Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.

Biometric identification and verification of aliens

Algorithm used to establish or verify the identity of aliens using fingerprints. Ten fingerprints are used in identification if possible. Identification is establishing the identity of a natural person. Verification is checking whether a claimed identity matches the already known identity.

Last change on 21st of November 2025, at 16:19 (CET) | Publication Standard 1.0
Publication category
High-Risk AI-system
Impact assessment
DPIA
Status
In use

General information

Theme

Migration and Integration

Begin date

06-2006

Contact information

postbusalgoritmes@minjenv.nl

Link to publication website

https://www.rijksoverheid.nl/documenten/richtlijnen/2019/01/07/protocol-identificatie-en-labeling-pil

Responsible use

Goal and impact

The algorithm is used to establish or verify the identity of foreigners as accurately as possible. This is done, for example, when applying for asylum, for regular residence or for supervision aliens. The fingerprints taken can be compared with fingerprints in Dutch and various European systems, such as the police system Havank, Eurodac (European asylum and supervision system) and VIS (European visa system). Which systems are consulted in the process depends on the legal basis and the process within which identification takes place. If fingerprints have been previously registered, or if there are hits in other systems, this may have implications for the continuation of procedures such as visa application or asylum application. The use of fingerprints prevents identity fraud and ensures a reliable determination of identity.

Considerations

Identification of aliens occurs at the start of processes in the migration chain, for example at the IND, the KMar or the Police. The use of fingerprints in identifying aliens is the most reliable form of identification. Fingerprints are unique and belong inextricably to a person. If a foreign national is already known in the Aliens Register (Basisvoorziening Vreemdelingen), or is already registered in other Dutch or European systems, these data can be used for the best possible identification. The use of fingerprints leads to a unique identification of persons. This avoids double registrations and helps the chain partners in carrying out their processes.

Human intervention

The results of the algorithm (person found or not found), due to its high reliability, are generally adopted without human intervention. When in doubt, the Police's biometrics expertise centre can be called in to give a definitive answer. This is sometimes necessary if the quality of the fingerprints is very low or if the system indicates that more than one person has been found.

Risk management

There is a very small risk of individuals being rightly or wrongly found or not found. The quality of the algorithm is continuously monitored and improved by the supplier. If there is any doubt about the result of a comparison, the Police Expertise Centre Biometrics can be called in.

Legal basis

Aliens Act 2000, sections 106a and 107

Links to legal bases

Aliens Act2000: https://wetten.overheid.nl/BWBR0011823/2025-04-15/0

Elaboration on impact assessments

The DPIA of the Basic Immigration Facility details the use of biometrics in identification and verification. The algorithm is intended for fingerprint-based identification and verification and does not make decisions. Decision-making can only be done by human intervention. Fingerprints are only used in the migration chain and the linked European systems Eurodac and VIS. Eurodac and VIS are subject to clear rules set out in the relevant European regulations; for the FET, what is set out in the Aliens Act 2000 applies.

Impact assessment

Data Protection Impact Assessment (DPIA): Opgenomen in de DPIA van de Basisvoorziening Vreemdelingen

Operations

Data

The algorithm uses only scans (images) of fingerprints and the templates derived from them.

Technical design

The algorithm looks at unique features of scanned fingerprints, such as splits and ends. These unique features (minutiae) form a template, which can be compared with templates, stored in a database. If a match is found, there is a hit (match), and the identity is confirmed. If no match is found, there is a no-hit (no match).

External provider

Idemia (https://www.idemia.com)

Similar algorithm descriptions

  • Algorithm used to verify whether two fingerprints taken from the same finger belong to the same person. The fingerprints in question are those recorded in the travel document.

    Last change on 11th of July 2024, at 10:50 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • Algorithm recognizes and anonymizes (personal) data and confidential data in documents before they are published.

    Last change on 15th of July 2024, at 7:16 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    DPIA
    Status
    In use
  • The algorithm marks personal data in documents. An employee manually checks everything and then instructs the marked info to be irreversibly removed or made unreadable. The documents can then be published, e.g. based on the WOO. This is low-risk, self-learning AI.

    Last change on 17th of June 2025, at 9:12 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    DPIA
    Status
    In use
  • The algorithm recognizes (personal) data and otherwise confidential information in a document and supports the anonymization of this data. An employee assesses the proposal and implements the adjustment definitively, so that the document is suitable for publication.

    Last change on 30th of July 2024, at 12:38 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    DPIA
    Status
    In use
  • Algorithm recognises and anonymises (personal) data and confidential data in documents before they are published.

    Last change on 15th of July 2024, at 7:15 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    DPIA
    Status
    In use