Правила в отношении спама для веб-поиска Google Центр Google Поиска Документация Google for
Правила в отношении спама для веб-поиска Google
Google's spam policy helps protect users and improve search results. Content that appears in search results (web pages, images, videos, news content, and other content that Google finds on the Internet) must not violate the general Google search policy or the spam policy described in this article. These rules apply to all Internet search results, including Google resources.
We develop automated systems to identify content and behavior that violates the rules, and, if necessary, we monitor and take manual action from Google experts. Sites that violate our rules may be displayed lower in the list of search results or not appear at all.
If you think your site violates Google's spam policy, please let us know. We are working hard to develop scalable automated solutions and will use your feedback to optimize our spam detection system.
Although our policies cover the main types of spam, Google fights against all kinds of spam.
Маскировка
Camouflage refers to the presentation of different content to site visitors and search engines in order to manipulate the position of a resource in search results and mislead users. Examples of camouflage
- Show a travel page to search engines and a drug discount page to users.
- Add text or keywords to your pages only if requested by search engines, not by actual users.
If your site contains content that is hard to scan, such as JavaScript code or images, read our guidelines. From these guidelines you can learn how to ensure your content is available to search engines and users without resorting to cloaking.
If your website is compromised, hackers often use camouflage to make it harder for the resource owners to detect the intrusion. Read more about how to avoid website intrusions and what to do if you are compromised...
If the content on your site is paid or password protected, it is not considered disruptive as long as Google has access to all paid content and you follow our general guidelines for flexible selective access.
Дорвеи
A dollarway is a site or page that is optimized for a specific search query with almost the same content and redirects users to resources that are not of interest to them. Examples of dollarways:
- Multiple sites with slightly different URLs or main pages created to provide maximum coverage for a specific search query.
- Multiple domain names or pages dedicated to a specific city or region that redirect users to the same page.
- Pages whose sole purpose is to redirect users to a specific section of the site.
- Almost identical pages that do not have a clear hierarchical structure and rather look like search results.
Неправомерное использование домена с истекшим сроком регистрации
The use of expired domains is considered illegal if, after purchasing such a domain name, you change the theme of the site to handle the position in search results. At the same time, the resource contains content that has practically no value to users.
- Some examples of illegal use of expired domains are:
- Placing affiliate content on a site formerly owned by a government agency.
- Sale of commercial medical products on a website formerly owned by a non-profit medical charity.
Взломанный контент
Placing casino-related content on a former elementary school website.
- Hacking is considered a situation in which an attacker exploits a vulnerability in a security system to place content on a site without consent. This content is not valuable and may harm your computer. Examples of splicing
- Importing code. Hackers who have access to your site may try to inject malicious code into the page. Usually, hackers inject malicious JavaScript code directly into the code of the website or window.
- Application pages. Using vulnerabilities in security systems, hackers can add new pages with unwanted or harmful content to your website. Such pages are often created to deceive search engines or for phishing purposes. Website pages often show no evidence of hacking, but pages added by attackers can harm users' devices or affect the site's position in search results.
- Implementation of content. Hackers may also try to change the website page secretly. In this case, the content is added to the site and can be used for search engines, but it is difficult to find webmasters and visitors. Attackers may insert hidden links and texts using CSS and HTML code into the page, and sometimes use more complex methods than camouflage.
The review hacker can add a malicious code to redirect some visitors to pages that include no n-secure content. Such a transfer result may depend on the transition of URL, users, or device agents. For example, clicking URL in Google's search results may redirect users on pages containing malicious code. Enter this URL in the address bar and open the page that is not redirected.
Скрытый текст и ссылки
Read the recommended methods for recovering a hacked site and how to avoid hacking.
- Hidden texts and hidden links are a method of suddenly placing content on the page, only for deceiving search engines. Examples of hidden text and links that are contrary to the rules
- Place white text on a white background.
- Place the text behind the image.
- Use CSS to display text outside the screen.
- It uses zero font and completely transparent text.
The link is an indistingential symbol (for example, there is a hyphen in the middle of a paragraph).
- There are many web design elements that apply dynamic displays and content hidden to improve ease of use. Among these elements, the following examples of those that do not violate our rules:
- You can hide or display additional content on accordions and tabs.
- Slide shows and sliders that can drag and drop various images and paragraphs.
- Tips and similar text when clicking on what kind of additional content is displayed.
Использование избыточного количества ключевых слов
Text designed for screen leaders, it is more convenient for visitors who use such programs.
- Use of excess keywords-Put keywords and numbers into the website to process the position of the site in Google's search results. In many cases, these keywords are added in the form of lists and groups, look unnatural, or are not related to the main content of the page. Examples of excessive keywords
- List of phone numbers without additional information.
- Text blocks that include lists of cities and regions targeted by websites.
Combination of those combinations or combinations. example
Ссылочный спам
Unlimited balance in the appendix store! There are many sites on the Internet where you can replenish the balance for free, but they are all fraud. And here, you can replenish the balance as much as you want in the app store. Use an unlimited offer to replenish the balance right now!
- Google uses a link as an element that determines the relevance of the web page. Links aimed at manipulating the website in Google's search results may be considered a spam link. This applies to both the links to your site and the outbound drink on the site. An example of the annoying link spam
- Link buying and selling is considered when ranking. This includes the following:
- Pay money and link to websites and social networks.
- Replace links and products and services.
Distributed products on the condition that reviews on products are posted on the link.
Now, there are a wide variety of engagement rings. If you are waiting for a wedding, you need to choose not only flowers and wedding dresses, but also the best ring.
Thank you, very useful information! -Sochi's most delicious pancakes, Pavel Pancakes of Sochi Pavel Pancakes
Машинный трафик
Link buying and selling is a tolerated method for earning income on the Internet when it is done for advertising or sponsoring. If the attributes of REL = "Nofollow" or REL = "Sponsored" are displayed in the tag, this act does not violate our rules.
- The engine tract deprives the resource and reduces the quality of the user service. Example of automatic traffic
- Send automatic request to Google.
Automatically access Google search by scraping or other methods without Google permission.
Вредоносное ПО и злонамеренные действия
Such acts violate Google spam rules and Google Terms of Service.
Google monitors the website for malicious software or unnecessary software that can bother users.
Malware is a program or mobile application that is created to perform actions that harm a computer, mobile device, operating system, or user. Such programs install software without the user's knowledge or infect the device with a virus. Website owners are not always aware that files available for download on their websites are considered harmful, and therefore such executable files are sometimes stored on their websites unintentionally.
Ложные функциональные возможности
Malware is an executable file or application that can be easily executed or behave in ways that the user does not expect, negatively affecting the operation of the computer or mobile device. Such programs change browser settings, such as the start page, or send personal information to third parties.
- Site owners should create resources that are useful for visitors, with quality content and advanced functionality. However, some people try to manipulate search results by creating certain sites with fake functions and services. Users visit such sites and do not find the promised content there. Examples of fake functions
- Sites that offer fake services to balance the App Store.
Недопустимое масштабирование контента
Websites that describe certain functions (for example, PDF files combined with services, return period, online word), but instead display misleading ads to the user.
The act of expanding content beyond acceptable limits, creating multiple pages to manipulate rankings rather than to help users. This violation includes creating large amounts of non-generated content that is of little use to users, regardless of how the content was created.
- Some examples of large-scale content abuse:
- Creating numerous pages using genetic AI or similar tools, when the content does not add value to users.
- Creating numerous pages with content copied from other websites, search results, etc., of questionable value to users.
- Multiple pages can be created using automated transformations such as replacing words with synonyms, page translations, and other techniques to mislead users.
- Using content copied from different websites without adding any original information.
Creating multiple sites to hide large-scale content abuse.
Скопированный контент
Creating multiple pages filled with meaningless content but containing keywords for search advertising.
- Exclude sites with such content from search results.
- Some site owners copy content from popular resources. This content, even if it is copied from the most popular and high-quality sites, has no value to users unless it is supplemented with original material and features. It may also violate copyrights, so be careful. Furthermore, a site's ranking may be lowered if there are many formal requests to remove the content.
- Examples of sites with copied content
- Sites where material from other resources is posted without additional editing or attribution.
Скрытая переадресация
Sites where copied content is posted with minor changes (for example, words are replaced with synonyms or automatic edits are performed).
- Sites that originate streams from other resources but do not provide their own functionality to handle such streams.
- Sites that provide embedded or dubbed content, such as images, videos, and other material from other sites, without giving the user any additional benefit.
A redirect is when you redirect a user to a different URL instead of the one they requested. A hidden redirect can show different content to users or search engines, or show content that is completely different from what the user expected. Examples of hidden redirects
- Show search engines one content and users something completely different.
- Show desktop users a normal page and redirect mobile users to a completely different domain that contains spam.
- Hidden redirects are a form of spam, but in many cases redirecting from one URL to another is very reasonable. Reasonable uses of redirects
Changing the address of a website.
Злоупотребление репутацией сайта
Merge several pages into one.
Redirecting users to an internal page after they log in to their account.
- To determine if a redirect is hidden, look for whether it is intended to deceive users or search engines. Learn how to set up redirects on your website.
- The abuse of the website's reputation means publishing a thir d-party page without the management or participation of the website owner. The purpose of this act is to manipulate the position for their own interests in search results and site ranking elements. Such content includes sponsorship, advertising, partnerships, and other thir d-party pages. These pages are usually not supported by the main purpose of the site, or without the management or involvement of the site owner, and is substantially worthwhile to the user.
- Example of exploiting the reputation of the site:
- Using educational websites, one of the pages contains information about micro loans written by the author of a third party. This page is also applied to other sites, mainly to manipulate search engines rankings.
- The main focus is to operate the ranking of search results, and the use of medical sites by posting "Best Casino" information on page 3, which is hardly involved in medical sites.
Topics that can be misleading to users who see this information on the review site using a movie review site (for example, "How to buy subscribers in social networks", "Best Psychic", "Excellent" "To help write the final essay," (etc.) Publish a third party page-to be the position of the search results.
Even though the editorial department of the sports site is not involved in content development, the information of third parties is added in the "Sports Nutrition Review". The main purpose of the site is to operate the ranking of search results.
- Use the news site by posting a coupon on the news site. The main purpose is to process the position in the search results.
- If your site has a page that violates these rules, we recommend blocking this thir d-party content from Google Search Indication.
- The abuse of the site's reputation does not matter:
- Information service site and press release service
- News publications collecting news content from other news publications.
- A site designed to host user content, such as forums and comments. < SPAN> The reputation of the website means to publish a thir d-party page without the management or participation of the website owner. The purpose of this act is to manipulate the position for their own interests in search results and site ranking elements. Such content includes sponsorship, advertising, partnerships, and other thir d-party pages. These pages are usually not supported by the main purpose of the site, or without the management or involvement of the site owner, and is substantially worthwhile to the user.
- Example of exploiting the reputation of the site:
Бесполезные партнерские сайты
Using educational websites, one of the pages contains information about micro loans written by the author of a third party. This page is also applied to other sites, mainly to manipulate search engines rankings.
The main focus is to operate the ranking of search results, and the use of medical sites by posting "Best Casino" information on page 3, which is hardly involved in medical sites.
Topics that can be misleading to users who see this information on the review site using a movie review site (for example, "How to buy subscribers in social networks", "Best Psychic", "Excellent" "To help write the final essay," (etc.) Publish a third party page-to be the position of the search results.
Спам, созданный пользователями
Even though the editorial department of the sports site is not involved in content development, the information of third parties is added in the "Sports Nutrition Review". The main purpose of the site is to operate the ranking of search results.
- Use the news site by posting a coupon on the news site. The main purpose is to process the position in the search results.
- If your site has a page that violates these rules, we recommend blocking this thir d-party content from Google Search Industry.
- The abuse of the site's reputation does not matter:
- Information service site and press release service
News publications collecting news content from other news publications.
Другие причины понижения позиции или удаления сайта из результатов поиска
Удаление на юридических основаниях
A site designed to host user content, such as forums and comments. The abuse of the website's reputation means publishing a thir d-party page without the management or participation of the website owner. The purpose of this act is to manipulate the position for their own interests in search results and site ranking elements. Such content includes sponsorship, advertising, partnerships, and other thir d-party pages. These pages are usually not supported by the main purpose of the site, or without the management or involvement of the site owner, and is substantially worthwhile to the user.
Удаление персональных данных
Example of exploiting the reputation of the site:
Обход средств защиты
Using educational websites, one of the pages contains information about micro loans written by the author of a third party. This page is also applied to other sites, mainly to manipulate search engines rankings.
- The main focus is to operate the ranking of search results, and the use of medical sites by posting "Best Casino" information on page 3, which is hardly involved in medical sites.
- Topics that can be misleading to users who see this information on the review site using a movie review site (for example, "How to buy subscribers in social networks", "Best Psychic", "Excellent" "To help write the final essay," (etc.) Publish a third party page-to be the position of the search results.
Мошенничество
Even though the editorial department of the sports site is not involved in content development, the information of third parties is added in the "Sports Nutrition Review". The main purpose of the site is to operate the ranking of search results.
- Use the news site by posting a coupon on the news site. The main purpose is to process the position in the search results.
- If your site has a page that violates these rules, we recommend blocking this thir d-party content from Google Search Indication.
Information service site and press release service
News publications collecting news content from other news publications.