Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
781 results found
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Read moreLast change on 3rd of April 2024, at 12:56 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Based on satellite images, crop recognition takes place which are verified with prescribed cropping plans in leases.Read moreLast change on 27th of March 2024, at 10:10 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Residents and entrepreneurs of Dutch municipalities are given the opportunity to apply for some 31 civil affairs products digitally via the municipal website. In doing so, the system performs checks on personal data.Read moreLast change on 21st of March 2024, at 11:03 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Among other things, the algorithm recognises and anonymises (personal) data and confidential (financial) data in documents before they are published, for example on the basis of the Open Government ActRead moreLast change on 21st of March 2024, at 9:54 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm is performed under the Control of Legal Entities Act (Wcr) after a relevant change in a legal entity. This involves determining the probability of the presence of abuse of the legal entity. Legal entities with the highest probability of abuse are manually assessed for risk.Read moreLast change on 20th of March 2024, at 10:23 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Identifying and anonymising privacy-sensitive information in information objects (in many cases documents).Read moreLast change on 19th of March 2024, at 14:15 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Read moreLast change on 19th of March 2024, at 13:43 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Residents and entrepreneurs of Dutch municipalities are given the opportunity to apply for some 31 civil affairs products digitally via the municipal website. In doing so, the system performs checks on personal data.Read moreLast change on 19th of March 2024, at 13:09 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Matching vacancy posted by employers and jobseekers.Read moreLast change on 19th of March 2024, at 10:33 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use
- Residents and entrepreneurs of Dutch municipalities are given the opportunity to apply for some 31 civil affairs products digitally via the municipal website. In doing so, the system performs checks on personal data.Read moreLast change on 19th of March 2024, at 8:47 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use