Chinese Internet Companies Required To Disclose Algorithm Data

Chinese Internet giants including Alibaba, Tiktok-owner ByteDance and Tencent have shared details of their critical  algorithms with China's regulators for the first time. 

The Cyberspace Administration of China (CAC) has published a list with descriptions of 30 algorithms, announcing that its algorithm list would be routinely updated in a bid to exert greater control over data abuse.

Algorithms decide what users see and the rank order that they see it. They are critical to driving the growth of social media platforms and they are customarily very closely guarded by the operating companies. In the US, Meta and Alphabet have successfully argued they are trade secrets amid calls for more disclosure.

China has the biggest base of Internet users in the world, and is a massive market for e-commerce, gaming and smartphones and the government is highly protective of their Internet technology behind these companies and the government does not allow them to export or license it foreign users. Beijing has urged service providers to ensure algorithms "actively spread positive energy", and are not used to encourage indulgences, excessive spending and exposure to celebrity culture. 

Among the listed algorithms is one belonging to e-commerce website Taobao, owned by Alibaba as well as the owner of internationally popular social media platform TikTok.

  • Taobao's algorithm "recommends products or services to users through their digital footprint and historical search data."
  •  ByteDance's algorithm for Douyin, China's version of TikTok, is used to gauge user interests through what they click, comment on, "like" or "dislike".

International brands operated by Alpahabet and Meta have resisted pressure to reveal this kind of information over concerns about how they use data and curate content, but they have resisted until now, saying that algorithms are business secrets.

Chinese regulators have been tightening their grip on the technology sector for several years and the country adopted new rules for algorithms in March, which allow users to opt out of contributing to recommendations. It also required algorithms with "public opinion properties or social mobilisation capabilities" to register with the CAC.

CAC China:    EIET:      BBC:    @BBCWorld   Telangana    Yahoo:    TeluguStop:    

You Might Also Read: 

China Has A  3-Year Plan For Cyber Security:
 

« Improving The Safety & Stability Of Artificial Intelligence
DMS Alerts Should Be Key To Organisations’ Security Orchestration »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

Penta Security

Penta Security

Founded on its data encryption technology, Penta Security is a leading provider of web and data security products, solutions and services.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo is the UK’s largest cloud and cyber security event.

ARCON

ARCON

ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Talon Cyber Security

Talon Cyber Security

Talon delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system.

Experis

Experis

Experis provide IT resourcing, project solutions and managed services. We enable organizations to cultivate individuals and teams prepared for the digital age.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

SoftForum

SoftForum

SoftForum is a company specializing in next-generation information security solutions in the Quantum-Resistant-Cryptography (PQC) field.

Bastion Networks

Bastion Networks

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions to protect from online threats.

Alset Technologies

Alset Technologies

Alset Technologies provides DASH - a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.