TikTok’s CEO Interrogated Over Data Privacy

The CEO of TikTok Shou Zi Chew faced strong questioning about the social media app’s privacy from US legislators for more than five hours last week, about whether China has used the app to spy on American usersThe questions came from combative US lawmakers on both ends of the political spectrum over the video-sharing app's alleged ties to China and its potential danger to teenagers. 

TikTok has of millions of US users, and lawmakers have long held concerns over China’s control over the app. In particular, US Congress members expressed concerns about child safety on the app, asked for more parental controls and more comprehensive privacy legislation. 

The hearing marked the first ever appearance before US lawmakers by a TikTok chief executive, and a rare public outing for the 4o-year-old Chew, who has remained largely out of the limelight as the social network’s popularity soars. 

 When Rep. Neal Dunn asked Chew whether Bytedance, TikTok’s China-based parent company, “has spied on Americans at the direction of the Chinese Communist Party,” Chew said “no.” Mr Chew went on “Let me state this unequivocally: ByteDance is not an agent of China or any other country,” 

Dunn also mentioned a newspaper report published in October 2022, that focused on ByteDance’s plans to monitor the physical locations of some US TikTok users. “I don't think that ‘spying’ is the right way to describe it. This is ultimately an internal investigation,” Chew said.

The popular short-form video app has been in the lawmakers’ focus for years as it was possible that TikTok’s data could be accessed by ByteDance and then by the Chinese government

Chew was interrogators by included Rep. John Joyce, who asked about data security and TikTok’s plan to delete data rather than just move it from one server to another. “You have publicly stated that the nonpublic information of TikTok users in the United States is being transferred to an Oracle-based cloud infrastructure because of safety concerns…What’s the outline for dealing with that data that you’ve already amassed?” To which Mr Chew replied “All new data is already stored by default in this Oracle Cloud infrastructure" adding that the effort to move older data should be finished later this year. 

When pressed that TikTok only began planning to delete data after Congress asked about it earlier this month, Chew said TikTok hired a third-party auditor to help with the process and defended the company’s actions: “Congressman, respectfully, there are many companies that use a global workforce. We are not the only one.”
The CEO Chew said TikTok started deleting “historical protected U.S. user data stored in non-Oracle servers” in March and “we expect this process to be completed later this year.” 

These events may culminate in a long predicted and much delayed move by US legislators to regulate the social media platform and it is possible the TikTok’s days may be required to withdraw for the US market. 
 

US Congress:     DefenseOne:   Forbes:   Le Monde:   You Tube:   CNBC:   Guardian:     Platformer:  

You Might Also Read: 

TikTok Is Banned From British Government Phones:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« NCSC Launches Services For Small Firms To Be Safe Online
Russia's Disinformation Campaign Targets Ukraine's Supporters »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

SEEK

SEEK

SEEK create world-class technology solutions to address the needs of job seekers and hirers across multiple sectors including cybersecurity.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Cyber Capital Partners

Cyber Capital Partners

Cyber Capital Partners build strategic and financial partnerships with small and mid-sized cybersecurity companies in highly regulated markets.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

Digital & Intelligence Service (DIS) - Singapore

Digital & Intelligence Service (DIS) - Singapore

DIS is the fourth Service of the SAF, here to defend and dominate in the digital domain, and achieve peace and security for our land.