Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
Document scanners civil affairs
- Publication category
- Impactful algorithms
- Impact assessment
- DPIA
- Status
- In development
General information
Theme
Begin date
Contact information
Link to publication website
Responsible use
Goal and impact
The purpose of using document scanners is to better check whether identification documents handed in or displayed are genuine. The authenticity characteristics of an identification document can be better assessed by an algorithm than by a human with the naked eye. If a document is identified as not genuine by the algorithm, a second check is done, comparing the data with data from the BRP. Then, in case of determination or doubt in accordance with the 4-eye principle, the document is assessed for authenticity. Ultimately, a finding that a document is not genuine may result in a report to the police.
Considerations
The algorithm is a tool and supports visual verification. It contributes to careful identity determination without replacing human assessment.
An algorithm can distinguish authenticity features better than humans. There is always a check by an employee and the four-eye principle is applied. If an initial check cannot guarantee authenticity, a second check is done, again under human supervision. The use of the algorithm reduces the risk of various forms of fraud.
Human intervention
A check is always made by an employee and the four-eye principle is applied. If an initial check cannot guarantee authenticity, a second check is done, again under human supervision.
Risk management
There is always a check by an employee and the four-eye principle is applied. If an initial check cannot guarantee authenticity, a second check is performed, again under the supervision of a human being and in accordance with the four-eye principle. In addition, employees are trained in establishing identity and authenticity of identity documents. The BRP specialists and civil registrars are also trained in establishing the authenticity of source documents and always apply the 4-eye principle in case of doubt.
Legal basis
Compulsory Identification ActPassport Act
BRP Act Art. 2.67(4); BRP Decree Art. 35; UAVG Art. 29 - deployment of biometrics is allowed in case of necessary authentication.
Links to legal bases
Link to Processing Index
Impact assessment
Operations
Data
Identity details mentioned on the document being scanned. A check can also be done by the employee who checks whether the passport photo matches the person at the counter.
Technical design
The algorithm has been taught which features on an identity document guarantee authenticity. By scanning a supplied document for these features, the algorithm can determine whether the authenticity of a document can be guaranteed. If this is not the case, a secondary check is done at the back office, where a more extensive scan is performed with more authenticity features and watched by an employee. In this way, authenticity can be guaranteed even in cases where, for example, damages on the document mean that authenticity is not verified initially.