Chinese Internet Companies Required To Disclose Algorithm Data

Chinese Internet giants including Alibaba, Tiktok-owner ByteDance and Tencent have shared details of their critical  algorithms with China's regulators for the first time. 

The Cyberspace Administration of China (CAC) has published a list with descriptions of 30 algorithms, announcing that its algorithm list would be routinely updated in a bid to exert greater control over data abuse.

Algorithms decide what users see and the rank order that they see it. They are critical to driving the growth of social media platforms and they are customarily very closely guarded by the operating companies. In the US, Meta and Alphabet have successfully argued they are trade secrets amid calls for more disclosure.

China has the biggest base of Internet users in the world, and is a massive market for e-commerce, gaming and smartphones and the government is highly protective of their Internet technology behind these companies and the government does not allow them to export or license it foreign users. Beijing has urged service providers to ensure algorithms "actively spread positive energy", and are not used to encourage indulgences, excessive spending and exposure to celebrity culture. 

Among the listed algorithms is one belonging to e-commerce website Taobao, owned by Alibaba as well as the owner of internationally popular social media platform TikTok.

  • Taobao's algorithm "recommends products or services to users through their digital footprint and historical search data."
  •  ByteDance's algorithm for Douyin, China's version of TikTok, is used to gauge user interests through what they click, comment on, "like" or "dislike".

International brands operated by Alpahabet and Meta have resisted pressure to reveal this kind of information over concerns about how they use data and curate content, but they have resisted until now, saying that algorithms are business secrets.

Chinese regulators have been tightening their grip on the technology sector for several years and the country adopted new rules for algorithms in March, which allow users to opt out of contributing to recommendations. It also required algorithms with "public opinion properties or social mobilisation capabilities" to register with the CAC.

CAC China:    EIET:      BBC:    @BBCWorld   Telangana    Yahoo:    TeluguStop:    

You Might Also Read: 

China Has A  3-Year Plan For Cyber Security:
 

« Improving The Safety & Stability Of Artificial Intelligence
DMS Alerts Should Be Key To Organisations’ Security Orchestration »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

NCX Group

NCX Group

NCX Group is committed to helping customers identify and mitigate the risks inherent in today’s interconnected environments and business processes.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Institute for Pervasive Cybersecurity - Boise State University

Institute for Pervasive Cybersecurity - Boise State University

Boise State University’s Institute for Pervasive Cybersecurity is a leader of innovative cybersecurity research and advancement in Idaho and the region.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.