Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
Email security
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
General information
Theme
Begin date
Contact information
Responsible use
Goal and impact
The purpose of this algorithm is to help ensure that information sent by e-mail is properly secured. That is, with the right level of security. The algorithm contributes to this by alerting senders of an e-mail message to sensitive information and encouraging them to send this information securely. if the sender chooses to do so, the e-mail will be secured with encryption, two-factor authentication by the recipient, revocation option and logging.
Considerations
The use of the algorithm helps ensure that e-mails are sent with the right level of security. Classification of e-mails by algorithm is more effective than classification based on human estimation or a human-composed glossary. In addition, the algorithm does not affect the content of an e-mail.
Human intervention
The user makes the choice whether or not to send an e-mail securely, based on a recommendation from the algorithm. For certain e-mails, the choice to send securely takes place automatically based on the algorithm. In that case, a user can still choose whether or not to send an e-mail securely.
Risk management
The overall performance of the algorithm is monitored. If it appears that the algorithm is making incorrect classifications more frequently, this is picked up by monitoring so that adjustments to the algorithm can be made. The administrators of the municipality of Almelo have an administrator dashboard in which the details regarding the deployment of the tool are monitored.
Operations
Data
The algorithm is based on anonymised historical messages combined with the information on whether or not these messages are sent securely. Anonymisation takes place in several steps, storing only aggregates over many thousands of messages. In addition, personal data are automatically removed from the data. This anonymises the data, making it impossible to trace the original messages.
Similar algorithm descriptions
- Secure sending of emails containing sensitive information.Last change on 17th of June 2024, at 9:49 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Last change on 15th of October 2024, at 8:14 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Last change on 14th of June 2024, at 7:49 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Last change on 28th of November 2024, at 15:04 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Last change on 28th of November 2024, at 15:04 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use