[{"data":1,"prerenderedAt":552},["ShallowReactive",2],{"navigation_docs_fr":3,"dtpr-schemas-index":14,"dtpr-category-detail-categories":22,"dtpr-category-detail-elements-risks_mitigation":394,"dtpr-category-overlay-risks_mitigation":92},[4,8],{"title":5,"path":6,"stem":7},"Citer DTPR for AI","/fr/cite","fr/11.cite",{"title":9,"path":10,"stem":11,"children":12},"Outils","/fr/tools","fr/8.tools/0.index",[13],{"title":9,"path":10,"stem":11},{"ok":15,"versions":16},true,[17],{"id":18,"status":19,"created_at":20,"content_hash":21},"ai@2026-05-06-beta","beta","2026-05-06T20:23:42.963Z","sha256-2d208111b0c597ff2b38cb1c24168799b0a5ff9290203ebf46c4f7c16a0fcb24",{"ok":15,"version":18,"categories":23},[24,49,101,163,219,263,282,301,325,346,372],{"id":25,"name":26,"description":30,"prompt":33,"authoring_guidance":36,"examples":37,"sources":38,"required":39,"order":40,"datachain_type":41,"shape":42,"element_variables":43},"access",[27],{"locale":28,"value":29},"en","Access",[31],{"locale":28,"value":32},"Who can see or use the data produced by this AI system.",[34],{"locale":28,"value":35},"Who has access to the data?",[],[],[],false,9,"ai","rounded-square",[44],{"id":45,"label":46,"required":39},"additional_description",[47],{"locale":28,"value":48},"Description",{"id":50,"name":51,"description":54,"prompt":57,"authoring_guidance":60,"examples":61,"sources":62,"required":15,"order":63,"datachain_type":41,"shape":64,"element_variables":65,"element_context":75},"accountable",[52],{"locale":28,"value":53},"Accountable",[55],{"locale":28,"value":56},"The organization responsible for deploying and operating this AI system.",[58],{"locale":28,"value":59},"Who is accountable for this AI system?",[],[],[],2,"hexagon",[66,71],{"id":67,"label":68,"required":15},"title",[69],{"locale":28,"value":70},"Title",{"id":72,"label":73,"required":15},"description",[74],{"locale":28,"value":48},{"id":76,"name":77,"description":80,"values":83},"role",[78],{"locale":28,"value":79},"Role",[81],{"locale":28,"value":82},"How this organization participates in the deployment of the AI system.",[84,93],{"id":85,"name":86,"description":89,"color":92},"vendor",[87],{"locale":28,"value":88},"Vendor",[90],{"locale":28,"value":91},"The organization that builds, supplies, or licenses the AI system.",null,{"id":94,"name":95,"description":98,"color":92},"deployer",[96],{"locale":28,"value":97},"Deployer",[99],{"locale":28,"value":100},"The organization that deploys and operates the AI system in this place.",{"id":102,"name":103,"description":106,"prompt":109,"authoring_guidance":112,"examples":115,"sources":116,"required":15,"order":122,"datachain_type":41,"shape":64,"element_variables":123,"element_context":127},"functional_modes",[104],{"locale":28,"value":105},"Functional Modes",[107],{"locale":28,"value":108},"How this AI system operates — the functional modes (e.g. analytical, semantic, generative, agentic, perceptive, physical) it composes.",[110],{"locale":28,"value":111},"What is the AI system doing?",[113],{"locale":28,"value":114},"Pick one or more functional modes.",[],[117],{"type":118,"title":119,"url":120,"citation":121},"framework","AI Taxonomy — An Operational Framework for Precision in AI Discourse","https://dropleaf.app/d/AlXez8scbd","Narain Jashanmal, v1.1, January 2026.",3,[124],{"id":45,"label":125,"required":39},[126],{"locale":28,"value":48},{"id":128,"name":129,"description":132,"values":135},"autonomy",[130],{"locale":28,"value":131},"Autonomy",[133],{"locale":28,"value":134},"How much this mode decides and acts on its own. The element name says what the mode does; this label says who chooses and who carries out the result.",[136,145,154],{"id":137,"name":138,"description":141,"color":144},"human_decides",[139],{"locale":28,"value":140},"Human decides",[142],{"locale":28,"value":143},"This mode suggests; a person decides what to do next. The AI is always advisory — a human is in the loop on every decision. Example: a triage tool ranks cases for a clinician who chooses which to see first.","#2A9D8F",{"id":146,"name":147,"description":150,"color":153},"human_executes",[148],{"locale":28,"value":149},"Human executes",[151],{"locale":28,"value":152},"This mode decides; a person carries out the result. Example: an optimizer plans the day’s trash-collection routes, and drivers run them.","#6A1B7A",{"id":155,"name":156,"description":159,"color":162},"autonomous",[157],{"locale":28,"value":158},"Autonomous",[160],{"locale":28,"value":161},"This mode decides and acts on its own. No person reviews each decision or carries out the resulting action.","#E76F51",{"id":164,"name":165,"description":168,"prompt":171,"authoring_guidance":174,"examples":175,"sources":176,"required":39,"order":177,"datachain_type":41,"shape":178,"element_variables":179,"element_context":183},"input_dataset",[166],{"locale":28,"value":167},"Input Dataset",[169],{"locale":28,"value":170},"The input data this deployed system processes when it operates. Distinct from training data.",[172],{"locale":28,"value":173},"What input data does this AI system process?",[],[],[],6,"circle",[180],{"id":45,"label":181,"required":15},[182],{"locale":28,"value":48},{"id":184,"name":185,"description":188,"values":191},"pii",[186],{"locale":28,"value":187},"Personal Information",[189],{"locale":28,"value":190},"How identifiable the data is when this system processes it. The element name says what the data is about; this colour says how directly it identifies a person.",[192,201,210],{"id":193,"name":194,"description":197,"color":200},"de_identified",[195],{"locale":28,"value":196},"Anonymized data",[198],{"locale":28,"value":199},"Data about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so this system can’t reasonably tie a record back to an individual.","#4A90D9",{"id":202,"name":203,"description":206,"color":209},"pseudonymous",[204],{"locale":28,"value":205},"Pseudonymous data",[207],{"locale":28,"value":208},"Each person’s data is tied to a token (hash, ID, template) that lets this system recognise the same person across events, but the token itself doesn’t reveal a name. Reidentification is possible with extra information.","#9575CD",{"id":211,"name":212,"description":215,"color":218},"identifiable",[213],{"locale":28,"value":214},"Identifiable data",[216],{"locale":28,"value":217},"The data either contains a direct identifier (name, address, account name, recognisable face or voice, plate number) or carries a token this system uses to look up legal identity during processing.","#FFD700",{"id":220,"name":221,"description":224,"prompt":227,"authoring_guidance":230,"examples":231,"sources":232,"required":39,"order":233,"datachain_type":41,"shape":178,"element_variables":234,"element_context":238},"output_dataset",[222],{"locale":28,"value":223},"Output Dataset",[225],{"locale":28,"value":226},"The output data this deployed system produces when it operates — decisions, content, and actions.",[228],{"locale":28,"value":229},"What does this AI system produce?",[],[],[],8,[235],{"id":45,"label":236,"required":15},[237],{"locale":28,"value":48},{"id":184,"name":239,"description":241,"values":244},[240],{"locale":28,"value":187},[242],{"locale":28,"value":243},"How identifiable the data is when this system produces it. The element name says what the output is about; this colour says how directly it identifies a person.",[245,251,257],{"id":193,"name":246,"description":248,"color":200},[247],{"locale":28,"value":196},[249],{"locale":28,"value":250},"Output about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so the result can’t reasonably be tied back to an individual.",{"id":202,"name":252,"description":254,"color":209},[253],{"locale":28,"value":205},[255],{"locale":28,"value":256},"The output is labelled with a token (hash, ID, template) that lets this system tie the result to the same person across events without revealing a name. Reidentification is possible with extra information.",{"id":211,"name":258,"description":260,"color":218},[259],{"locale":28,"value":214},[261],{"locale":28,"value":262},"The output names a person directly (name, address, account, recognisable face or voice, plate) or carries a token this system resolves to legal identity in the same step.",{"id":264,"name":265,"description":268,"prompt":271,"authoring_guidance":274,"examples":275,"sources":276,"required":39,"order":277,"datachain_type":41,"shape":178,"element_variables":278},"processing",[266],{"locale":28,"value":267},"Algorithm or Model",[269],{"locale":28,"value":270},"What processes the input — the algorithm family, model class, or technique used to turn inputs into outputs.",[272],{"locale":28,"value":273},"What algorithm or model processes the data?",[],[],[],7,[279],{"id":45,"label":280,"required":39},[281],{"locale":28,"value":48},{"id":283,"name":284,"description":287,"prompt":290,"authoring_guidance":293,"examples":294,"sources":295,"required":15,"order":296,"datachain_type":41,"shape":64,"element_variables":297},"purpose",[285],{"locale":28,"value":286},"Purpose",[288],{"locale":28,"value":289},"Why this AI system exists — the outcome it’s designed to achieve.",[291],{"locale":28,"value":292},"What is the purpose of this AI system?",[],[],[],1,[298],{"id":45,"label":299,"required":39},[300],{"locale":28,"value":48},{"id":302,"name":303,"description":306,"prompt":309,"authoring_guidance":312,"examples":313,"sources":314,"required":39,"order":315,"datachain_type":41,"shape":42,"element_variables":316},"retention",[304],{"locale":28,"value":305},"Retention",[307],{"locale":28,"value":308},"How long the data produced by this AI system is kept.",[310],{"locale":28,"value":311},"How long is the data kept?",[],[],[],10,[317,320],{"id":45,"label":318,"required":39},[319],{"locale":28,"value":48},{"id":321,"label":322,"required":15},"duration",[323],{"locale":28,"value":324},"Duration",{"id":326,"name":327,"description":330,"prompt":333,"authoring_guidance":336,"examples":337,"sources":338,"required":39,"order":339,"datachain_type":41,"shape":340,"element_variables":341},"rights",[328],{"locale":28,"value":329},"Rights",[331],{"locale":28,"value":332},"What you can do in relation to this AI system — how to access, contest, or opt out.",[334],{"locale":28,"value":335},"What are your rights?",[],[],[],5,"octagon",[342],{"id":326,"label":343,"required":15},[344],{"locale":28,"value":345},"Description of Rights",{"id":347,"name":348,"description":351,"prompt":354,"authoring_guidance":357,"examples":358,"sources":359,"required":39,"order":365,"datachain_type":41,"shape":340,"element_variables":366},"risks_mitigation",[349],{"locale":28,"value":350},"Risks & Mitigation",[352],{"locale":28,"value":353},"The risks this AI system could create and how they’re being addressed.",[355],{"locale":28,"value":356},"What are the risks and how are they mitigated?",[],[],[360],{"type":361,"title":362,"url":363,"citation":364},"research_paper","A Collaborative, Human-Centred Taxonomy of AI, Algorithmic, and Automation Harms","https://arxiv.org/abs/2407.01294","Abercrombie et al. (2024). arXiv:2407.01294. CC BY-SA 4.0.",4,[367],{"id":368,"label":369,"required":15},"mitigation",[370],{"locale":28,"value":371},"Description of Risks & Mitigations",{"id":373,"name":374,"description":377,"prompt":380,"authoring_guidance":383,"examples":384,"sources":385,"required":39,"order":386,"datachain_type":41,"shape":42,"element_variables":387},"storage",[375],{"locale":28,"value":376},"Data Storage",[378],{"locale":28,"value":379},"Where the data produced by this AI system is kept.",[381],{"locale":28,"value":382},"Where is the data stored?",[],[],[],11,[388,391],{"id":45,"label":389,"required":39},[390],{"locale":28,"value":48},{"id":321,"label":392,"required":15},[393],{"locale":28,"value":324},{"ok":15,"version":18,"elements":395,"meta":551},[396,415,432,449,466,483,500,517,534],{"id":397,"category_id":347,"title":398,"description":401,"authoring_guidance":404,"examples":405,"sources":406,"symbol_id":407,"variables":408,"shape":340,"icon_variants":412},"autonomy_loss",[399],{"locale":28,"value":400},"Loss of autonomy",[402],{"locale":28,"value":403},"The risk that the AI system limits a person's ability to make their own decisions, control their identity, or choose freely. This includes risks of restricted access to alternatives, deceptive design that nudges decisions toward a particular outcome, and lack of meaningful consent. Mitigations may include opt-out mechanisms, transparent recommendations, defaults that protect agency, and human review of consequential decisions.",[],[],[],"risks_autonomy",[409],{"id":368,"label":410,"required":15},[411],{"locale":28,"value":371},[413,414],"default","dark",{"id":416,"category_id":347,"title":417,"description":420,"authoring_guidance":423,"examples":424,"sources":425,"symbol_id":426,"variables":427,"shape":340,"icon_variants":431},"civil_liberties_harm",[418],{"locale":28,"value":419},"Civil liberties harm",[421],{"locale":28,"value":422},"The risk that the AI system compromises fundamental human rights and civil liberties — speech, assembly, movement, due process, or freedom from arbitrary surveillance. This includes risks from mass facial recognition, predictive policing, censorship of lawful expression, and chilling effects on protest. Mitigations may include strict purpose limits, judicial or independent oversight, narrow data retention, and human-rights impact assessments before deployment.",[],[],[],"risks_civil-liberties",[428],{"id":368,"label":429,"required":15},[430],{"locale":28,"value":371},[413,414],{"id":433,"category_id":347,"title":434,"description":437,"authoring_guidance":440,"examples":441,"sources":442,"symbol_id":443,"variables":444,"shape":340,"icon_variants":448},"environmental_harm",[435],{"locale":28,"value":436},"Environmental harm",[438],{"locale":28,"value":439},"The risk that the AI system causes environmental degradation through energy consumption, water use, e-waste, carbon emissions, or resource extraction for hardware. This includes risks from training-time compute, always-on inference, cooling demands of data centers, and rapid hardware churn. Mitigations may include energy and water efficiency targets, transparent reporting of compute footprint, hardware-lifecycle planning, and renewable-energy procurement for data-centre operations.",[],[],[],"risks_environmental",[445],{"id":368,"label":446,"required":15},[447],{"locale":28,"value":371},[413,414],{"id":450,"category_id":347,"title":451,"description":454,"authoring_guidance":457,"examples":458,"sources":459,"symbol_id":460,"variables":461,"shape":340,"icon_variants":465},"financial_harm",[452],{"locale":28,"value":453},"Financial & business harm",[455],{"locale":28,"value":456},"The risk that the AI system causes financial losses to individuals or organizational damage through erroneous pricing, denied services, fraud, or market manipulation. This includes risks from automated credit decisions, dynamic-pricing inequities, AI-enabled scams, and supply-chain disruption from misuse. Mitigations may include affordability guards, fairness audits of pricing models, fraud-detection layers, and clear redress procedures.",[],[],[],"risks_financial",[462],{"id":368,"label":463,"required":15},[464],{"locale":28,"value":371},[413,414],{"id":467,"category_id":347,"title":468,"description":471,"authoring_guidance":474,"examples":475,"sources":476,"symbol_id":477,"variables":478,"shape":340,"icon_variants":482},"physical_harm",[469],{"locale":28,"value":470},"Physical harm",[472],{"locale":28,"value":473},"The risk that the AI system's outputs lead to physical injury to individuals or damage to property. This includes risks from autonomous vehicles, robotic actuation, faulty navigation guidance, or critical-infrastructure errors that put bodies or property in harm's way. Mitigations may include rigorous safety testing, fail-safe defaults, geofencing of hazardous behavior, and human oversight of high-stakes physical actions.",[],[],[],"risks_physical",[479],{"id":368,"label":480,"required":15},[481],{"locale":28,"value":371},[413,414],{"id":484,"category_id":347,"title":485,"description":488,"authoring_guidance":491,"examples":492,"sources":493,"symbol_id":494,"variables":495,"shape":340,"icon_variants":499},"political_economic_harm",[486],{"locale":28,"value":487},"Political & economic harm",[489],{"locale":28,"value":490},"The risk that the AI system manipulates political discourse, interferes with elections, concentrates market power, or damages public institutions. This includes risks of synthetic media targeting voters, opaque ad-targeting, competitive distortion from monopoly access to data and compute, and erosion of institutional trust. Mitigations may include disclosure of synthetic content, antitrust attention to AI markets, audit access for regulators, and political-ad transparency requirements.",[],[],[],"risks_political-economic",[496],{"id":368,"label":497,"required":15},[498],{"locale":28,"value":371},[413,414],{"id":501,"category_id":347,"title":502,"description":505,"authoring_guidance":508,"examples":509,"sources":510,"symbol_id":511,"variables":512,"shape":340,"icon_variants":516},"psychological_harm",[503],{"locale":28,"value":504},"Psychological harm",[506],{"locale":28,"value":507},"The risk that the AI system causes emotional or mental-health impairment, directly or indirectly. This includes risks from addictive feedback loops, distress caused by surveillance, harassment via generated content, and anxiety from automated denials. Mitigations may include content warnings, well-being safeguards, age-appropriate design, accessible support channels, and rate limits on engagement-maximizing behavior.",[],[],[],"risks_psychological",[513],{"id":368,"label":514,"required":15},[515],{"locale":28,"value":371},[413,414],{"id":518,"category_id":347,"title":519,"description":522,"authoring_guidance":525,"examples":526,"sources":527,"symbol_id":528,"variables":529,"shape":340,"icon_variants":533},"reputational_harm",[520],{"locale":28,"value":521},"Reputational harm",[523],{"locale":28,"value":524},"The risk that the AI system damages the reputation of individuals, groups, or organizations through misidentification, false categorization, or stigmatizing labels. This includes risks of inaccurate face recognition, defamatory generated content, and unfair public scoring that follow people across contexts. Mitigations may include accuracy thresholds before public-facing labels are applied, human review of high-impact identifications, takedown procedures, and clear rights to correction.",[],[],[],"risks_reputational",[530],{"id":368,"label":531,"required":15},[532],{"locale":28,"value":371},[413,414],{"id":535,"category_id":347,"title":536,"description":539,"authoring_guidance":542,"examples":543,"sources":544,"symbol_id":545,"variables":546,"shape":340,"icon_variants":550},"societal_cultural_harm",[537],{"locale":28,"value":538},"Societal & cultural harm",[540],{"locale":28,"value":541},"The risk that the AI system harms communities or culture through erosion of trust, loss of linguistic and cultural diversity, or unhealthy dependency on opaque systems. This includes risks of misinformation at scale, homogenization of cultural expression, replacement of local knowledge, and degradation of public-information ecosystems. Mitigations may include multilingual support, partnerships with affected communities, provenance signals on generated content, and investment in local-language and local-context models.",[],[],[],"risks_societal-cultural",[547],{"id":368,"label":548,"required":15},[549],{"locale":28,"value":371},[413,414],{"total":40,"returned":40,"next_cursor":92},1779049709402]