Feeds

Google ordered to identify bloggers

Australian defamation case a headache for Mountain View

Internet Security Threat Report 2014

Google’s woes at the hands of Australian courts continue, with the State of South Australia's District Court ordering the Chocolate Factory to hand over the identities of anonymous bloggers in a defamation case.

Former Australian Football League player (that's Australian Rules, not soccer) player Shane Radbone sought the identity of bloggers who he says have defamed him. Although Google deleted the blogs in question, he launched the action in early December 2012 to identify the bloggers.

The blogs, posted on Google’s Blogger.com, accused him of unethical practices and incompetence, which Rathbone’s lawyer described as both defamatory and damaging to Rathbone’s business.

The judgment has yet to be published, but according to the Herald Sun, the court’s Master Mark Bloomberg made the order that Google identify the authors within 28 days.

In November 2012, Google lost a $AU200,000 defamation case for refusing to take down search links that associated a Melbourne man’s image with notorious gangsters.

In the Federal Court last year, the company was also found to have engaged in misleading and deceptive conduct for displaying ads that redirected searches for one travel agency to the Website of a competitor. That decision is subject to an appeal in the High Court of Australia. ®

Internet Security Threat Report 2014

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.