Chinese Internet Companies Required To Disclose Algorithm Data

Chinese Internet giants including Alibaba, Tiktok-owner ByteDance and Tencent have shared details of their critical  algorithms with China's regulators for the first time. 

The Cyberspace Administration of China (CAC) has published a list with descriptions of 30 algorithms, announcing that its algorithm list would be routinely updated in a bid to exert greater control over data abuse.

Algorithms decide what users see and the rank order that they see it. They are critical to driving the growth of social media platforms and they are customarily very closely guarded by the operating companies. In the US, Meta and Alphabet have successfully argued they are trade secrets amid calls for more disclosure.

China has the biggest base of Internet users in the world, and is a massive market for e-commerce, gaming and smartphones and the government is highly protective of their Internet technology behind these companies and the government does not allow them to export or license it foreign users. Beijing has urged service providers to ensure algorithms "actively spread positive energy", and are not used to encourage indulgences, excessive spending and exposure to celebrity culture. 

Among the listed algorithms is one belonging to e-commerce website Taobao, owned by Alibaba as well as the owner of internationally popular social media platform TikTok.

  • Taobao's algorithm "recommends products or services to users through their digital footprint and historical search data."
  •  ByteDance's algorithm for Douyin, China's version of TikTok, is used to gauge user interests through what they click, comment on, "like" or "dislike".

International brands operated by Alpahabet and Meta have resisted pressure to reveal this kind of information over concerns about how they use data and curate content, but they have resisted until now, saying that algorithms are business secrets.

Chinese regulators have been tightening their grip on the technology sector for several years and the country adopted new rules for algorithms in March, which allow users to opt out of contributing to recommendations. It also required algorithms with "public opinion properties or social mobilisation capabilities" to register with the CAC.

CAC China:    EIET:      BBC:    @BBCWorld   Telangana    Yahoo:    TeluguStop:    

You Might Also Read: 

China Has A  3-Year Plan For Cyber Security:
 

« Improving The Safety & Stability Of Artificial Intelligence
DMS Alerts Should Be Key To Organisations’ Security Orchestration »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

Cyber adAPT

Cyber adAPT

Cyber adAPT offers a leading network threat detection platform (NTD) to the enterprise and ODM/OEM markets.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Uniken

Uniken

Uniken REL-ID is a safe, simple, and scalable security platform that tightly integrates your identity, authentication, and channel security.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Digiserve

Digiserve

Digiserve by Telkom Indonesia is an end-to-end managed solutions provider committed to empowering enterprises in Indonesia.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.