Tuesday , August 16 2022

Google eliminated 3,000 million links to piracy combat – News Technology – Technology


Google removed more than 3,000 million URL links – unique web site addresses – 2017 in its fight against piracy, according to the report "How Google Combates Piracy."

Although, according to the document, network piracy "has decreased around the world", The search engine has continued to eliminate these links for the benefit of copyright holders.

The report, which includes the programs, policies and technologies used to combat illegal use of content on the Internet, also ensures that revenue from rights holders has reached "historically high"

This is demonstrated by the over $ 3,000 million paid for content management through Content ID.

This system, which has been recognized as an "innovative management tool", enables collaboration between Google and the authors to create a large database of protected materials where you can compare any publication and determine its possible illegality.

For example, YouTube has invested more than $ 100 million for the implementation of Content ID.
The result was positive because the advertising revenue received was exceeded, in the last year $ 1800 million was paid to the music industry.

Google removed from its ad network more than 91,000 domains that made "inappropriate use" of protected materials. The number of ads not approved for copyright infringement suspicions – or containing links to intrusion sites – was raised to 10 million.

In the case of Google Play, the download software platform, registered in 2017, was removed up to 250,000 apps.

To protect the storage service in Drive, there is also a team working full time.

In addition, Google has identified five principles to base its investments against piracy:

  • Create better legal options: Because, according to the report, "it's much less interesting when it's easy to find legitimate options."

  • Follow the money: Elimination of income from criminal organizations benefiting from piracy.

  • Be effective, efficient and scalable.

  • Protect from abuse.

  • Provide transparency


Source link