Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.

Email security

Secure sending of e-mails containing confidential information

Last change on 27th of February 2025, at 8:29 (CET) | Publication Standard 1.0
Publication category
Other algorithms
Impact assessment
Field not filled in.
Status
In use

General information

Theme

Organisation and business operations

Begin date

2017

Contact information

privacy@almelo.nl

Responsible use

Goal and impact

The purpose of this algorithm is to help ensure that information sent by e-mail is properly secured. That is, with the right level of security. The algorithm contributes to this by alerting senders of an e-mail message to sensitive information and encouraging them to send this information securely. if the sender chooses to do so, the e-mail will be secured with encryption, two-factor authentication by the recipient, revocation option and logging.

Considerations

The use of the algorithm helps ensure that e-mails are sent with the right level of security. Classification of e-mails by algorithm is more effective than classification based on human estimation or a human-composed glossary. In addition, the algorithm does not affect the content of an e-mail.

Human intervention

The user makes the choice whether or not to send an e-mail securely, based on a recommendation from the algorithm. For certain e-mails, the choice to send securely takes place automatically based on the algorithm. In that case, a user can still choose whether or not to send an e-mail securely.

Risk management

The overall performance of the algorithm is monitored. If it appears that the algorithm is making incorrect classifications more frequently, this is picked up by monitoring so that adjustments to the algorithm can be made. The administrators of the municipality of Almelo have an administrator dashboard in which the details regarding the deployment of the tool are monitored.

Operations

Data

The algorithm is based on anonymised historical messages combined with the information on whether or not these messages are sent securely. Anonymisation takes place in several steps, storing only aggregates over many thousands of messages. In addition, personal data are automatically removed from the data. This anonymises the data, making it impossible to trace the original messages.

Similar algorithm descriptions

  • Secure sending of emails containing sensitive information.

    Last change on 17th of June 2024, at 9:49 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.

    Last change on 15th of October 2024, at 8:14 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.

    Last change on 14th of June 2024, at 7:49 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.

    Last change on 28th of November 2024, at 15:04 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.

    Last change on 28th of November 2024, at 15:04 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use