China Mandates Security Reviews For AI Services Like ChatGPT

China's government has announced that’ it will require a security review of generative Artificial Intelligence (AI ) services before they’re allowed to operate, meaning that there is now uncertainty over ChatGPT comparable bots from the country’s largest tech companies. 

This comes at the same time as the Chinese technology giant Alibaba has announced plans to introduce its own (AI) ChatGPT-style product called Tongyi Qianwen. Its cloud computing unit says it will integrate the chatbot across Alibaba's businesses in the "near future" but did not give details on its timeline.

Companies from Alibaba Group to SenseTime and Baidu all aim to build the definitive next-generation AI platform for the world's largest Internet market. 

This regulation has been issued following publication of a report from the Cyberspace Administration of China (CAC) that says that providers of services must ensure content is accurate and respects intellectual property and neither discriminates nor endangers security and the AI operators must also clearly label AI-generated content. 

Providers of services must ensure content is accurate and respects intellectual property, and neither discriminates nor endangers security, the Cyberspace Administration of China said in draft guidelines seeking public feedback. 
AI operators must also clearly label AI-generated content, the country’s Internet overseer said in a statement posted on its website.

This reflects a growing wave of development abroad with Alphabet’s Google and Microsoft among the many tech companies exploring generative AI, which can create original content from poetry to art just with simple user prompts. The CAC's requirements add to Beijing's growing attempts to regulate the explosive growth of generative AI since OpenAI's ChatGPT first enthused the technology industry over the past few months.

That mirrors a growing wave of development abroad with Alphabet's Google and Microsoft among the many tech companies exploring generative AI, which can create original content from poetry to art just with simple user prompts. 

China has prioritsied the development of AI at a time when the country is locked in a conflict with the US over technology from chips to EVs. But it remains uncertain how the government intends to both galvanise and police the emergent field. 

CAC:     Bloomberg:    Slashdot:       Haystack:    Caixin:    AFR:       Business Telegraph:     BBC:   

Image: William Potter

You Might Also Read: 

ChatGPT Language Model Risks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Maritime Technologies Are Transforming The Shipping Industry
Immutable Storage Is The One Solution That Will Keep Your Data Safe »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

Lanner Electronics

Lanner Electronics

Lanner Electronics is a leading hardware provider for advanced network appliances and industrial automation solutions including cyber security.

ACI Solutions

ACI Solutions

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients.

Soverus Security Solutions

Soverus Security Solutions

Soverus cyber security services and solutions include regulatory compliance, risk assessments, audits, security architecture design, solution delivery, technical support and training

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

CyberNB

CyberNB

Canada's epicentre for cybersecurity. CyberNB is focused on cyber skills and workforce development, R&D, protecting our critical infrastructure, innovation and building a world class cyber ecosystem.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

WebSec B.V.

WebSec B.V.

WebSec is a Dutch Cybersecurity firm mainly focused on offensive security services such as pentesting, red teaming and security awareness and phishing campaigns.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

Cyber Crucible

Cyber Crucible

Cyber Crucible is a cybersecurity Software as a Service company definitively removing the risk of data extortion from customer environments.