Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.

Anonymisation software

The algorithm recognises (personal) data and otherwise confidential information in a document and makes a proposal to anonymise it. A staff member evaluates the proposal and makes the final adjustment, making the document suitable for publication.

Last change on 16th of August 2024, at 8:50 (CET) | Publication Standard 1.0
Publication category
Other algorithms
Impact assessment
DPIA
Status
In use

General information

Theme

Organisation and business operations

Begin date

09-2023

Contact information

postbus20@enschede.nl

Link to publication website

https://www.enschede.nl

Responsible use

Goal and impact

The municipality wants to be transparent to its residents and entrepreneurs but it also has to comply with privacy legislation, among other things. The deployment of anonymisation software makes this possible by supporting employees in anonymising documents.

Considerations

The use of anonymisation software speeds up and simplifies the process for active and passive disclosure. Automated anonymisation is also less error-prone than human intervention. This reduces the risk of a data leak and better protects the data of residents and entrepreneurs

Human intervention

A staff member reviews the anonymisation software proposal before it is made final.

Risk management

The risks are minimal, as a staff member is always still assessing the result.

Legal basis

General Data Protection Regulation (AVG), General Data Protection Regulation Implementation Act (UAVG) and Open Government Act (Woo), Electronic Publication Act (WEP).

Links to legal bases

  • AVG: https://wetten.overheid.nl/BWBR0011468/2018-05-01
  • UAVG: https://wetten.overheid.nl/BWBR0040940/2021-07-01
  • WOO: https://wetten.overheid.nl/BWBR0045754/2023-04-01
  • WEP: https://wetten.overheid.nl/BWBR0043961/2023-07-01

Link to Processing Index

https://www.enschede.nl/verwerkingsregister-persoonsgegevens

Elaboration on impact assessments

DPIA carried out

Impact assessment

Data Protection Impact Assessment (DPIA)

Operations

Data

This depends on the document being anonymised. Examples include personal data such as e-mail addresses, phone numbers, bank account numbers, address details and signatures.

Technical design

Smart features, such as set rules or templates, make it possible to anonymise per document or as a bulk. In this way, the method and degree of anonymisation of commonly used (standard) documents can also be set. The software then uses pattern recognition and Natural Language Processing to search for names, addresses, dates of birth, specific set words, signatures or regular expressions (such as e-mail, IBAN, BSN). The DataMask software recognises these and makes suggestions to mask or anonymise them fully automatically.

External provider

DataMask B.V.

Link to code base

https://datamask.nl/documenten-anonimiseren/software

Similar algorithm descriptions

  • The algorithm recognises (personal) data and otherwise confidential information in a document and makes a proposal to anonymise it. A staff member evaluates the proposal and makes the final adjustment, making the document suitable for publication.

    Last change on 25th of January 2024, at 12:18 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • The algorithm recognises (personal) data and otherwise confidential information in a document and makes a proposal to anonymise it. A staff member evaluates the proposal and makes the final adjustment, making the document suitable for publication.

    Last change on 25th of January 2024, at 12:16 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • The algorithm recognises (personal) data and otherwise confidential information in a document and makes a proposal to anonymise it. A staff member evaluates the proposal and makes the final adjustment, making the document suitable for publication.

    Last change on 25th of January 2024, at 12:17 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • The algorithm recognises (personal) data and otherwise confidential information in a document and makes a proposal to anonymise it. A staff member evaluates the proposal and makes the final adjustment, making the document suitable for publication.

    Last change on 7th of October 2024, at 15:33 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • The algorithm recognises (personal) data and otherwise confidential information in a document and makes a proposal to anonymise it. A staff member evaluates the proposal and makes the final adjustment, making the document suitable for publication.

    Last change on 25th of January 2024, at 12:15 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use