Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
781 results found
- Supporting the data breach procedureRead moreLast change on 6th of February 2024, at 10:12 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The Bicycle Platoon Module consists of both smart software and a camera. The module ensures a smooth flow of cyclists.Read moreLast change on 6th of February 2024, at 8:54 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- DPIA, ...
- Status
- In use
- Automated document check and face comparator when registering in the Basic Registry of Persons (BRP) and applying for identity documents for persons over 18 years old. This Algorithm helps the registrant prevent "look-alike fraud". Sourced from the Rijksdienst voor Identiteitsgegevens (RvIG).Read moreLast change on 2nd of February 2024, at 7:56 (CET) | Publication Standard 1.0
- Publication category
- High-Risk AI-system
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm calculates the end date of one or more sentences or measures imposed on a person. This ensures that this person serves their sentence in full and is released on time.Read moreLast change on 1st of February 2024, at 7:11 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Blacklining of privacy-sensitive information (AVG) in documents.Read moreLast change on 30th of January 2024, at 9:16 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm recognises (personal) data and otherwise confidential information in a document and makes a proposal to anonymise it. A staff member evaluates the proposal and makes the final adjustment, making the document suitable for publication.Read moreLast change on 25th of January 2024, at 12:18 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm recognises (personal) data and otherwise confidential information in a document and makes a proposal to anonymise it. A staff member evaluates the proposal and makes the final adjustment, making the document suitable for publication.Read moreLast change on 25th of January 2024, at 12:17 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm recognises (personal) data and otherwise confidential information in a document and makes a proposal to anonymise it. A staff member evaluates the proposal and makes the final adjustment, making the document suitable for publication.Read moreLast change on 25th of January 2024, at 12:16 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm recognises (personal) data and otherwise confidential information in a document and makes a proposal to anonymise it. A staff member evaluates the proposal and makes the final adjustment, making the document suitable for publication.Read moreLast change on 25th of January 2024, at 12:15 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The 'Invitation to File Inheritance Tax Returns (UDA-Erf)' algorithm helps Tax Administration employees determine whether heirs are liable to pay inheritance tax.Read moreLast change on 17th of January 2024, at 18:17 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use