Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
1003 results found
- The algorithm helps the CIZ employee choose the care profile that best suits the client's care needs. A care profile states what care a person needs.Read moreLast change on 31st of October 2024, at 16:40 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Residents and entrepreneurs of Dutch municipalities are given the opportunity to apply for some 31 civil affairs products digitally via the municipal website. In doing so, the system performs checks on personal data.Read moreLast change on 31st of October 2024, at 15:09 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm underlines personal data in documents. An employee has to look at all pages and check whether the document is properly anonymised. Then the software removes all highlighted information and blacklists it. After that, the documents can be published, for example under the Open Government ...Read moreLast change on 31st of October 2024, at 15:08 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA, ...
- Status
- In development
- The pre-reading software on our website, ReadSpeaker also includes a (DNN) algorithm. "ReadSpeaker uses next-generation Deep Neural Network (DNN) technology to structurally improve voice quality at all levels."Read moreLast change on 31st of October 2024, at 15:04 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Read moreLast change on 31st of October 2024, at 12:10 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm underlines personal data in documents. An employee has to look at all pages and check whether the document is properly anonymised. Then the software removes all highlighted information and blacklists it. After that, the documents can be published, for example under the Open Government ...Read moreLast change on 31st of October 2024, at 9:40 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA, ...
- Status
- In use
- The deduplication script supports search specialists in filtering duplicate files in a Woo request.Read moreLast change on 31st of October 2024, at 8:26 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm in the software is mainly set to recognise and anonymise privacy-sensitive information in documents. Basis for this is the AVG. The tool is also used to highlight and mask information that cannot be shared for other reasons (based on another basis, e.g. the Woo) in a document.Read moreLast change on 30th of October 2024, at 15:57 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Read moreLast change on 30th of October 2024, at 15:56 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Detecting cracks in embankments using AIRead moreLast change on 30th of October 2024, at 7:41 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In development