Chinese Internet Companies Required To Disclose Algorithm Data

Chinese Internet giants including Alibaba, Tiktok-owner ByteDance and Tencent have shared details of their critical  algorithms with China's regulators for the first time. 

The Cyberspace Administration of China (CAC) has published a list with descriptions of 30 algorithms, announcing that its algorithm list would be routinely updated in a bid to exert greater control over data abuse.

Algorithms decide what users see and the rank order that they see it. They are critical to driving the growth of social media platforms and they are customarily very closely guarded by the operating companies. In the US, Meta and Alphabet have successfully argued they are trade secrets amid calls for more disclosure.

China has the biggest base of Internet users in the world, and is a massive market for e-commerce, gaming and smartphones and the government is highly protective of their Internet technology behind these companies and the government does not allow them to export or license it foreign users. Beijing has urged service providers to ensure algorithms "actively spread positive energy", and are not used to encourage indulgences, excessive spending and exposure to celebrity culture. 

Among the listed algorithms is one belonging to e-commerce website Taobao, owned by Alibaba as well as the owner of internationally popular social media platform TikTok.

  • Taobao's algorithm "recommends products or services to users through their digital footprint and historical search data."
  •  ByteDance's algorithm for Douyin, China's version of TikTok, is used to gauge user interests through what they click, comment on, "like" or "dislike".

International brands operated by Alpahabet and Meta have resisted pressure to reveal this kind of information over concerns about how they use data and curate content, but they have resisted until now, saying that algorithms are business secrets.

Chinese regulators have been tightening their grip on the technology sector for several years and the country adopted new rules for algorithms in March, which allow users to opt out of contributing to recommendations. It also required algorithms with "public opinion properties or social mobilisation capabilities" to register with the CAC.

CAC China:    EIET:      BBC:    @BBCWorld   Telangana    Yahoo:    TeluguStop:    

You Might Also Read: 

China Has A  3-Year Plan For Cyber Security:
 

« Improving The Safety & Stability Of Artificial Intelligence
DMS Alerts Should Be Key To Organisations’ Security Orchestration »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

Griffiss Institute (GI)

Griffiss Institute (GI)

GI's primary role is to advocate and facilitate the co-operation of private industry, academia, and the Air Force Research Laboratory in developing solutions to critical cyber security problems.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

Cyber Ireland

Cyber Ireland

Cyber Ireland brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland.

Digital Element

Digital Element

Digital Element is a global IP geolocation and intelligence leader with unrivaled expertise in leveraging IP address insights to deliver new value to companies.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.