Google Bans Ads Linking To Hacked Political Content

Google is taking action to prevent major interference in the 2020 US Presidential election, by blocking advertising that contain hacked political content. The new rules will come into effect on September 1. 

Once enforced, third-party entities won't be able to purchase ad space inside the Google Ads platform that link directly or indirectly to hacked content that was obtained from a political entity. Ads linking to news articles or other pages discussing the hacked political content are allowed, as long as the article or page to which the ad links does not link itself to the hacked political content.

The move appears designed to prevent a re-run of the lead-up to the last election, when damaging materials were leaked online by Russian hackers and then published and republished by third-party sites to help scupper Democrat hopes.
Twitter has since 2018 banned the spread of all hacked content on its platform including anything political-related.

The Google Ads Hacked political materials policy will applied first to ads covered by the tech giant’s US election ads policy. Google says the rules apply to the following: “Ads that directly facilitate or advertise access to hacked material related to political entities within scope of Google's election advertising policy. This applies to all protected material that was obtained through the unauthorized intrusion or access of a computer, computer network, or personal electronic device, even if distributed by a third party.”

Google will, however, allow “discussion of or commentary on” any hacked content as long as the ad or landing page doesn’t allow direct access to it. Any entity violating the policy will be notified seven days before their account is suspended.

Google also announced a policy to ban advertisers that try to conceal their identities whilst promoting social, political and other issues. This follows last November’s announcement that it was restricting political advertising to ban deepfake content and “ads or destinations making demonstrably false claims that could significantly undermine participation or trust in an electoral or democratic process.” It has also limited targeted advertising to “age, gender, and general location.”

Even with these new steps, US tech giants could be fighting a losing battle against misinformation ahead of the election, which could be the most divisive and hotly contested in living memory. Google said it will begin enforcing this second policy on September 1, 2020 in the United States, and on October 1, 2020, in all other countries.

 

Google Blog:     Axios:        ZDNet:         Infosecurity Magazine

You Might Also Read: 

Facebook: Hate Speech, Fake News & Bias:

 

« Essential Books For Learning About Cyber Security
WEBINAR: How to achieve security visibility at scale in the AWS Cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

SecureNow Insurance Broker

SecureNow Insurance Broker

SecureNow is a commercial insurance broker based in India. Services offered include Cyber Risk insurance.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

Digital Defense Inc (DDI)

Digital Defense Inc (DDI)

DDI offers vulnerability scanning, penetration testing, web application testing, social engineering and additional security assessments.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

Crypto4A Technologies

Crypto4A Technologies

Crypto4A quantum-ready cybersecurity solutions significantly improve protection for Cloud, loT, Blockchain, V2X, government and military application deployments.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

HEAL Security

HEAL Security

HEAL Security is the global authority for cybersecurity data, research and insights across the healthcare sector.

Gibbs Consulting

Gibbs Consulting

Gibbs Consulting provides innovative, flexible, on-demand IT Services and IT Consulting that delivers value and successful outcomes for our clients.