Tag Archives: Public Policy

Our support for the Economic Opportunity Coalition

A healthy economy exists only when opportunities to participate are open to everyone. Google has long worked to make that possible through efforts such as our Google Career Certificates, the Grow with Google Small Business Fund and our commitment tosupplier diversity. Core to this work is our belief that progress is best achieved when we partner with others to scale these efforts.

Consistent with that approach, today Google is proud to help launch the Economic Opportunity Coalition, a group dedicated to building an equitable economy. Google intends to work alongside others in the public, private and nonprofit sectors to find ways to help close the racial wealth gap in the United States. The Coalition has identified four focus areas: investing in strengthening community finance organizations, supporting entrepreneurship, improving financial health and addressing infrastructure needs, such as affordable housing.

At Google, we have pioneered solutions to these issues and continue to do so. For example, our $100 million Google Career Certificates Fund focuses on Google’s digital skills training program and introduces a new financing model to provide loans and grants to students through Social Finance, a leading national nonprofit in the field of workforce development. Another example is our funding to Opportunity Finance Network to help Community Development Financial Institutions, which provide capital to underserved small businesses.

Our work in this regard contributes to sustainable economic growth, and the efforts of others in the Coalition will amplify our impact. Building a world in which everyone has access to opportunities will help foster more vibrant economic communities, and we look forward to others joining us in the Economic Opportunity Coalition and contributing to this important work.

Our new office is a love letter to Atlanta

Google has been a part of Atlanta for more than 20 years. There are more than 1,000 full-time Google employees in Georgia — in two offices in Atlanta and a data center in Douglas County — helping to build and support our products, and help our partners and customers across the South and nationally.

We recently opened our doors to the newest office space in Midtown Atlanta at the 1105 West Peachtree building. This new Google office encompasses 19 floors spanning 500,000 square feet, and is a part of our broader investment in local communities across the U.S.

Atlanta has a rich civil rights history and is home to top Historically Black Colleges and Universities (HBCUs) and tech talent. Continuing our long-term investment here will help support our Black Googler community in Atlanta, in line with our racial equity commitments.

Inspired by the city’s legacy for social change, our office was designed as an homage to the people of Atlanta, with each floor an ode to Atlanta’s cultural, musical and artistic history. We worked with more than 50 local and diverse companies to design and build the new space, including artwork from more than 20 local artists.

A giant heart outlining the Google Atlanta sign greets you in the lobby. One of the staircases features a rainbow design — in support and celebration of the LGBTQ+ community — inspired by the city’s nearby rainbow crosswalks. The WERD Cafe, our Googler cafeteria, is named for the first Black-owned and programmed U.S. radio station.

Our commitment to Atlanta extends far beyond the walls of our new office. In 2021, Google products helped provide $13.21 billion of economic activity for tens of thousands of Georgia businesses, nonprofits, publishers, creators and developers.

Today, we’re announcing a $1 million commitment to the Urban League of Atlanta to support their work in training underserved communities throughout Georgia. This grant will help jobseekers get digital skills training and place them in high-growth jobs.

On top of this, to bring equitable opportunities to more Georgians, we’re partnering with local community organizations and universities. We’re working with HBCUs like Clark Atlanta University and Spelman College to attract top talent, and partnering with the Technical College System of Georgia to offer Google Career Certificates to 22 colleges across the state at no cost.

Lastly, we are partnering with Mayor Andre Dickens and the Atlanta BeltLine to launch the Atlanta BeltLine Marketplace, an effort to help local Black, Latino and women-owned small businesses reach new customers by retrofitting rail cars into office spaces. We’re providing Wi-Fi for the rail containers, a complete suite of Google Nest products, Chromebooks and free digital skills training.

We look forward to continuing to support and partner with our customers, employees and local communities in Atlanta for years to come.

Our new office is a love letter to Atlanta

Google has been a part of Atlanta for more than 20 years. There are more than 1,000 full-time Google employees in Georgia — in two offices in Atlanta and a data center in Douglas County — helping to build and support our products, and help our partners and customers across the South and nationally.

We recently opened our doors to the newest office space in Midtown Atlanta at the 1105 West Peachtree building. This new Google office encompasses 19 floors spanning 500,000 square feet, and is a part of our broader investment in local communities across the U.S.

Atlanta has a rich civil rights history and is home to top Historically Black Colleges and Universities (HBCUs) and tech talent. Continuing our long-term investment here will help support our Black Googler community in Atlanta, in line with our racial equity commitments.

Inspired by the city’s legacy for social change, our office was designed as an homage to the people of Atlanta, with each floor an ode to Atlanta’s cultural, musical and artistic history. We worked with more than 50 local and diverse companies to design and build the new space, including artwork from more than 20 local artists.

A giant heart outlining the Google Atlanta sign greets you in the lobby. One of the staircases features a rainbow design — in support and celebration of the LGBTQ+ community — inspired by the city’s nearby rainbow crosswalks. The WERD Cafe, our Googler cafeteria, is named for the first Black-owned and programmed U.S. radio station.

Our commitment to Atlanta extends far beyond the walls of our new office. In 2021, Google products helped provide $13.21 billion of economic activity for tens of thousands of Georgia businesses, nonprofits, publishers, creators and developers.

Today, we’re announcing a $1 million commitment to the Urban League of Atlanta to support their work in training underserved communities throughout Georgia. This grant will help jobseekers get digital skills training and place them in high-growth jobs.

On top of this, to bring equitable opportunities to more Georgians, we’re partnering with local community organizations and universities. We’re working with HBCUs like Clark Atlanta University and Spelman College to attract top talent, and partnering with the Technical College System of Georgia to offer Google Career Certificates to 22 colleges across the state at no cost.

Lastly, we are partnering with Mayor Andre Dickens and the Atlanta BeltLine to launch the Atlanta BeltLine Marketplace, an effort to help local Black, Latino and women-owned small businesses reach new customers by retrofitting rail cars into office spaces. We’re providing Wi-Fi for the rail containers, a complete suite of Google Nest products, Chromebooks and free digital skills training.

We look forward to continuing to support and partner with our customers, employees and local communities in Atlanta for years to come.

Transparency in the Shadowy World of Cyberattacks

The following is adapted from remarks delivered by Kent Walker, President of Global Affairs, at the International Conference on Cyber Security 2022on July 19, 2022.

Thank you for the chance to be a part of this important conversation about cybersecurity.

At Google we’re proud to say that we keep more people safe online than anyone else in the world. But that wasn’t always the case.

So let me start by telling you a story about how we got it wrong, and two things we all can learn from that experience. My dad always told me that it was cheapest to learn from the other guy’s mistake. So let me tell you about one of ours.

As some of you may recall, in late 2009, Google was the victim of a major cybersecurity attack, code named Operation Aurora.

We’ve long had some of the most attacked websites in the world. But Aurora was something special.

Aurora was an attack attributed to the Chinese government, a significant security incident that resulted in the theft of intellectual property from Google.

But Aurora wasn’t just any security incident. And it wasn’t just against Google.

As part of our investigation we discovered that several other high-profile companies were similarly targeted. Other companies either hadn’t discovered the attacks, or hadn’t wanted to disclose them. When I was a federal prosecutor specializing in technology crimes, one of the biggest challenges we encountered was getting companies to go public or even come to the authorities.

So we felt it was important to talk about the attack–to tell the world about its impact, the methods of the hackers, and the sectors at risk.

We worked with the US Government to share threat vectors and vulnerabilities.

And we didn’t stop there: After Aurora, we launched an entire team called Project Zero to find and promptly disclose previously undiscovered, zero-day vulnerabilities in our own and other companies’ software, raising the security bar for everyone.

And today, Google’s Threat Analysis Group, or TAG, works to counter a range of persistent threats from government-backed attackers to commercial surveillance vendors to criminal operators. TAG does regular public disclosures of foreign state actor attacks, including doing the difficult work of attribution.

Without giving too much away, I can also tell you that, working with our team at VirusTotal (now called Chronicle), we have some projects in the works that will help us raise awareness of vulnerabilities from around the world. And we’re very excited about our upcoming partnership with Mandiant, one of the world’s premier security teams, to broaden and deepen this work.

So I’d say that the first lasting lesson from the Aurora attack is the need to weave openness and transparency into the fabric of a cybersecurity response. It’s not always comfortable work–we’ve had to have some tough conversations with partners and with our own teams along the way–but it’s necessary to move the industry forward and ensure bugs are getting fixed fast, before they can be exploited in the wild.

In the ensuing years, we’ve developed principles to ensure we can share learnings about vulnerabilities, cyber attacks (such as attacks on elections), and disinformation campaigns responsibly, transparently, and helpfully with the public, with our partners, and with law enforcement.

And the US government has in turn stood up its own process to facilitate more information sharing with industry partners in order to expedite patches that safeguard us all.

But the value of transparency isn’t the only reason I bring up the Aurora story.

Aurora not only taught us the need to embrace transparency, it also taught us a second, and even more important lesson: What works and what doesn’t when it comes to security architecture.

It’s possible to over-index on info sharing alone.

Focusing on the fundamentals of software security is in some ways more important to raise all of us above the level of insecurity we see today.

We curate and use threat intelligence to protect billions of users–and have been doing so for some time. But you need more than intelligence, and you need more than security products–you need secure products.

Security has to be built in, not just bolted on.

Aurora showed us that we (and many in the industry) were doing cybersecurity wrong.

Security back then was often “crunchy on the outside, chewy in the middle.” Great for candy bars, not so great for preventing attacks. We were building high walls to keep bad actors out, but if they got past those walls, they had wide internal access.

The attack helped us recognize that our approach needed to change–that we needed to double down on security by design.

We needed a future-oriented network, one that reflected the openness, flexibility, and interoperability of the internet, and the way people and organizations were already increasingly working.

In short, we knew that we had to redesign security for the Cloud.

So we launched an internal initiative called BeyondCorp, which pioneered the concept of zero trust and defense in depth and allowed every employee to work from untrusted networks without the use of a VPN. Today, organizations around the world are taking this same approach, shifting access controls from the network perimeter to the individual and the data.

If you fast forward to today’s hybrid-cloud environment, zero trust is a must.

At the core of zero trust is the idea that security doesn’t have a defined border. It travels with the user and the data. For example, as the Administration pushes for multi-factor authentication for government systems, we’re automatically enrolling users in two-step verification to confirm it’s really them with a tap on their phone when they sign into our products.

Practically, this means that employees can work from anywhere in the world, accessing the most sensitive internal services and data over the internet, without sacrificing security. It also means that if an attacker does happen to break through defenses, they don’t get carte-blanche to access internal data and services.

The most impactful thing a company, organization, or government can do to defend against cyber-attacks is to upgrade their legacy architecture.

Is it always easy? No, but when you consider that legacy architecture with its millions upon millions of lines of proprietary code, has thousands of bugs, each one a potential vulnerability, it’s worth it.

And beyond replacing existing plumbing, we need to be thinking about the next challenges, and deploying the latest tools.

In the same way the world is racing to upgrade encryption to deal with the threat of quantum decryption, we need to be investing in cutting-edge technologies that will help us keep ahead of increasingly sophisticated threats.

The good news is that cyber-security tools are evolving quickly, from artificial intelligence capabilities, to advanced cryptography, to quantum computing.

If today we talk about security by design, what comes next is security through innovation–security designed with AI and machine learning in mind–designed to counter bad actors using new tools to evade filters, break into encrypted communications, and generate customized phishing emails.

We’ve got some of the best AI work in the business, and we’re testing new approaches and using some of our leading-edge AI tools to detect malware and phishing at scale. AI allows us to see more threats faster, while reducing human error. AI, graph mining, and predictive analytics can dramatically improve our ability to identify and block phishing, malware, abusive apps, and code from malicious websites.

We look forward to sharing more of our findings so that organizations and governments can prepare. After all, this is no time for locking down learnings or successful techniques. Bad actors are not just on the lookout for ways to exploit your unknown vulnerabilities. As with Hafnium and SolarWinds, they are looking for the weak link in the security chain, letting them springboard from one attack to another. A vulnerability at one organization can do damage to entire industries and infrastructures.

Cybersecurity is a team sport, and we all need to get better together, building bridges not just within the security communities, but also between the national security community and academia and Silicon Valley.

Kent Walker speaking on stage

Having started with one story, let me leave you with another—cybersecurity and Russia’s war in Ukraine.

A lot has changed in our approach since Aurora. And perhaps no example illustrates that shift more clearly than our response to the war in Ukraine.

Russia’s invasion sparked, not just a military and economic war, but also a cyber war and an information war. In recent months, we have witnessed a growing number of threat actors– state actors and criminal networks–using the war as a lure in phishing and malware campaigns, embarking on espionage, and attempting to sow disinformation.

But this time, we were ready with a modern infrastructure and a process for monitoring and responding to threats as they happened.

We’ve sent thousands of warnings to users targeted by foreign-state actors–a practice we pioneered after Aurora. And in the vast majority of cases, we’ve blocked the attacks.

We launched Project Shield, bringing not just journalists, but vulnerable websites in Ukraine under Google’s security umbrella against DDOS attacks. While you can DDOS small sites, it turns out that it’s pretty tough to DDOS Google. We disrupted phishing campaigns from Ghostwriter, an actor attributed to Belarus. And we helped the Ukrainian government modernize its cyber infrastructure, helping fortify it against attack.

We are proud that we were the first company to receive the Ukrainian government’s special peace prize in recognition of these efforts.

But the work is far from done.

Even now, we’re seeing reports that the Kremlin could be planning to ratchet up attacks and coordinated disinformation campaigns across Eastern Europe and beyond in an attempt to divide and destabilize Western support for Ukraine. In fact, just today, our TAG team published a new report on activity from a threat group linked to Russia’s Federal Security Service, the FSB, and threat actors using phishing emails to target government and defense officials, politicians, NGOs, think tanks, and journalists.

And, looking beyond Russia and Ukraine, we see rising threats from Iran, China, and North Korea.

Google is a proud American company, committed to the defense of democracy and the safety and security of people around the world.

And we believe cybersecurity is one of the most important issues we face.

It’s why we invested $10 billion over the next five years to strengthen cybersecurity, including expanding zero-trust programs, helping secure the software supply chain, and enhancing open-source security.

It’s why we’ve just created a new division–Google Public Sector–focused on supporting work with the US government. And it’s why we are always open to new partnerships and projects with the public sector.

In recent years, we’ve worked with the FBI’s Foreign Influence Taskforce to identify and counter align foreign influence operations targeting the U.S. We’ve worked with the NSA’s Cybersecurity Collaboration Center. And we’ve joined the Joint Cyber Defense Collaborative to help protect critical infrastructure and improve collective responses to incidents on a national scale.

Getting our whole digital economy on the front foot is essential. And there’s some encouraging progress. For example, we were glad to see last week’s Cyber Safety Review Board report deeply investigating the log4j vulnerability and making important recommendations about how to improve the ecosystem.

We need more of that.

Looking ahead, our collective ability to prevent cyber attacks will come, not only from transparency, but from a commitment to shoring up our defenses — moving away from legacy technology, modernizing infrastructure, and investing in cutting-edge tools to spot and stop tomorrow’s challenges.

We can’t beat tomorrow’s threats with yesterday’s tools. We need collective action to shore up our digital defenses. But by drawing on America’s collective abilities and advantages, we can achieve a higher level of collective security for all of us.

Thank you.

Source: The Keyword


Google and the Global Cross Border Privacy Rules

The value and convenience of the global internet relies upon the free flow of information across borders: collaborating with global colleagues, speaking with a loved one via Google Meet, finding directions to the closest pharmacy on Google Maps, or finding and buying everyday items online. Global data flows make these daily activities work seamlessly, and support the health and growth of the modern digital economy and the opportunity it promises for users around the world.

As governments explore new rules governing data transferred abroad, there is an unprecedented need for global, interoperable solutions. Companies, governments, and policymakers must work together to create new legal and technical tools, set out interoperability standards, and most importantly, align on new frameworks to maintain both privacy and essential data flows.

One of these global solutions is the recently announced Global Cross Border Privacy Rules (CBPR), a privacy certification that will allow companies to demonstrate their compliance with government-approved requirements for data protection, backed by a review of those protections by a third-party. The Global CBPR system is an important step toward enabling continued, trusted data flows between participating jurisdictions, and Google is committing to certifying under the future Global CBPR system.

How collaboration will help ensure the future of data flows

When governments announced the formation of the Global CBPR Forum earlier this year, designed to oversee the Global CBPR system, Google was honored to participate in the first meeting along with representatives from 20 jurisdictions. What we shared and heard from the governments at the Forum was a desire to solve the problem of trusted data flows together.

At the Global CBPR Forum, industry players and government representatives sounded a clear call for the certification program to find the right balance between holding companies accountable for their data use, protecting individuals from harm and misuse, and helping maintain the trust within the ecosystem that enables innovation and change, all while being globally scalable.

The Global CBPR system advances efforts to protect the digital ecosystem from fragmentation, which would come at a cost to access to information as well as opportunities and livelihoods for people around the world. This is a critical moment for governments to work with industry and other stakeholders to stabilize the regulatory landscape so that companies can confidently offer products and services that rely on international data flows without compromising privacy protections. The Global CBPR system is one step towards that clarity and security.

Next steps for Google and the Global CBPR system

Our investment in privacy and security is at the core of every product we build. We will bring this experience to the conversation to help build a robust Global CBPR system. We will work with our partners to provide input through the Global CBPR Forum on the practical realities of services facing fragmented privacy regulations. This global fragmentation is a challenge for any business, especially for small and medium-sized enterprises (SMEs) who often don’t have the resources to navigate a patchwork of laws. We also encourage the governments of the Global CBPR Forum to work with academics and civil society to understand how to make CBPR requirements scalable and able to bridge divergent legal requirements and cultural expectations of privacy.

We are also committed to finding ways to help and support Google customers to certify to this global standard, especially among small and medium enterprises. This kind of support will help scale these key privacy protections to more users, strengthening the businesses of our customers. We will continue to look for ways in the future to support participation in the US and globally in the CBPRs to raise privacy protections for users around the world.

The creation of the Global CBPR Forum is part of a global conversation on bringing strong, interoperable privacy protections to our users and the users of countless other companies around the world. We look forward to the Global CBPR Forum establishing new requirements and will certify to the system at the first opportunity.

Source: The Keyword


Protecting people’s privacy on health topics

Protecting our users’ privacy and securing their data is core to Google’s work. That’s why we design products to help people keep their personal information private, safe, and secure — with easy-to-use tools and built-in protections.

Privacy matters to people — especially around topics such as their health. Given that these issues apply to healthcare providers, telecommunications companies, banks, tech platforms, and many more, we know privacy protections cannot be solely up to individual companies or states acting individually. That’s why we’ve long advocated for a comprehensive and nationwide U.S. privacy law that guarantees protections for everyone, and we’re pleased to see recent progress in Congress.

But we haven’t waited for a law to take action. We understand that people rely on Google to keep their personal data secure. We’ve long been committed to this work, and today we're sharing additional steps we're taking to protect user privacy around health issues.

Protecting user privacy

We offer a variety of easy-to-use privacy tools and settings that put people in control of their data. This is particularly important to people around health topics, which is why our data policies include a number of restrictions. In addition, we have protections around:

  • Location History: Location History is a Google account setting that is off by default, and for those that turn it on, we provide simple controls like auto-delete so users can easily delete parts, or all, of their data at any time. Some of the places people visit — including medical facilities like counseling centers, domestic violence shelters, abortion clinics, fertility centers, addiction treatment facilities, weight loss clinics, cosmetic surgery clinics, and others — can be particularly personal. Today, we’re announcing that if our systems identify that someone has visited one of these places, we will delete these entries from Location History soon after they visit. This change will take effect in the coming weeks.
  • User Data on Apps: Google Play has strict protocols to protect user privacy — including policies that prohibit developers from selling personal and sensitive user data and a requirement that they handle that data securely and only for purposes directly related to operating the app. To further promote transparency and control for users, we also recently introduced Play’s new data safety section that developers use to give people more information about how apps collect, share, and secure their data. For Google Fit and Fitbit, we give users settings and tools to easily access and control their personal data, including the option to change and delete personal information, at any time. For example, Fitbit users who have chosen to track their menstrual cycles in the app can currently delete menstruation logs one at a time, and we will be rolling out updates that let users delete multiple logs at once.
  • Law Enforcement Demands for User Data: Google has a long track record of pushing back on overly broad demands from law enforcement, including objecting to some demands entirely. We take into account the privacy and security expectations of people using our products, and we notify people when we comply with government demands, unless we’re prohibited from doing so or lives are at stake — such as in an emergency situation. In fact, we were the first major company to regularly share the number and types of government demands we receive in a Transparency Report. We remain committed to protecting our users against improper government demands for data, and we will continue to oppose demands that are overly broad or otherwise legally objectionable. We also will continue to support bipartisan legislation, such as the NDO Fairness Act recently passed by the House of Representatives, to reduce secrecy and increase transparency around government data demands.

We’re committed to delivering robust privacy protections for people who use our products, and we will continue to look for new ways to strengthen and improve these protections. We support Congressional efforts to reach bipartisan agreement on nationwide privacy protections that move the burden of privacy off individuals and establish good data practices across the board. In the meantime, we will continue our focus on securing our products and protecting the privacy of our users around the world.

Protecting people’s privacy on health topics

Protecting our users’ privacy and securing their data is core to Google’s work. That’s why we design products to help people keep their personal information private, safe, and secure — with easy-to-use tools and built-in protections.

Privacy matters to people — especially around topics such as their health. Given that these issues apply to healthcare providers, telecommunications companies, banks, tech platforms, and many more, we know privacy protections cannot be solely up to individual companies or states acting individually. That’s why we’ve long advocated for a comprehensive and nationwide U.S. privacy law that guarantees protections for everyone, and we’re pleased to see recent progress in Congress.

But we haven’t waited for a law to take action. We understand that people rely on Google to keep their personal data secure. We’ve long been committed to this work, and today we're sharing additional steps we're taking to protect user privacy around health issues.

Protecting user privacy

We offer a variety of easy-to-use privacy tools and settings that put people in control of their data. This is particularly important to people around health topics, which is why our data policies include a number of restrictions. In addition, we have protections around:

  • Location History: Location History is a Google account setting that is off by default, and for those that turn it on, we provide simple controls like auto-delete so users can easily delete parts, or all, of their data at any time. Some of the places people visit — including medical facilities like counseling centers, domestic violence shelters, abortion clinics, fertility centers, addiction treatment facilities, weight loss clinics, cosmetic surgery clinics, and others — can be particularly personal. Today, we’re announcing that if our systems identify that someone has visited one of these places, we will delete these entries from Location History soon after they visit. This change will take effect in the coming weeks.
  • User Data on Apps: Google Play has strict protocols to protect user privacy — including policies that prohibit developers from selling personal and sensitive user data and a requirement that they handle that data securely and only for purposes directly related to operating the app. To further promote transparency and control for users, we also recently introduced Play’s new data safety section that developers use to give people more information about how apps collect, share, and secure their data. For Google Fit and Fitbit, we give users settings and tools to easily access and control their personal data, including the option to change and delete personal information, at any time. For example, Fitbit users who have chosen to track their menstrual cycles in the app can currently delete menstruation logs one at a time, and we will be rolling out updates that let users delete multiple logs at once.
  • Law Enforcement Demands for User Data: Google has a long track record of pushing back on overly broad demands from law enforcement, including objecting to some demands entirely. We take into account the privacy and security expectations of people using our products, and we notify people when we comply with government demands, unless we’re prohibited from doing so or lives are at stake — such as in an emergency situation. In fact, we were the first major company to regularly share the number and types of government demands we receive in a Transparency Report. We remain committed to protecting our users against improper government demands for data, and we will continue to oppose demands that are overly broad or otherwise legally objectionable. We also will continue to support bipartisan legislation, such as the NDO Fairness Act recently passed by the House of Representatives, to reduce secrecy and increase transparency around government data demands.

We’re committed to delivering robust privacy protections for people who use our products, and we will continue to look for new ways to strengthen and improve these protections. We support Congressional efforts to reach bipartisan agreement on nationwide privacy protections that move the burden of privacy off individuals and establish good data practices across the board. In the meantime, we will continue our focus on securing our products and protecting the privacy of our users around the world.

How tech can support transformational growth in Africa

This week, I was privileged to be in Kigali, Rwanda for the Commonwealth Heads of Government Meeting (‘CHOGM’) - a forum that brings together government, business leaders and NGOs from around the world to discuss how to improve the lives of the over 2.5 billion people living in the 54 independent countries that make up the Commonwealth.

Africa is facing multiple challenges. While Covid was first and foremost a health crisis, the economic impact continues to be severe for parts of the continent. The war in Ukraine has added further pressure on supply chains and food security. And Africa’s rapid population growth - 60% of the population will be under 24 by 2025 - creates a further pressing need to generate economic opportunity and ensure people and families can earn a living.

Despite the challenges ahead, the mood at CHOGM was optimistic, focusing on the collaboration and solutions that can help Africa’s economic recovery. For me, harnessing technology is key to that.

I grew up in Zimbabwe, then a Commonwealth country, and discovered the possibilities of the world of programming as a highschooler. Since then I’ve always been fascinated by the role technology can play in creating opportunities and helping to solve large-scale societal problems. My position at Google allows me to focus on how technology can benefit society, and I feel fortunate that it’s taken me back to Africa after just five months in the role.

Google first bet on Africa with the investment in Seacom cable in about 2005: I remember hearing about it from my friends at Google at the time. Two years later, Google opened offices on the continent, and has been a partner in Africa’s economic growth and digital transformation ever since - working with local governments, policymakers, educators and entrepreneurs. Our mission in Africa is to unlock the benefits of the digital economy to everyone - providing helpful products, programmes and investments.

Africa’s internet economy has the potential to grow to $180 billion by 2025 - 5.2% of the continent’s GDP - bringing prosperity, opportunity and growth. African governments and businesses must turn that opportunity into a reality: integrating technology into the economy, ensuring no one is left behind, and emerging stronger from the current challenges.

Ensuring affordable internet access

Most crucial to this is affordable internet access - a precondition for digital transformation, but still a barrier today. Across Africa, only 18% of households have an internet connection, and data costs remain a major obstacle. By actively promoting infrastructure investments, including in rural areas, Governments can support people to get online and harness the economic growth and benefits that will come with that.

Google is already working in partnership with African governments to do this. We’ve enabled over 100 million Africans to access the internet for the first time through our affordable Android devices, and plan to invest $1 billion over the next 5 years in projects that will help enable Africa’s digital transformation, including our state-of-the-art Equiano subsea cable.

The cable, which lands in Namibia in the next few weeks, will provide twenty times more network capacity by connecting Africa with Europe. It will run through South Africa, Namibia, Togo, Nigeria and St Helena, enabling internet speeds up to five times faster and lowering connectivity costs by up to 21%, in turn supporting growth and jobs.

Investing in people

Those accessing the internet need to be able to use it and transform their lives leveraging it. Working with tech companies and NGOs to foster digital skills developments, governments can ensure people can participate fully online.

Google’s CEO, Sundar Pichai, made a commitment in 2017 to train 10 million Africans in digital skills. To date, Google has trained more than 6 million people across Africa through Grow with Google in partnership with local governments, and given $20 million to non-profits helping Africans develop their digital skills. Moreover, Google has committed to certifying 100,000 developers - and so far has certified more than 80,000. Last year, a Google study showed the developer ecosystem in Africa is growing. There are nearly 716,000 professional developers across Africa - of which 21% are women; numbers we hope to contribute to.

Investing in startups

Alongside digital skills, governments need to encourage entrepreneurs and startups - a crucial part of Africa’s economic growth and jobs creation. There has never been a shortage of entrepreneurs in Africa - what is needed are the tools, including technology, and financing to enable them.

Last year, we announced an Africa Investment Fund to support startup growth across Africa. Through the Fund, we invest $50 million in startups like SafeBoda and Carry1st, and provide Google’s people, products and networks to help them build meaningful products for their communities. This is on top of our existing work on the Startups Accelerator Africa, which has provided more than 80 African startups with equity-free finance, working space and expert advisors over the last three years. We also launched a Black Founders Fund in 2021, supporting Black African Founders like Shecluded, a digital financial growth resource and service startup for women.

Using technological innovation to solve systemic challenges

Advances in technology are increasingly enabling solutions to development challenges, and with 300 million more people coming online in Africa over the next five years, the possibilities are endless. Digital finance, for example, can be used to address the barriers preventing nearly a billion African women from banking - while advances in AI have made it possible for Google to Translate more languages, including Luganda - spoken by 20 million people here in Rwanda and in neighboring Uganda.

Technology offers Africa a tremendous opportunity for growth, prosperity and opportunity. I’m hopeful that working in partnership, we can continue to make an impact and build on Africa’s digital revolution.

It’s time for more transparency around government data demands

As our lives continue to become more digitized, laws governing government access to personal information need to evolve to protect both public safety and civil liberties.

America’s Stored Communications Act, passed in 1986 (before the internet became a part of daily life), sets the rules governing government demands to providers to disclose information about their users. One of those rules lets the government seek orders to prevent providers like Google from telling users about demands for data. These so-called Non-Disclosure Orders (NDOs) or “gag orders” have become commonplace.

We’re seeing NDOs issued for an increasing number of court orders, warrants, and subpoenas from U.S. authorities. That means that providers can’t notify users until long after compliance, if ever. And that people don’t have the opportunity to go to court to contest disclosure orders.

We’ve seen NDOs issued in cases where the user is already aware of the investigation, and even of the legal demand itself. Similarly, we’ve seen NDOs issued covering legal requests for the data of well-established reputable organizations, even though notifying the organization is highly unlikely to do harm. And we’ve seen some NDOs that might have been initially justified lasting years beyond the investigation, in some cases indefinitely.

It’s time to reform this practice, requiring more robust review before gag orders are issued.

We commend the bipartisan House passage of the NDO Fairness Act, a bill sponsored by Chairman Nadler and Representative Fitzgerald that would make much-needed improvements to the Stored Communications Act. This reform will ensure that gag orders are issued only where warranted and for reasonable periods.

This position is nothing new for us. We’ve long advocated for transparency for both our users and the public. We were the first major company to publish a Transparency Report on government requests for user data and co-founded both the Global Network Initiative and the Reform Government Surveillance coalition. We’ve long supported surveillance reform, including the Email Privacy Act, and legislation to allow providers to be more open about national security requests. We also contest inappropriate gag orders, going to court where necessary (with one case leading the U.S. Department of Justice to pledge to stop using court orders to get journalists’ information in leak investigations). We've also built industry-leading products to give business customers transparency and control over who has access to their data.

Transparency for government data demands is an important check-and-balance, and we urge both the House and Senate to advance this practical protection for Americans in the digital age.

Google at the Copenhagen Democracy Summit

The following is adapted from remarks delivered by Kent Walker, President of Global Affairs, at the Copenhagen Democracy Summit on June 10, 2022.

On February 24, the world watched in horror as Russia invaded Ukraine. While the tension had been building for weeks, that didn’t make the invasion any less shocking.

Tanks once again rumbled through European streets, and the world held its breath. People wondered whether this marked a return to the law of the jungle — a return to machtpolitik over cooperation in solving shared problems.

And we were reminded once again that democratic progress is not inevitable; that democracy and the rules-based international order are by no means guaranteed.

Even before the invasion of Ukraine, there had been worrying signs that democracy was under assault.

Freedom House found that the defining features of democracy — free expression and open debate, free association, and the rule of law — have retreated in nearly fifty countries.

I’d like to speak today about the debt technology owes democracy, and how technology can work with democracy to repay that debt.

But first, let’s talk about why that partnership is so critically important.

Democracy has always been fertile soil for innovation and basic research.

Inventors flourish when they can exchange ideas, take risks, test hypotheses, and explore new avenues for inquiry and collective innovation.

Democratic values of openness and pluralism allow cooperation and scientific inquiry to flourish.

It would be hard to argue that the advances made possible by democratic innovation — advances that have doubled life expectancies and lifted billions of people out of poverty — would have been possible under any other system of government.

But technology can also benefit democracy itself, by proving that democracies can deliver for citizens, expanding choice and raising living standards.

Future generations of technology will help us combat climate change, pioneer personalized medicine, and improve agricultural productivity.

But even beyond improving living standards — delivering on the substantive promises of democracy — technology and innovation can also be a force for democratic procedural legitimacy: Supporting democratic institutions, increasing transparency and accountability in governance, and protecting and promoting human rights.

When developed and used responsibly, technology can foster the essential exchange of ideas and broaden civic engagement in the democratic process.

After all, democracies need at least three elements to flourish:

  • A robust public square, where people can express ideas openly;
  • An active and vibrant press; and
  • Free and fair elections that create accountability, letting citizens check and balance power.

While there is no question that the misuse and abuse of technology has created challenges in each of these areas — from within and without — conversations over the last few months, with defense leaders in Munich, business leaders in Davos, and security experts in Eastern Europe, have made it clear that we need the responsible use of technology to support these essential elements.

So, first, how can technology defend the public square, safeguarding speech and debate?

Tech can promote and protect the marketplace of ideas by playing both offense and defense: Facilitating free and open discourse while combating disinformation.

The early days of Silicon Valley fostered a faith that more communication would be better for the world. And in many ways it has been, connecting people in remarkable new ways.

That said, we have come to recognize abuses of our platforms, harmful efforts to spread malicious or patently false information. We have responded by removing content that violates our policies; raising authoritative voices at critical times; rewarding trusted creators; and reducing borderline content.

That requires tough calls — millions of them every day. And we’re working on ways to provide more transparency into this critical process.

The latest and most dramatic chapter in the battle against disinformation came with the invasion of Ukraine where we all are witnessing not just a military and economic war, but also a cyber war and an information war.

An extraordinary situation called for an extraordinary response.

YouTube took the unprecedented step of globally blocking disinformation channels like RT and Sputnik, removing more than 8,000 channels and more than 70,000 videos for violating our content policies – content that minimized the war’s toll or spread harmful lies about what was happening on the ground. Meanwhile Google Search, Google News, and YouTube are some of the last independent sources of news about the war that remain available in Russia.

On the cybersecurity front, when we saw a spike of distributed denial-of-service (DDoS) attacks on Ukrainian websites, we protected access to information and kept sites online by bringing publishers and government websites under Google's security umbrella, Project Shield.

As a result of these efforts, we were proud to be the first company to receive the Ukrainian government’s special "peace prize,” showing how important tech’s role can be when the stakes are high.

Which brings me to the second cornerstone of a functioning democracy: A free and vibrant pressand how technology can help it adapt to a digital world.

Google was founded with the mission of organizing the world’s information and making it universally accessible and useful. Over the years our ad networks have provided billions of dollars to news publishers, and we have sponsored programs like the Google News Initiative, partnering with publishers to create innovative tools and approaches to reporting.

Of course, technology has had a significant impact on newspaper business models, unbundling different categories and making news more competitive and more freely available.

But technology will also be the key to the evolution of news business models for a digital era. As Herbert Simon said fifty years ago, a wealth of information creates a poverty of attention.

That means a growing role for editors and publishers, curators and analysts, who can help us all allocate our limited attention wisely.

It means there’s a growing need for us to support content creators and a thriving global press.

Third, technology has a vital role to play when it comes to the integrity of our elections.

At Google, we've long created tools and resources to make it easier for people to vote. Our services connect voters with up-to-date, authoritative information about polling locations, remote voting, and election times.

During election cycles, campaigns face increased security threats.

Our teams equip campaigns and election workers with best-in-class security tools. We collaborate with partners in Europe to give political campaigns access to free Titan Security Keys — the strongest form of two-factor authentication.

That’s part of our Advanced Protection Program, which protects high-risk individuals – election officials, campaigns, journalists, and human rights activists – with access to high-visibility and sensitive information.

Finally, our Threat Analysis Group works to thwart cyber attacks, monitoring and exposing espionage, hacks, and phishing campaigns and taking steps to disrupt the threats. In recent months, we stopped coordinated attacks by government-backed actors from China, Iran, North Korea and Russia. And we stopped attempts by various unattributed groups to sow disinformation.

Our role is clear — we help protect people and prevent future attacks by identifying bad actors and sharing relevant information.

These are all examples of ways tech is helping today — across the public square, the free press, and elections themselves. But defending democracy and the rules-based international order is a task that requires tech, civil society, and governments to work together.

An Edelman survey found that people often think of governments and NGOs as well intentioned but ineffective; and often think of companies as effective but maybe not always well intentioned. But when the two worked together, they went to the upper right-hand quadrant — both well intentioned and effective.

It’s why we support The Copenhagen Pledge on Tech for Democracy and similar multilateral commitments by governments, organizations, industry, and civil society to make technology work for democracy and human rights.

Democracy is at a watershed moment. There’s a risk that democracies turn inward, focusing strictly on domestic challenges rather than defending the liberal democratic international order.

Tech, too, is at a crossroads — with a risk that concerns about abuses of technology obscure its many benefits.

In 1996, John Perry Barlow, a lyricist for the Grateful Dead, wrote "A Declaration of Independence of Cyberspace” arguing that the internet was beyond any government’s laws.

Well, perhaps it's now time for a “Declaration of Interdependence of Cyberspace.”

Our growing technological connections have become so important to our daily lives that technologists need to work ever more closely with governments on new and agile rules to promote progress, national security, and the defense of the public square.

International frameworks — from the UN to the WTO to the OECD — can be useful starting places as we work to promote international alignment. And only governments can drive this crucial work.

We need governments committed to open, democratic processes to step up and work together to reaffirm international norms of access to information and the free and open exchange of ideas.

At Google, we’re eager to roll up our sleeves and help.

We leave the politics to the politicians, but that doesn’t mean we leave it to others to defend the public square. Nor does it mean we dismiss the experience and ideas of government leaders in the cause of protecting democracy.

We hear the summons to defend democracy’s essential components – the open exchange of views, an independent press, and free and fair elections.

In moments of uncertainty and crisis, responsible tech companies feel a duty to do what our engineers do best: Unlock solutions to the most pressing problems.

We undertake that task with appreciation that those solutions will be – must be – the product of collaboration, building on the kind of collective innovation that has always made democracies stronger than their adversaries.