Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.

SmartLockR

This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.

Last change on 17th of April 2025, at 14:29 (CET) | Publication Standard 1.0
Publication category
Other algorithms
Impact assessment
Field not filled in.
Status
In use

General information

Theme

Work

Begin date

2023-03

Contact information

privacy@vrzhz.nl

Responsible use

Goal and impact

The purpose of this algorithm is to help ensure that information sent by e-mail is properly secured. In other words: not with too few security measures, but not with too many either. The algorithm contributes to this by alerting e-mail senders to sensitive information and encouraging them to then send this information securely. If they choose to do so, the e-mail is secured with encryption, two-factor authentication for the recipient, revocation option and logging.

This ensures that sensitive information is secured, while insensitive information can be accessed without additional friction for the recipient. The algorithm only impacts the process of sending e-mails and does not affect the substantive legal status of citizens or businesses.

Considerations

The use of this algorithm helps ensure that e-mails are sent with the right level of security.

Human intervention

In principle, the user makes the choice whether or not to send an e-mail securely based on the recommendation by the algorithm. It is also possible to automate the choice of whether or not to send an e-mail securely based on the algorithm. In that case, a user can still choose to explicitly send an e-mail securely by himself.

Risk management

The overall performance of the algorithm is monitored by the internal functional manager.

Links to legal bases

AVG Artikel 25: https://www.privacy-regulation.eu/nl/artikel-25-gegevensbescherming-door-ontwerp-en-door-standaardinstellingen-EU-AVG.htm

Operations

Data

The algorithm is based on the preset content policy. This content policy is filled with words that are (in)directly related to privacy. Think of email address, house number, bank account number, appointment decision, password, etc.

This list has been manually created by the VRZHZ. SmartLockR also has the possibility to recognise three standard formats: iBANv1, CreditCardv1 and BSN. As soon as a word (or part of a word) or 1 of the 3 standard formats is recognised, SmartLockR is activated.


Technical design

The algorithm is based on the preset content policy. This content policy is filled with words that are (in)directly related to privacy. Think of email address, house number, bank account number, appointment decision, password, etc.

This list has been manually created by the VRZHZ. SmartLockR also has the possibility to recognise three standard formats: iBANv1, CreditCardv1 and BSN. As soon as a word (or part of a word) or 1 of the 3 standard formats is recognised, SmartLockR is activated.

External provider

SmartLockR

Similar algorithm descriptions

  • This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.

    Last change on 19th of September 2024, at 9:31 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.

    Last change on 17th of January 2025, at 16:19 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.

    Last change on 16th of December 2024, at 8:17 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.

    Last change on 10th of December 2024, at 11:05 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.

    Last change on 10th of December 2024, at 12:09 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    DPIA
    Status
    In use