Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.

Replenishing files

Incoming information is linked to the appropriate file and/or registration in the case system. The registration is put in order so that the digital file is ready for the further process and possible disclosure.

Last change on 8th of October 2024, at 8:06 (CET) | Publication Standard 1.0
Publication category
Impactful algorithms
Impact assessment
Field not filled in.
Status
In use

General information

Theme

  • Nature and Environment
  • Public Order and Safety
  • Organisation and business operations

Begin date

07-2022

Contact information

https://loket.odnzkg.nl/formulier/contactformulier/

Link to publication website

https://odnzkg.nl/algoritmeregister/

Link to source registration

https://odnzkg.nl/algoritmeregister/

Responsible use

Goal and impact

Administrative task of putting the registration in order in the digital file instead of having to be done manually by the employee. The information is more accurate, complete and timely for citizens and businesses.

Considerations

Administrative tasks are reduced. When the information is incorrect or not linked, it creates work for the supervisor to correct. Every file is handled manually after its introduction; so there is always a human check. There are several checks to ensure the correct data is in the digital file (peer review, manager approval). With this, the benefits outweigh the estimated risk.

Human intervention

If the data is absent or incomplete before this automation, human intervention is called in; either to complete the data or to handle it manually. Each file is then dealt with substantively in the process that follows. As a result, each file is also automatically monitored; errors automatically surface during this substantive handling.

Risk management

Automation will be set up so that processing only takes place if data is present and meets the conditions to be added to the record. In all other cases, an employee is called in. The only risk that remains with this is that this data is incorrect, but the underlying cause is incorrect registration.

Legal basis

Environment Act

Links to legal bases

Omgevingswet: https://wetten.overheid.nl/BWBR0037885/2024-01-01/0

Operations

Data

Field not filled in.

Similar algorithm descriptions

  • To correctly determine eligibility of residents, we use the application of an algorithm as a source of information. For example, by pre-determining whether the required information fields are filled in the application.

    Last change on 12th of July 2024, at 9:55 (CET) | Publication Standard 1.0
    Publication category
    Impactful algorithms
    Impact assessment
    DPIA, ...
    Status
    In use
  • The algorithm underlines personal data in documents. An employee has to look at all pages and check whether the document is properly anonymised. Then the software removes all highlighted information and blacklists it. After that, the documents can be published, for example under the Open Government Act (WOO).

    Last change on 17th of December 2024, at 14:22 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • The algorithm underlines personal data in documents. An employee has to look at all pages and check whether the document is properly anonymised. Then the software removes all highlighted information and blacklists it. After that, the documents can be published, for example under the Open Government Act (Woo).

    Last change on 15th of October 2024, at 10:13 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • The algorithm in the software recognises and anonymises personal data and other sensitive information in documents. Governments regularly publish information related to the drafting and implementation of their policies (e.g. based on the Woo). This tool is used to render sensitive data unrecognisable in the process.

    Last change on 20th of November 2024, at 14:27 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    DPIA
    Status
    In use
  • Secure sending of emails containing sensitive information.

    Last change on 17th of June 2024, at 9:49 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use