Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
1247 results found
- Digitally seized material plays a crucial role in criminal investigations. Digital material includes computers and laptops with files and documents, smartphones with messages and photos, online accounts for communication patterns and cloud storage for data such as plans. Hansken helps organise the d...Read moreLast change on 5th of December 2025, at 7:06 (CET) | Publication Standard 1.0
- Publication category
- High-Risk AI-system
- Impact assessment
- DPIA
- Status
- In use
- The software contains a number of algorithms that allow DNA profiles to be assessed and compared within the criminal case and with the DNA database for criminal cases. These are DNA profiles prepared from individuals and DNA profiles prepared from biological material secured at a crime scene.Read moreLast change on 5th of December 2025, at 6:43 (CET) | Publication Standard 1.0
- Publication category
- High-Risk AI-system
- Impact assessment
- DPIA
- Status
- In use
- Expectation of the amount of crime in a neighbourhood.Read moreLast change on 4th of December 2025, at 15:37 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- IAMA
- Status
- Out of use
- The aim of this pilot is to allow the organisation to gain experience with generative AI and understand its impact and potential with regard to personal effectiveness and potential efficiency gains in specific business processes.Read moreLast change on 4th of December 2025, at 12:45 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In development
- Rule-based algorithms are used to perform some of the administrative work in the invoice processing process. The technique used is: Robotic Process Automation (henceforth RPA)Read moreLast change on 4th of December 2025, at 10:38 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In development
- License plates (registration number, date, time and location, no specific name and address details) of vehicles entering the car park. After payment, cars drive out automatically due to recognition. Entry of the paid parking ticket is not required at the barrier. The application is called ANPR (aut...Read moreLast change on 3rd of December 2025, at 15:30 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The Care Module is an LIJ tool and part of the Ritax. With it, a professional identifies concerns about the home situation. The instrument identifies the number of care factors. Afterwards, the Child Protection Board and/or the Youth Probation Service can weigh up whether professional help is needed...Read moreLast change on 3rd of December 2025, at 13:14 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- DPIA
- Status
- In use
- In criminal investigations involving a sex offence or sexually transgressive behaviour by juveniles (aged 12-18), the J-SOAP D (version III) is used (in addition to the LIJ instruments). The J-SOAP D is used to estimate the risk profile and recidivism risk for vice.Read moreLast change on 3rd of December 2025, at 13:11 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- A digital assistant to support the appraiser. The assistant works by reading and processing letters of objection and evidence and helps prepare response letters.Read moreLast change on 2nd of December 2025, at 15:28 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use
- Zivver helps e-mail users determine when an e-mail contains sensitive information and should be sent securely. Zivver secures emails using an algorithm.Read moreLast change on 2nd of December 2025, at 14:58 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use