Browse Definitions :
Definition

search neutrality

Contributor(s): Matthew Haughn

Search neutrality is the concept that the rules for net neutrality, as stated in the Open Internet Order of 2010, should be applied to search engines. An important goal of search neutrality efforts is to ensure that an engine's organic search results do not favor the company that owns the search engine or the company's partners.

When a search engine company's practices are anti-competitive, it potentially violates anti-trust laws that have been put in place to promote fair competition. Proponents of search neutrality are concerned that without oversight, large companies that provide consumers with organic search results are legally free to favor their own products and services and those of their business partners.

In 2012, the Federal Trade Commission (FTC) concluded that Google Inc. conducted business in ways that harmed internet users and prevented competition. In a settlement, Google agreed that online advertisers could manage ad campaigns on Google’s AdWords platform and on rival ad platforms simultaneously. Google also agreed to refrain from promoting its own and its partner offerings in vertical search results.

As of this writing, the European Commission (EC) has brought anti-trust charges against Google that allege the company is abusing its dominance in search to favor websites that use Google's own Ad Sense advertising business to place ads on web pages. The Commission is also investigating whether Google gives preference to its own products, including Google Search and Chrome, in its Android operating system.

This was last updated in April 2017

Continue Reading About search neutrality

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close