(Beijing Bloomberg) Tencent, byte beating, and many Chinese Internet giants have been asked to picked up the government's case algorithm.Analysis believes that this measure aims to prevent data abuse, but it may lead to a disclosure of commercial secrets.

China National Internet Information Office last Friday (August 12) announced the first batch of Internet information service algorithm filing list. Tencent's WeChat, Alibaba's Taobao, Tmall, and other 30 applications were listed.Covering user data collection and personalized recommendations.

Bloomberg pointed out that although the public list has not disclosed the code, it is unclear how much basic program information of the company has to provide by the regulatory agency.The list only covers the brief description of the application mode and related application cases.

Algorithms will determine which TIKTOK videos or WeChat stickers are seen, which is essential for attracting users' attention and promoting growth to it. It is a recognized core business secret.

China has implemented the recommendation and management regulations of the Internet information service algorithm starting in March, requiring Internet companies to disclose algorithms to deal with complaints about data abuse, which also helps regulatory agencies to stricter control over Internet companies.

Zhai Wei, Executive Director of the East China University of Political Science and Law Radio Research Center, said: "The company submits information to the Internet Information Office more than public content, and contains some business secrets that are not suitable for public."

China has continuously tightened regulations in recent years, and restricted domestic science and technology giants at one time, including the expansion of unlimited restrictions, including the introduction of the data security law and personal information protection law last year.

According to regulations, the information submitted by the company must include self -assessment of algorithm security, data collected, whether it contains sensitive biological characteristics or identity information, and data sources for forming algorithms.