Chinese Internet Companies Required To Disclose Algorithm Data

Chinese Internet giants including Alibaba, Tiktok-owner ByteDance and Tencent have shared details of their critical  algorithms with China's regulators for the first time. 

The Cyberspace Administration of China (CAC) has published a list with descriptions of 30 algorithms, announcing that its algorithm list would be routinely updated in a bid to exert greater control over data abuse.

Algorithms decide what users see and the rank order that they see it. They are critical to driving the growth of social media platforms and they are customarily very closely guarded by the operating companies. In the US, Meta and Alphabet have successfully argued they are trade secrets amid calls for more disclosure.

China has the biggest base of Internet users in the world, and is a massive market for e-commerce, gaming and smartphones and the government is highly protective of their Internet technology behind these companies and the government does not allow them to export or license it foreign users. Beijing has urged service providers to ensure algorithms "actively spread positive energy", and are not used to encourage indulgences, excessive spending and exposure to celebrity culture. 

Among the listed algorithms is one belonging to e-commerce website Taobao, owned by Alibaba as well as the owner of internationally popular social media platform TikTok.

  • Taobao's algorithm "recommends products or services to users through their digital footprint and historical search data."
  •  ByteDance's algorithm for Douyin, China's version of TikTok, is used to gauge user interests through what they click, comment on, "like" or "dislike".

International brands operated by Alpahabet and Meta have resisted pressure to reveal this kind of information over concerns about how they use data and curate content, but they have resisted until now, saying that algorithms are business secrets.

Chinese regulators have been tightening their grip on the technology sector for several years and the country adopted new rules for algorithms in March, which allow users to opt out of contributing to recommendations. It also required algorithms with "public opinion properties or social mobilisation capabilities" to register with the CAC.

CAC China:    EIET:      BBC:    @BBCWorld   Telangana    Yahoo:    TeluguStop:    

You Might Also Read: 

China Has A  3-Year Plan For Cyber Security:
 

« Improving The Safety & Stability Of Artificial Intelligence
DMS Alerts Should Be Key To Organisations’ Security Orchestration »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

Innotec Security

Innotec Security

Innotec Security is a Spanish company specializing in cybersecurity-as-a-service, cyber resilience and cyber risk management.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

VIQU Recruitment

VIQU Recruitment

VIQU Recruitment was formed with the primary focus of providing 'Smarter People Solutions' to the UK’s professional IT & Cyber Security markets.

Pelion IoT

Pelion IoT

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

1Password

1Password

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone.

Quantexa

Quantexa

Quantexa automates millions of operational decisions, at scale, across multiple business units, including Anti-Money Laundering, Know-Your-Customer, Fraud, Credit Risk and Customer Intelligence.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

Fortiedge

Fortiedge

Fortiedge is an IT Security solution provider specializing in Cyber Security practices and solutions for our clients.

Imageware

Imageware

Imageware is a leader in biometric cybersecurity. Protect against costly, damaging ransomware hacks by employing biometric cybersecurity solutions.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

Bastion Technologies

Bastion Technologies

All your cyber defense. One platform. Keep your business assets and employees safe under one roof. Manage your cyber defense quickly, easily & efficiently.

Omdia

Omdia

Omdia is a technology research and advisory group. Our deep knowledge of tech markets combined with our actionable insights empower organizations to make smart growth decisions.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.