Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
1131 results found
- Identifying and anonymising privacy-sensitive information in information objects (in many cases documents).Read moreLast change on 16th of October 2025, at 6:28 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Identifying and anonymising privacy-sensitive information in information objects (in many cases documents).Read moreLast change on 16th of October 2025, at 6:27 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Identifying and anonymising privacy-sensitive information in information objects (in many cases documents).Read moreLast change on 16th of October 2025, at 6:16 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Read moreLast change on 15th of October 2025, at 12:31 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Read moreLast change on 15th of October 2025, at 12:31 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Read moreLast change on 15th of October 2025, at 12:31 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- ReadSpeaker can read out a page in your browserRead moreLast change on 15th of October 2025, at 7:11 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Municipality of Almere, together with TU/e and Fontys, is investigating how generative AI can support the assessment of supplier documentation in tenders. The aim is to make the process more efficient without compromising transparency, accuracy and safety. The project ties in with ongoing TU/e and F...Read moreLast change on 14th of October 2025, at 12:57 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In development
Game-based assessment (GBA) in selection of government-wide traineeships
Ministry of the Interior and Kingdom Relations
A GBA is one part of the selection process. Candidates play several games to give an impression of the fit with the trainee profile. The test scores are visible in the candidate file as a report.Read moreLast change on 9th of October 2025, at 11:08 (CET) | Publication Standard 1.0- Publication category
- Impactful algorithms
- Impact assessment
- IAMA, DPIA
- Status
- Out of use
- This algorithm calculates the number of vessels passing each rack per hourRead moreLast change on 9th of October 2025, at 10:59 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use