.html"> </a><i><span><a href="http://youtube-global.blogspot.com/2013/04/youtube-wins-case-against-viacom-again.html">Official YouTube Blog</a>&#160;</span></i></i><br /><br />Today is an important day for the Internet. For the second time, a <a href="https://docs.google.com/file/d/0B9-CavY2321RSHpYRjNseDhqTWM/edit">federal court</a> correctly rejected Viacom&#8217;s lawsuit against YouTube.  This is a win not just for YouTube, but for the billions of people worldwide who depend on the web to freely exchange ideas and information.<br /><br />In enacting the Digital Millennium Copyright Act, Congress effectively balanced the public interest in free expression with the rights of copyright holders. The court today reaffirmed an established judicial consensus that the DMCA protects web platforms like YouTube that work with rightsholders and take appropriate steps to remove user-generated content that  rightsholders notify them is infringing.<br /><br />The growing YouTube community includes not only a billion individual users, but tens of thousands of partners who earn revenue from the platform -- from independent musicians and creators to some of the world&#8217;s biggest record labels, movie studios, and news organizations. Today&#8217;s decision recognizes YouTube as a thriving and vibrant forum for all these users, creators and consumers alike.  Today is an important day for the Internet.]]></description>
				<content:encoded><![CDATA[Posted by Kent Walker, Senior Vice President &amp; General Counsel, Google<br />&nbsp;<br /><i>Cross-posted from the<a href="http://youtube-global.blogspot.com/2013/04/youtube-wins-case-against-viacom-again.html"> </a><i><span style="color: blue;"><a href="http://youtube-global.blogspot.com/2013/04/youtube-wins-case-against-viacom-again.html">Official YouTube Blog</a>&nbsp;</span></i></i><br /><br />Today is an important day for the Internet. For the second time, a <a href="https://docs.google.com/file/d/0B9-CavY2321RSHpYRjNseDhqTWM/edit">federal court</a> correctly rejected Viacom’s lawsuit against YouTube.  This is a win not just for YouTube, but for the billions of people worldwide who depend on the web to freely exchange ideas and information.<br /><br />In enacting the Digital Millennium Copyright Act, Congress effectively balanced the public interest in free expression with the rights of copyright holders. The court today reaffirmed an established judicial consensus that the DMCA protects web platforms like YouTube that work with rightsholders and take appropriate steps to remove user-generated content that  rightsholders notify them is infringing.<br /><br />The growing YouTube community includes not only a billion individual users, but tens of thousands of partners who earn revenue from the platform -- from independent musicians and creators to some of the world’s biggest record labels, movie studios, and news organizations. Today’s decision recognizes YouTube as a thriving and vibrant forum for all these users, creators and consumers alike.  Today is an important day for the Internet.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/youtube/youtube-wins-case-against-viacom-again/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Improving software patent quality to support innovation</title>
		<link>https://googledata.org/google-public-policy/improving-software-patent-quality-to-support-innovation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=improving-software-patent-quality-to-support-innovation</link>
		<comments>https://googledata.org/google-public-policy/improving-software-patent-quality-to-support-innovation/#comments</comments>
		<pubDate>Tue, 16 Apr 2013 18:31:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=ea9a16a8179fcf00b9072553eb68d341</guid>
		<description><![CDATA[<b></b><br /><div dir="ltr"><b><b></b></b></div><div dir="ltr"><b><b><span><span>Posted by Suzanne Michel, Senior Patent Counsel</span></span></b></b></div><br /><b><span><br /><span></span></span><div dir="ltr"><span><span>We filed <a href="https://docs.google.com/file/d/0BwxyRPFduTN2RFVrZ25aSkZGcVE/edit?usp=sharing">comments</a> yesterday with the U.S. Patent and Trademark Office (PTO) on software patent quality, where we argue that better application of </span><a href="https://docs.google.com/a/google.com/file/d/0BwxyRPFduTN2YmoyaVNNQkpLTGM/edit"><span>established legal principles</span></a><span> can help reduce the number of vague, overbroad software patents issued. We think this will protect real innovation while helping to solve some growing problems in the patent system.</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Many software patents are so broad as to claim every way of doing something on a computer. And the boundaries of these patents are often unclear. The Patent Office would never permit a patent that covered &#8220;any combination of molecules to treat a headache with a pill,&#8221; but it regularly does this by allowing software patent claims covering only a goal&#8212;not an inventive solution.</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>By more consistently applying legal rules that require specificity around functional software claims, the PTO can ensure that software patents reward and protect the creative work of building great software products&#8212;not just coming up with vague or abstract ideas.</span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>We filed our comments in response to the PTO&#8217;s ne</span><span>w</span><a href="http://www.uspto.gov/patents/init_events/software_partnership.jsp"><span> </span><span>partnership with the software community</span></a><span> and its recent </span><span>call for</span><a href="https://www.federalregister.gov/articles/2013/01/15/2013-00690/request-for-comments-on-preparation-of-patent-applications"><span> </span><span>public comment</span></a><span> on improving patent quality</span><span>. </span><span>We commend the PTO&#8217;s efforts in this area and look forward to working constructively with the agency in the future. </span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>In our comments, we also suggest that the PTO consider how improved technical training for patent examiners, expanded </span><a href="http://googlepublicpolicy.blogspot.com/2012/08/improving-google-patents-with-european.html"><span>prior art databases</span></a><span>, and standardized terminology used across all software patent applications can help improve quality. </span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>Improving software patent quality is critically important to innovation, which is under attack by patent assertion entities (also known as patent trolls). Trolls don&#8217;t make anything; they simply use patents to extract money&#8212;almost </span><a href="http://www.bu.edu/law/faculty/scholarship/workingpapers/documents/BessenJ_MeurerM062512rev062812.pdf"><span>$30 billion a year</span></a><span>&#8212;from productive companies through litigation. Trolls often target </span><a href="http://www.patentlyo.com/patent/2013/03/chien-patent-trolls.html"><span>startups and small businesses</span></a><span> that lack the resources or expertise to effectively deal with such lawsuits. </span></span></div><span><br /><span></span></span><div dir="ltr"><span><span>The trolls&#8217; weapons of choice are low-quality software patents: today, most patent litigation is brought by trolls, and about </span><a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2215867&#38;download=yes"><span>82% of those suits</span></a><span> involve software. There is no single fix to the troll problem, but improving software patent quality will help stem the tide while also supporting real innovation.</span></span></div><br /><span></span><br /><span></span><br /><span></span><br /><span></span></b>]]></description>
				<content:encoded><![CDATA[<b id="docs-internal-guid-69115b62-1417-7901-2d35-530e0450c64c"></b><br /><div dir="ltr" style="line-height: 1; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-69115b62-1417-7901-2d35-530e0450c64c"><b id="docs-internal-guid-69115b62-1417-7901-2d35-530e0450c64c"></b></b></div><div dir="ltr" style="display: inline !important; line-height: 1; margin-bottom: 0pt; margin-top: 0pt;"><b id="docs-internal-guid-69115b62-1417-7901-2d35-530e0450c64c"><b id="docs-internal-guid-69115b62-1417-7901-2d35-530e0450c64c"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Posted by Suzanne Michel, Senior Patent Counsel</span></span></b></b></div><br /><b id="docs-internal-guid-69115b62-1417-7901-2d35-530e0450c64c"><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">We filed <a href="https://docs.google.com/file/d/0BwxyRPFduTN2RFVrZ25aSkZGcVE/edit?usp=sharing">comments</a> yesterday with the U.S. Patent and Trademark Office (PTO) on software patent quality, where we argue that better application of </span><a href="https://docs.google.com/a/google.com/file/d/0BwxyRPFduTN2YmoyaVNNQkpLTGM/edit" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">established legal principles</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> can help reduce the number of vague, overbroad software patents issued. We think this will protect real innovation while helping to solve some growing problems in the patent system.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">Many software patents are so broad as to claim every way of doing something on a computer. And the boundaries of these patents are often unclear. The Patent Office would never permit a patent that covered “any combination of molecules to treat a headache with a pill,” but it regularly does this by allowing software patent claims covering only a goal—not an inventive solution.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"><span style="font-family: Arial, Helvetica, sans-serif;">By more consistently applying legal rules that require specificity around functional software claims, the PTO can ensure that software patents reward and protect the creative work of building great software products—not just coming up with vague or abstract ideas.</span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">We filed our comments in response to the PTO’s ne</span><span style="background-color: white; color: #333333; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">w</span><a href="http://www.uspto.gov/patents/init_events/software_partnership.jsp" style="text-decoration: none;"><span style="background-color: white; color: #333333; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: white; color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">partnership with the software community</span></a><span style="background-color: white; color: #333333; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> and its recent </span><span style="color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">call for</span><a href="https://www.federalregister.gov/articles/2013/01/15/2013-00690/request-for-comments-on-preparation-of-patent-applications" style="text-decoration: none;"><span style="color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">public comment</span></a><span style="color: #222222; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> on improving patent quality</span><span style="background-color: white; color: #333333; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">. </span><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">We commend the PTO’s efforts in this area and look forward to working constructively with the agency in the future. </span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">In our comments, we also suggest that the PTO consider how improved technical training for patent examiners, expanded </span><a href="http://googlepublicpolicy.blogspot.com/2012/08/improving-google-patents-with-european.html" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">prior art databases</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">, and standardized terminology used across all software patent applications can help improve quality. </span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Improving software patent quality is critically important to innovation, which is under attack by patent assertion entities (also known as patent trolls). Trolls don’t make anything; they simply use patents to extract money—almost </span><a href="http://www.bu.edu/law/faculty/scholarship/workingpapers/documents/BessenJ_MeurerM062512rev062812.pdf" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">$30 billion a year</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">—from productive companies through litigation. Trolls often target </span><a href="http://www.patentlyo.com/patent/2013/03/chien-patent-trolls.html" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">startups and small businesses</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> that lack the resources or expertise to effectively deal with such lawsuits. </span></span></div><span style="font-family: Arial, Helvetica, sans-serif;"><br /><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span><div dir="ltr" style="line-height: 1; margin-bottom: 0pt; margin-top: 0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">The trolls’ weapons of choice are low-quality software patents: today, most patent litigation is brought by trolls, and about </span><a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2215867&amp;download=yes" style="text-decoration: none;"><span style="color: #1155cc; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">82% of those suits</span></a><span style="font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"> involve software. There is no single fix to the troll problem, but improving software patent quality will help stem the tide while also supporting real innovation.</span></span></div><br /><span style="font-family: Arial; font-size: 13px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="font-family: Arial; font-size: 13px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="font-family: Arial; font-size: 13px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="font-family: Arial; font-size: 13px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span></b>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/improving-software-patent-quality-to-support-innovation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Beyond the Password: Protecting Your Online Identity</title>
		<link>https://googledata.org/google-public-policy/beyond-the-password-protecting-your-online-identity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=beyond-the-password-protecting-your-online-identity</link>
		<comments>https://googledata.org/google-public-policy/beyond-the-password-protecting-your-online-identity/#comments</comments>
		<pubDate>Fri, 12 Apr 2013 18:47:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=c03f496cf47874f81a7a79ea9023f04a</guid>
		<description><![CDATA[Posted by David Lieber, Public Policy Team&#160;Just like burglars and thieves, cyber criminals have many different ways to steal personal information and money. Consumers and technical experts alike are awakening to the reality that passwords - even t...]]></description>
				<content:encoded><![CDATA[<span data-mce-style="font-family: arial, helvetica, sans-serif;"><span style="font-family: Arial, Helvetica, sans-serif;">Posted by David Lieber, Public Policy Team&nbsp;</span></span><br /><span data-mce-style="font-family: arial, helvetica, sans-serif;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #222222;">Just like burglars and thieves, cyber criminals have many different ways to steal personal information and money. Consumers and technical experts alike are awakening to the reality that passwords - even those that are developed in ways that reduce the likelihood of a breach - are&nbsp;</span><a href="http://www.wired.com/gadgetlab/2012/11/ff-mat-honan-password-hacker/all/" style="background-color: white; color: #1155cc;" >not the cure-all for online security</a><span style="background-color: white; color: #222222;">.</span></span><br /><span style="color: #222222; font-family: Arial, Helvetica, sans-serif;"><br /></span><div style="background-color: white; color: #222222;"><span style="font-family: Arial, Helvetica, sans-serif;">Last year,&nbsp;<i>Wired</i>&nbsp;senior writer Mat Honan drew attention worldwide for his first-person account of having his online identity hijacked -- a story that spurred a conversation about passwords and online privacy and security. &nbsp;On&nbsp;<span class="aBn" data-term="goog_660444997" style="border-bottom-color: rgb(204, 204, 204); border-bottom-style: dashed; border-bottom-width: 1px; position: relative; top: -2px; z-index: 0;" tabindex="0"><span class="aQJ" style="position: relative; top: 2px; z-index: -1;">Wednesday, April 17th</span></span>, Google DC is hosting a talk with FTC Commissioner Maureen Ohlhausen on data security, followed by a fireside chat with Mat Honan and security experts to discuss security challenges and the solutions that companies are working on to protect consumers against existing and emerging threats.&nbsp;</span></div><div style="background-color: white; color: #222222;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div><div style="background-color: white; color: #222222;"><span style="font-family: Arial, Helvetica, sans-serif;">Beyond the Password: Protecting Your Online Identity</span></div><div style="background-color: white; color: #222222;"><span style="font-family: Arial, Helvetica, sans-serif;">Wednesday, April 17th</span></div><div style="background-color: white; color: #222222;"><span style="font-family: Arial, Helvetica, sans-serif;">5:00 PM - 6:00 PM</span></div><div style="background-color: white; color: #222222;"><a data-mce-href="https://maps.google.com/maps?q=google+dc&amp;ie=UTF-8&amp;ei=D2xlUfHgItWo4AOt34DoCw&amp;ved=0CAsQ_AUoAg" href="https://maps.google.com/maps?q=google+dc&amp;ie=UTF-8&amp;ei=D2xlUfHgItWo4AOt34DoCw&amp;ved=0CAsQ_AUoAg" style="font-family: Arial, Helvetica, sans-serif;">Google DC</a></div><div style="background-color: white; color: #222222;"><span data-mce-style="font-family: arial, helvetica, sans-serif; font-size: 12px;" style="background-color: transparent; font-family: Arial, Helvetica, sans-serif;"><br /></span></div><div style="background-color: white; color: #222222;"><span data-mce-style="font-family: arial, helvetica, sans-serif; font-size: 12px;" id="internal-source-marker_0.947784127201885" style="background-color: transparent; font-family: Arial, Helvetica, sans-serif;">If you are in the DC area, p</span><em style="font-family: Arial, Helvetica, sans-serif; font-style: normal; line-height: 16px;">lease join us</em><span style="font-family: Arial, Helvetica, sans-serif; line-height: 16px;">&nbsp;for an engaging discussion about</span><span style="background-color: transparent; font-family: Arial, Helvetica, sans-serif;">&nbsp;protecting your online&nbsp;</span><span style="background-color: transparent; font-family: Arial, Helvetica, sans-serif;">identity. RSVP by</span><span style="background-color: transparent; font-family: Arial, Helvetica, sans-serif;">&nbsp;clicking</span><span style="background-color: transparent; font-family: Arial, Helvetica, sans-serif;">&nbsp;</span><span data-mce-style="color: #3369e8;" style="background-color: transparent; color: #3369e8; font-family: Arial, Helvetica, sans-serif;"><span data-mce-style="color: #3369e8;"><a data-mce-href="https://docs.google.com/forms/d/178aHrZI9gSZWKMtT9Tcx5AF6LUikwZhjFcU_Vk8xHhc/viewform" href="https://docs.google.com/forms/d/178aHrZI9gSZWKMtT9Tcx5AF6LUikwZhjFcU_Vk8xHhc/viewform">here</a></span></span><span style="background-color: transparent; font-family: Arial, Helvetica, sans-serif;">.</span></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/beyond-the-password-protecting-your-online-identity/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Plan your digital afterlife with Inactive Account Manager</title>
		<link>https://googledata.org/google-public-policy/plan-your-digital-afterlife-with-inactive-account-manager/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=plan-your-digital-afterlife-with-inactive-account-manager</link>
		<comments>https://googledata.org/google-public-policy/plan-your-digital-afterlife-with-inactive-account-manager/#comments</comments>
		<pubDate>Thu, 11 Apr 2013 16:05:00 +0000</pubDate>
		<dc:creator><![CDATA[Google Public Policy Blog]]></dc:creator>
				<category><![CDATA[Google Public Policy]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[google policy]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=76df47c081c6409a3950dba32d492869</guid>
		<description><![CDATA[Posted by Andreas Tuerk, Product Manager<br /><br />Not many of us like thinking about death &#8212; especially our own. But making plans for what happens after you&#8217;re gone is really important for the people you leave behind. So today, we&#8217;re launching a new feature that makes it easy to tell Google what you want done with your digital assets when you die or can no longer use your account.<br /><br />The feature is called <a href="https://www.google.com/settings/u/0/account/inactive">Inactive Account Manager</a> &#8212; not a great name, we know &#8212; and you&#8217;ll find it on your Google Account settings <a href="https://www.google.com/settings/account">page</a>. You can tell us what to do with your Gmail messages and data from several other Google services if your account becomes inactive for any reason.<br /><br />For example, you can choose to have your data deleted &#8212; after three, six, nine or 12 months of inactivity. Or you can select trusted contacts to receive data from some or all of the following services: +1s; Blogger; Contacts and Circles; Drive; Gmail; Google+ Profiles, Pages and Streams; Picasa Web Albums; Google Voice and YouTube. Before our systems take any action, we&#8217;ll first warn you by sending a text message to your cellphone and email to the secondary address you&#8217;ve provided.<br /><br />We hope that this new feature will enable you to plan your digital afterlife &#8212; in a way that protects your privacy and security &#8212; and make life easier for your loved ones after you&#8217;re gone.<br /><br /><div>&#160;    <a href="http://1.bp.blogspot.com/-Pzln426zkF4/UWbYUPeXUfI/AAAAAAAABjY/JESTsvoaL8I/s1600/iam_intro.png"><img border="0" height="310" src="http://1.bp.blogspot.com/-Pzln426zkF4/UWbYUPeXUfI/AAAAAAAABjY/JESTsvoaL8I/s400/iam_intro.png" width="400"></a></div>]]></description>
				<content:encoded><![CDATA[Posted by Andreas Tuerk, Product Manager<br /><br />Not many of us like thinking about death — especially our own. But making plans for what happens after you’re gone is really important for the people you leave behind. So today, we’re launching a new feature that makes it easy to tell Google what you want done with your digital assets when you die or can no longer use your account.<br /><br />The feature is called <a href="https://www.google.com/settings/u/0/account/inactive">Inactive Account Manager</a> — not a great name, we know — and you’ll find it on your Google Account settings <a href="https://www.google.com/settings/account">page</a>. You can tell us what to do with your Gmail messages and data from several other Google services if your account becomes inactive for any reason.<br /><br />For example, you can choose to have your data deleted — after three, six, nine or 12 months of inactivity. Or you can select trusted contacts to receive data from some or all of the following services: +1s; Blogger; Contacts and Circles; Drive; Gmail; Google+ Profiles, Pages and Streams; Picasa Web Albums; Google Voice and YouTube. Before our systems take any action, we’ll first warn you by sending a text message to your cellphone and email to the secondary address you’ve provided.<br /><br />We hope that this new feature will enable you to plan your digital afterlife — in a way that protects your privacy and security — and make life easier for your loved ones after you’re gone.<br /><br /><div style="text-align: center;">&nbsp;    <a href="http://1.bp.blogspot.com/-Pzln426zkF4/UWbYUPeXUfI/AAAAAAAABjY/JESTsvoaL8I/s1600/iam_intro.png" imageanchor="1"><img border="0" height="310" src="http://1.bp.blogspot.com/-Pzln426zkF4/UWbYUPeXUfI/AAAAAAAABjY/JESTsvoaL8I/s400/iam_intro.png" width="400" /></a></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-public-policy/plan-your-digital-afterlife-with-inactive-account-manager/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
	</channel>
</rss>
