Google in China: Corporate Responsibility on a Censored Internet

Google in China: Corporate Responsibility on a Censored Internet

Richard A. Spinello (Boston College, USA)
DOI: 10.4018/978-1-61350-132-0.ch011
OnDemand PDF Download:


This chapter, focusing primarily on the search engine company Google, treats the normative issue of how U.S. or European companies should respond when asked to abet the efforts of countries like China or Iran in their efforts to censor the Web. Should there be international laws to prevent these technology companies from yielding to the demands of totalitarian regimes? We argue that such laws would be reactive and ineffectual and that the optimal solution is proactive corporate self-regulation that gives careful prominence to moral reasoning. Our moral analysis concludes that a socially responsible company must not cooperate with implementing the censorship regimes of these repressive sovereignties. This conclusion is based on natural law reasoning and on the moral salience that must be given to the ideal of universal human rights, including the natural right of free expression.
Chapter Preview


Since the 1990’s the technology landscape has been dominated by Internet gatekeepers which provide tools like search engines and portals that help users access and navigate the Internet. As Yahoo, Microsoft, and Google have expanded into markets like China or Saudi Arabia they have been asked to support various censorship laws and other online restrictions. Yahoo, for example, signed a self-discipline pledge when it entered the Chinese market, promising to abide by Chinese censorship law. Social media sites like Facebook are likely to face similar censorship requirements in the near future.

Despite the Internet’s great promise as a borderless global technology and a free marketplace of ideas, there has been considerable friction between the speech enabled by Internet technologies and the laws of authoritarian countries which define their culture in a more paternalistic fashion. Cyberspace was supposed to be an open environment where anyone could express their opinions, start a new business, or create a web site. Its end-to-end design created an environment conducive to liberty and democracy, with unfettered access to information. As the U.S. Supreme Court eloquently wrote in its Reno v. ACLU (1997, p. 857) decision, the Internet enables an ordinary citizen to become “a pamphleteer, . . .a town crier with a voice that resonates farther than it could from any soapbox”. But a lethal combination of stringent law and software code in the form of filtering programs has enabled authoritarian societies to effectively undermine the Internet’s libertarian ethos.

Many Western companies have been forced by these foreign governments to help regulate activities in cyberspace as a condition of doing business within that country. This regulation most often comes in the form of code, filtering software which allows a sovereign nation to restrict its citizens from accessing or disseminating certain information on the Internet. In China, data is transmitted over the Internet through fiber-optic networks controlled by routers, and those routers controlling the flow that data are configured to filter out certain web sites that have blacklisted terms. This system has been called the “great firewall of China”. Internet gatekeepers, which provide a service such as online access or search results, cannot subvert this firewall if they expect to do business in China. Countries like Iran and Saudi Arabia deploy similar techniques. The gatekeepers along with other technology and social media companies are caught in a vice between countries exercising their legitimate sovereignty and individual citizens seeking to exercise their basic speech rights. It was once thought that states would have a difficult time enforcing their sovereignty in cyberspace but, thanks to code such as filtering software, freedom of expression is threatened by state power often assisted by private companies. But states are re-asserting their authority and demanding compliance with local law. As a result, the Internet loses some of its “generative” potential as a viable force for semiotic democracy (Zittrain, 2003).

The Internet gatekeepers are especially vulnerable and must find ways to responsibly navigate this perilous virtual terrain. Their corporate strategies, oriented to rapid global expansion, cannot ignore the question of the Internet’s role in authoritarian societies like China, Iran, and Cuba. The problem is exacerbated by the lack of international laws that govern cyberspace along with the policy disputes that prevent the dissemination of anti-censorship technologies. Without the guidance of law, companies must determine whether to side with the host government or with many of their citizens who have a different conception about free speech.

Google’s unfortunate experience in China will be the main springboard for our discussion, but we will also take into account the practices of companies like Microsoft and Yahoo. After briefly reviewing some background on Google, which is attracted to foreign markets by the need to sustain its economic growth, we will turn to the legal issues and the prospects that there may be some legal resolution on the horizon. We conclude that those prospects are dim and that corporate self-regulation is essential in the face of this policy vacuum. Ethical self-regulation subjugates rational self interest to the legitimate needs and rights of others and, above all, respect for the common good of the Internet community.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Scott Hilberg
Alfreda Dudley, James Braman, Giovanni Vincenti
Alfreda Dudley, James Braman, Giovanni Vincenti
Chapter 1
Ugo Pagallo
This chapter focuses on some of the most relevant issues in today’s data protection: responsibility and jurisdiction are examined in the light of... Sample PDF
Responsibility, Jurisdiction, and the Future of “Privacy by Design”
Chapter 2
Gráinne Kirwan, Andrew Power
Hacking is an activity which has long been tied with ethical and legal complications. The term has evolved to have both ethical and unethical... Sample PDF
Hacking: Legal and Ethical Aspects of an Ambiguous Activity
Chapter 3
Sean M. Zadig, Gurvirender Tejay
The issue of cybercrime has received much attention of late, as individual and organizational losses from online crimes frequently reach into the... Sample PDF
Emerging Cybercrime Trends: Legal, Ethical, and Practical Issues
Chapter 4
Anteneh Ayanso, Tejaswini Herath
Historical incidents have taught organizations several key lessons on computer crimes. The complexity of the current technology environment dictates... Sample PDF
Law and Technology at Crossroads in Cyberspace: Where Do We Go From Here?
Chapter 5
Lee Gillam, Anna Vartapetiance
Cyberspace offers up numerous possibilities for entertainment and leisure, and can be a rich source for information. Unfortunately, it can also be a... Sample PDF
Cyber Law, Cyber Ethics and Online Gambling
Chapter 6
Miguel A. Garcia-Ruiz, Miguel Vargas Martin, Patrik Olsson
It appears that child pornography distribution and child abuses on the Internet have permeated to massively multiplayer online role-playing video... Sample PDF
An Overview of Child Abuses in 3D Social Networks and Online Video Games
Chapter 7
Andrew Power, Gráinne Kirwan
The development of a legal environment for virtual worlds presents issues of both law and ethics. The cross-border nature of online law and... Sample PDF
Ethics and Legal Aspects of Virtual Worlds
Chapter 8
Ananda Mitra
enumeration of these attributes of the narbs produce a narb weight and a narb matrix which can be examined numerically to provide a preliminary... Sample PDF
Narbs as a Measure and Indicator of Identity Narratives
Chapter 9
Jean-Philippe Moiny
As the author of this chapter is a European jurist, European law constitutes the point of departure of the reflections, and can be sometimes (titles... Sample PDF
Cloud Based Social Network Sites: Under Whose Control?
Chapter 10
Anne Gerdes
This chapter investigates al-Qaeda’s use of Web 2.0 as a tool for radicalization and recruitment. The media network of al-Qaeda is described in... Sample PDF
Al-Qaeda on Web 2.0: Radicalization and Recruitment Strategies
Chapter 11
Richard A. Spinello
This chapter, focusing primarily on the search engine company Google, treats the normative issue of how U.S. or European companies should respond... Sample PDF
Google in China: Corporate Responsibility on a Censored Internet
Chapter 12
Jonathan Bishop
Constitutional and Administrative Law is a core component of legal studies throughout the world, but to date little has been written about how this... Sample PDF
All’s WELL that Ends WELL: A Comparative Analysis of the Constitutional and Administrative Frameworks of Cyberspace and the United Kingdom
Chapter 13
Sam De Silva
The development of the Internet raises challenges in the application of defamation, given that the click of a mouse can communicate a defamatory... Sample PDF
A UK Law Perspective: Defamation Law as it Applies on the Internet
Chapter 14
Eugenia Alexandropoulou-Egyptiadou
The huge financial rewards that may be gained from software sales have resulted in computer piracy, an increasing worldwide phenomenon. This... Sample PDF
The Hellenic Framework for Computer Program Copyright Protection Following the Implementation of the Relative European Union Directives
Chapter 15
Radomír Jakab
As can be derived from its name, Internet advertising means any form of promoting products or services through the Internet. This form of... Sample PDF
Internet Advertising: Legal Aspects in the European Union
About the Contributors