Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
Biometric identification and verification of aliens
- Publication category
- High-Risk AI-system
- Impact assessment
- DPIA
- Status
- In use
General information
Theme
Begin date
Contact information
Link to publication website
Responsible use
Goal and impact
The algorithm is used to establish or verify the identity of foreigners as accurately as possible. This is done, for example, when applying for asylum, for regular residence or for supervision aliens. The fingerprints taken can be compared with fingerprints in Dutch and various European systems, such as the police system Havank, Eurodac (European asylum and supervision system) and VIS (European visa system). Which systems are consulted in the process depends on the legal basis and the process within which identification takes place. If fingerprints have been previously registered, or if there are hits in other systems, this may have implications for the continuation of procedures such as visa application or asylum application. The use of fingerprints prevents identity fraud and ensures a reliable determination of identity.
Considerations
Identification of aliens occurs at the start of processes in the migration chain, for example at the IND, the KMar or the Police. The use of fingerprints in identifying aliens is the most reliable form of identification. Fingerprints are unique and belong inextricably to a person. If a foreign national is already known in the Aliens Register (Basisvoorziening Vreemdelingen), or is already registered in other Dutch or European systems, these data can be used for the best possible identification. The use of fingerprints leads to a unique identification of persons. This avoids double registrations and helps the chain partners in carrying out their processes.
Human intervention
The results of the algorithm (person found or not found), due to its high reliability, are generally adopted without human intervention. When in doubt, the Police's biometrics expertise centre can be called in to give a definitive answer. This is sometimes necessary if the quality of the fingerprints is very low or if the system indicates that more than one person has been found.
Risk management
There is a very small risk of individuals being rightly or wrongly found or not found. The quality of the algorithm is continuously monitored and improved by the supplier. If there is any doubt about the result of a comparison, the Police Expertise Centre Biometrics can be called in.
Legal basis
Aliens Act 2000, sections 106a and 107
Links to legal bases
Elaboration on impact assessments
The DPIA of the Basic Immigration Facility details the use of biometrics in identification and verification. The algorithm is intended for fingerprint-based identification and verification and does not make decisions. Decision-making can only be done by human intervention. Fingerprints are only used in the migration chain and the linked European systems Eurodac and VIS. Eurodac and VIS are subject to clear rules set out in the relevant European regulations; for the FET, what is set out in the Aliens Act 2000 applies.
Impact assessment
Operations
Data
The algorithm uses only scans (images) of fingerprints and the templates derived from them.
Technical design
The algorithm looks at unique features of scanned fingerprints, such as splits and ends. These unique features (minutiae) form a template, which can be compared with templates, stored in a database. If a match is found, there is a hit (match), and the identity is confirmed. If no match is found, there is a no-hit (no match).
External provider
Similar algorithm descriptions
Fingerprint-based identity verification for inclusion in travel document
National Authority for Identity Data
Algorithm used to verify whether two fingerprints taken from the same finger belong to the same person. The fingerprints in question are those recorded in the travel document.Last change on 11th of July 2024, at 10:50 (CET) | Publication Standard 1.0- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Algorithm recognizes and anonymizes (personal) data and confidential data in documents before they are published.Last change on 15th of July 2024, at 7:16 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use
- The algorithm marks personal data in documents. An employee manually checks everything and then instructs the marked info to be irreversibly removed or made unreadable. The documents can then be published, e.g. based on the WOO. This is low-risk, self-learning AI.Last change on 17th of June 2025, at 9:12 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use
- The algorithm recognizes (personal) data and otherwise confidential information in a document and supports the anonymization of this data. An employee assesses the proposal and implements the adjustment definitively, so that the document is suitable for publication.Last change on 30th of July 2024, at 12:38 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use
- Algorithm recognises and anonymises (personal) data and confidential data in documents before they are published.Last change on 15th of July 2024, at 7:15 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use