Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
Anonymising open documents
- Publication category
- Impactful algorithms
- Impact assessment
- DPIA, ...
- Status
- In use
General information
Theme
Begin date
Contact information
Responsible use
Goal and impact
Automated recognition and anonymisation of privacy-sensitive information in documents
Considerations
Results Uthiek Assessment: automated recognition and anonymisation of privacy-sensitive information makes our document disclosure process better and faster. This contributes to the Privacy value because it reduces the risk of a data breach. This is also because an employee has the last word with every document. By carrying out disclosure better and faster, we can better provide residents with information and be transparent. This increases the information position of residents towards the municipality, and contributes to the Power Relations value.
Human intervention
The algorithm (with a direct impact on Utrecht residents and their living environment) only serves as a source of information for an employee, who takes the appropriate next step based on this information and the context of the situation. This principle is included in our Utrecht framework Internal Guidelines for Algorithm Application.
Risk management
The Utrecht data scientists, Information and Process Advisors (IPA) and Decentralised Information Security Officers (DISO) within the Utrecht municipality have a controlling and monitoring role in the application of the algorithm, in addition to the employees directly involved. By doing so, we want to prevent the following risks from occurring:
- data leak by making personal data of Utrecht residents publicly available
- algorithm takes a decision completely independently, without the intervention of an employee and without interpreting the relevant context of the situation
- 'function creep' regarding data in the application of the algorithm, causing the algorithm to give a distorted picture of what is going on. This can occur because the same type of data is used when applying the algorithm, and the algorithm uses that as confirmation of what comes out as information
Impact assessment
- Utrechts Uthiek Assessment
- Data Protection Impact Assessment (DPIA)
Operations
Data
- existing open documents with 'privacy proof' employee choices
- fictitious documents with fictitious personal data
Similar algorithm descriptions
- Recognising and anonymising privacy-sensitive information in documentsLast change on 12th of June 2024, at 6:53 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Recognising and anonymising privacy-sensitive information in documentsLast change on 30th of May 2024, at 14:12 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Recognising and anonymising privacy-sensitive information in documents and other information sources.Last change on 23rd of October 2024, at 13:58 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Recognise and anonymise privacy-sensitive information and documents.Last change on 14th of October 2024, at 13:17 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use
- Identifying and anonymising privacy-sensitive information in information objects (in many cases documents).Last change on 19th of March 2024, at 14:15 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use