Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
Velma
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In development
General information
Theme
Begin date
Contact information
Link to publication website
Responsible use
Goal and impact
The system is designed to make the collection and processing of information on cybersecurity vulnerabilities faster and more efficient.
Considerations
Human intervention
NCSC staff are involved in evaluating the quality of the summaries generated. They check whether the information is correct.
Risk management
The system is continuously evaluated for various risks, including ethical aspects, legal implications and cyber security. This risk assessment is regularly updated to stay in line with the evolution of the system. Proactive measures are taken to identify and mitigate potential risks.
Operations
Data
External provider
Similar algorithm descriptions
- The algorithm calculates which absence reports made by schools can be assigned to which compulsory attendance officer.Last change on 5th of July 2024, at 10:32 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The various algorithms and calculation rules within LVMA work together so that information from video images can be converted to interpretable census data as decision-supporting information for public space steering and policy.Last change on 25th of April 2024, at 12:27 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm helps the ACM find price announcements in messages that might say something about tacit or explicit alignment. This information by itself does not trigger action, but it can be a reason for inspectors to further investigate a possible infringement.Last change on 4th of October 2024, at 13:36 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The Operational Readiness Dashboard provides insight into the current operational readiness and deployability of the armed forces. Specifically, the dashboard provides insight into personnel readiness, materiel readiness and exercise readiness per unit. This dashboard runs in BI/VEST, which stands for Business Intelligence/Improved Steering Information.Last change on 28th of November 2024, at 12:30 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use
- The algorithm underlines personal data in documents. An employee has to review all pages and check whether the document is properly anonymised. Then the software removes all highlighted information and blacklists it. After that, the documents can be published, for example under the Open Government Act.Last change on 4th of July 2024, at 10:21 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA, ...
- Status
- In use