Browse Definitions :
Definition

search neutrality

Search neutrality is the concept that the rules for net neutrality, as stated in the Open Internet Order of 2010, should be applied to search engines. An important goal of search neutrality efforts is to ensure that an engine's organic search results do not favor the company that owns the search engine or the company's partners.

When a search engine company's practices are anti-competitive, it potentially violates anti-trust laws that have been put in place to promote fair competition. Proponents of search neutrality are concerned that without oversight, large companies that provide consumers with organic search results are legally free to favor their own products and services and those of their business partners.

In 2012, the Federal Trade Commission (FTC) concluded that Google Inc. conducted business in ways that harmed internet users and prevented competition. In a settlement, Google agreed that online advertisers could manage ad campaigns on Google’s AdWords platform and on rival ad platforms simultaneously. Google also agreed to refrain from promoting its own and its partner offerings in vertical search results.

As of this writing, the European Commission (EC) has brought anti-trust charges against Google that allege the company is abusing its dominance in search to favor websites that use Google's own Ad Sense advertising business to place ads on web pages. The Commission is also investigating whether Google gives preference to its own products, including Google Search and Chrome, in its Android operating system.

This was last updated in April 2017

Continue Reading About search neutrality

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close