Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.

Recognise names and personal data in case descriptions from the case system

Masking of personal data to avoid unnecessary processing

Last change on 20th of June 2024, at 8:24 (CET) | Publication Standard 1.0
Publication category
Impactful algorithms
Impact assessment
Field not filled in.
Status
Out of use

General information

Theme

Organisation and business operations

Begin date

1-2022

End date

12-2022

Contact information

algoritmeregister@stichtsevecht.nl

Responsible use

Goal and impact

To prevent other models from learning from individuals' data, they are masked in advance using an existing recognition algorithm.

Considerations

The disadvantage is that it will never be fully comprehensive and can therefore create false security in terms of processing personal data.

Human intervention

Field not filled in.

Risk management

Field not filled in.

Operations

Data

Case data (data from the case system)

Technical design

Recognising names using an existing deep learning model.

External provider

internally developed

Similar algorithm descriptions

  • Algorithm recognises and anonymises personal data in documents

    Last change on 27th of February 2025, at 7:57 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • The algorithm recognises and anonymises personal data in documents.

    Last change on 10th of September 2024, at 12:06 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    DPIA
    Status
    In use
  • This algorithm supports users in sending secure, encrypted e-mails based on automatically detected, predefined information. The algorithm helps prevent data breaches.

    Last change on 31st of March 2025, at 14:04 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm supports users in sending secure, encrypted e-mails based on automatically detected, predefined information. The algorithm helps prevent data breaches.

    Last change on 31st of March 2025, at 14:08 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • Software for automated deletion of personal data

    Last change on 17th of June 2024, at 9:25 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use