Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
Anonymisation software
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use
General information
Theme
Begin date
Contact information
Link to publication website
Responsible use
Goal and impact
We use a tool to mask personal data. This is done when decisions are made available for inspection and when documents are requested, for example for objections, Woo requests and other information requests. The anonymisation software is used to prevent personal or confidential data from being unintentionally shared or disclosed.
Considerations
The application supports employees in quickly and carefully wiping away data. It uses a whitelist and blacklist.
A whitelist is a list of specific data, fields, or identifiers explicitly approved to be retained during the anonymisation process.
A blacklist, on the other hand, is a list of data, fields, or identifiers that are explicitly prohibited and must be anonymised or deleted during the anonymisation process.
Human intervention
Risk management
The risks are minimal as a staff member always checks the result still.
A retention policy is set in the application.
Masking is irreversible. The data cannot be traced.
Legal basis
General Data Protection Regulation (AVG), the Open Government Act (Woo)
Links to legal bases
- Algemene Verordening Gegevensbescherming (AVG): https://wetten.overheid.nl/BWBR0040940
- Wet Open Overheid (Woo): https://wetten.overheid.nl/BWBR0045754
Impact assessment
Operations
Data
Technical design
Smart features, such as set rules or templates, make it possible to anonymise per document or as a bulk. In this way, the method and degree of anonymisation of commonly used (standard) documents can also be set. The software then uses pattern recognition and Natural Language Processing to search for names, addresses, dates of birth, specific set words, signatures or regular expressions (such as e-mail, IBAN, BSN). The xxlinc software recognises these and makes suggestions for masking or anonymises them fully automatically.
External provider
Similar algorithm descriptions
- Among other things, the algorithm recognises and anonymises (personal) data and confidential financial data in documents before they are published or shared.Last change on 24th of June 2024, at 11:30 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA, ...
- Status
- In development
- Among other things, the algorithm recognises and anonymises (personal) data and confidential financial data in documents before they are published.Last change on 11th of June 2024, at 10:56 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Among other things, the algorithm recognises and anonymises (personal) data and confidential financial data in documents before they are published.Last change on 14th of June 2024, at 7:27 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Among other things, the algorithm recognises and anonymises (personal) data and confidential financial data in documents before they are published or shared.Last change on 11th of June 2024, at 11:26 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Among other things, the algorithm recognises and anonymises (personal) data and confidential (financial) data in documents before they are published, for example on the basis of the Open Government ActLast change on 9th of April 2024, at 8:56 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use