Google threatens to leave China after massive cyberattacks
The disturbing nature of the attacks, as well as what Drummond called "attempts over the past year to further limit free speech on the Web" by Chinese authorities, gave the company pause, then led it to a decision.
"Any company in China has to constantly monitor the situation," said Harris of the CDT. "And at some point, it may be untenable. Google made that very clear when it went into China. It appears that Google has decided that the risks to their users and their own values outweigh the benefit of operating in China."
Harris declined to speculate on what impact a Google withdrawal from China would have on other technology firms that operate in the country -- both Microsoft and Yahoo, for instance, have a presence there -- but said she expected Google to face resistance if it did pull out. "I can't imagine this was an easy decision for them," she said. "They're certain to get push-back from some shareholders."
If Google does end up closing shop in China, Harris acknowledged that it would be a setback for the idea that Western companies could change China's position on issues such as human rights. "I don't think that [this idea] has had the impact we would have liked, but it has had a huge impact on access of information that China's citizens now have," she argued.
Like Drummond of Google, Harris noted that recent moves by the Chinese government have been hard to stomach. "They've become increasingly shrill about what a company makes available, who can have blogs and domains in the country," she said. "They've been piling on the restrictions."
But the battle isn't over, even if Google leaves, Harris said. "The fact is, [the Chinese government] cannot control all information. That's the hope we've always had, that at some point technology wins."
Drummond did not set a timetable for the discussions Google wants to have with Chinese authorities, or, failing a settlement agreeable to both sides, a deadline for any decision to withdraw from the country and shutter its search site.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, send e-mail to firstname.lastname@example.org or subscribe to Gregg's RSS feed .
- Google's next frontier: What it means to be healthy
- Google updates the Maps Explore Nearby feature -- for some users
- Chrome gets sharp after dumping 30-year-old Windows technology
- Google moves closer to selling smart contacts
- Google goes mum on Glass release plans
- Samsung Gear Live vs. LG G Watch: A real-world evaluation
- Android Wear deep-dive review: A smart start to smartwatch software
- Google's Larry Page talks of killing the 40-hour work week
- Google terminates Quickoffice apps on Android, iOS
- Google I/O looks to be about more than Android
Read more about E-business in Computerworld's E-business Topic Center.
- 6TB Oracle Ecommerce Stack Deployed on AWS in 7 Days A Fortune 1000 company was told that it would take more than 6 months to deploy their ecommerce stack on AWS. CloudVelocity deployed...
- Mission Critical: Managing Mobile Applications & Content Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their... All E-business White Papers | Webcasts