Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.

Risk-oriented prioritisation

The algorithm combines signals with data to assess whether more research is needed.

Last change on 18th of December 2025, at 14:57 (CET) | Publication Standard 1.0
Publication category
Impactful algorithms
Impact assessment
GEB, EIA
Status
In use

General information

Theme

Social Security

Begin date

2025-11

Contact information

https://uwv.nl/nl/service-en-contact/contact-uwv

Link to source registration

https://www.uwv.nl/nl/over-uwv/algoritmeregister-uwv/risicogericht-prioriteren

Responsible use

Goal and impact

When you receive benefits, it is important that you follow the rules. If there are signs that you are breaking rules, we assess whether more investigation is needed. For this, we use, among other things, the Risk-Focused Prioritisation algorithm.

Considerations

UWV receives reports from various sources that clients may be breaking rules. These signals come from citizens, UWV employees and other government departments, such as the Tax and Customs Administration and the police. The signals do not always contain sufficient information. To assess a signal, we need more data. Much of this data is in our systems and thus already known to UWV. The Risk-Focused Prioritisation algorithm automatically looks for that data. An employee then investigates whether the rules have actually been violated.

Human intervention

Our staff monitor the use of the algorithm in the following ways:

  • Staff assess the signals and ultimately decide whether follow-up steps are needed.
  • In creating and managing the algorithm, different experts work together, such as analysts, lawyers and executive staff.
  • Internal and external specialists check whether the algorithm works properly and is ethical. We follow government guidelines on algorithms in doing so. At least once a year, we check whether there are possibilities to improve the algorithm.

Risk management

We ensure that we comply with information security and privacy requirements. We do this in the following ways:

  • An independent external organisation performs quality checks to test whether the algorithm is careful. This is done in addition to the standard checks done by our specialist UWV staff. In this way, we reduce the risk of errors.
  • We always make sure that employees do the assessment and not the algorithm.
  • Changes to the algorithm always involve several UWV employees.
  • We comply with the Archives Act by deleting data that is not or no longer important.
  • We check data quality several times a year.


Elaboration on impact assessments

GEB and DPIA (Data Protection Impact Assessment) are two names for the same tool under the AVG/GDPR.

An EIA was carried out instead of the IAMA.

Impact assessment

  • GEB: Gegevensbeschermingseffectbeoordeling
  • EIA: Ethische Impact Assessment

Operations

Data

The algorithm combines signals with data from various UWV systems. This allows us to know who is involved and what the possible violation is. We do not disclose all the data used by the algorithm. This avoids influencing the outcome of the algorithm.

The algorithm uses the following data, among others:

  • Information received from citizens, UWV employees and other government departments
  • your name, address and/or date of birth
  • The possible offence, such as Illegitimate income or identity fraud
  • Additional data from UWV's systems
  • data such as your citizen service number
  • data on the type of benefit(s), e.g. whether it is an unemployment benefit or sickness benefit
  • information about the duration of your benefit(s), e.g. on what date the benefit started and when it ends

Technical design

The algorithm processes the data in 3 steps:

  1. Collect: the algorithm collects the required data from the received signals.
  2. Supplementing: the algorithm supplements the signals with data where necessary.
  3. Prioritise: we use some of the data, such as the subject of the possible offence, to prioritise the signal.

Our staff handle the signals and investigate whether a client has broken the rules.

Similar algorithm descriptions

  • The AP uses this algorithm to classify data breach reports by severity. Based on that classification, inspectors can prioritise serious reports. The algorithm does not contain any personal data.

    Last change on 11th of October 2024, at 9:33 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm creates a risk sorting of educational institutions (schools, courses or school boards) to conduct targeted desk research, as part of the annual performance and risk analysis.

    Last change on 22nd of May 2024, at 8:41 (CET) | Publication Standard 1.0
    Publication category
    Impactful algorithms
    Impact assessment
    IAMA
    Status
    In use
  • The risk prioritisation scores companies based on compliance behaviour, environmental variables and the latest controls. The higher a company is on the list, the earlier it is eligible for inspections which can have an impact on any occurrences on humans and the environment.

    Last change on 3rd of April 2024, at 13:50 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm helps Customs and its enforcement partners select goods for inspection based on risk. It uses declaration data from companies and looks at whether or not there is a risk of introducing and importing products covered by organic legislation.

    Last change on 2nd of May 2025, at 12:47 (CET) | Publication Standard 1.0
    Publication category
    Impactful algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm assigns a priority category based on data recorded in the environmental department's case system.

    Last change on 3rd of December 2024, at 13:23 (CET) | Publication Standard 1.0
    Publication category
    Impactful algorithms
    Impact assessment
    Field not filled in.
    Status
    In use