Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
Oribi
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
General information
Theme
Begin date
Contact information
Responsible use
Goal and impact
The purpose of this algorithm is to verify the identity of persons registering in the BRP. It compares the face of the person at the counter with the image in the scanned identity document and indicates with what certainty it is the same person. This supports the BRP employee in establishing identity and helps prevent "look-alike fraud". The "4-eye principle" is used here.The impact is that it increases the reliability of the BRP registration process and supports the BRP employee in making identity determination decisions.
Considerations
The deployment of this algorithm helps the BRP employee establish the identity of the citizen at the counter. It increases the reliability of the process and reduces the risk of identity fraud. At the same time, privacy implications and the role of human decision-making in the process have been carefully considered.
Human intervention
There is always human intervention. The BRP employee decides whether the facial scan is used and what is done with the result. The employee is ultimately responsible for the decision on identity determination and possible rejection of registration
Risk management
The facial image is recorded in the system only during the identity determination process and is visible only to BRP employees. This reduces the risk of data leakage or manipulation.System performance is regularly evaluated to ensure accuracy.Strict access controls and security measures have been implemented to prevent unauthorised access to the system.Employees are trained on how to use the system and recognise potential errors or limitations.
Legal basis
BRP Act art. 2.67 4th paragraph: Legal obligation to establish proper identityBesluit BRP art.35UAVG art. 29: Admissibility of biometrics for authentication
Operations
Data
Technical design
The system uses deep learning and advanced face recognition APIs. The technical components include:ID scannerA4 scannerScanning serverSmall monitorFace scannerThe process is as follows:1. The identity document is scanned.2. A face scan is made of the person at the counter.3. The algorithm compares the face scan with the image from the identity document.4. The result of the comparison is displayed on the monitor.5. The BRP employee evaluates the result and makes a decision.Only the result of the scan ('The faces are the same' or 'The faces are not the same') is logged in the BRP system.
External provider
Similar algorithm descriptions
- This algorithm supports BRP employees in preventing "look-alike fraud" by comparing the face of the person at the counter with the image in the scanned identity document.Last change on 3rd of December 2024, at 7:30 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm supports RNI staff in preventing "look-alike fraud" by comparing the face of the person at the counter with the image in the scanned identity document.Last change on 1st of November 2024, at 16:51 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm is used within the BRP API Persons to provide the salutation of the requested person. The salutation is used as an introductory sentence in a letter or e-mail.Last change on 20th of October 2024, at 6:16 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- DPIA
- Status
- In use
- This algorithm is used within the BRP API Persons to provide the age of the requested person.Last change on 20th of October 2024, at 6:18 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- DPIA
- Status
- In use
- The algorithm identifies personal data and pre-entered words in documents. An employee must go through the document and check whether the alert is justified and approve or reject it. An employee can add further markings himself. After approval by the employee, all approved alerts and markings are blacklisted.Last change on 14th of October 2024, at 10:02 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use