[{"data":1,"prerenderedAt":427},["ShallowReactive",2],{"navigation_docs_fr":3,"dtpr-schemas-index":14,"dtpr-element-detail-input_sensitive_personal":22,"dtpr-element-detail-categories":63,"dtpr-element-overlay-input_sensitive_personal":130},[4,8],{"title":5,"path":6,"stem":7},"Citer DTPR for AI","/fr/cite","fr/11.cite",{"title":9,"path":10,"stem":11,"children":12},"Outils","/fr/tools","fr/8.tools/0.index",[13],{"title":9,"path":10,"stem":11},{"ok":15,"versions":16},true,[17],{"id":18,"status":19,"created_at":20,"content_hash":21},"ai@2026-05-06-beta","beta","2026-05-06T20:23:42.963Z","sha256-2d208111b0c597ff2b38cb1c24168799b0a5ff9290203ebf46c4f7c16a0fcb24",{"ok":15,"version":18,"element":23},{"id":24,"category_id":25,"title":26,"description":30,"authoring_guidance":33,"examples":34,"sources":35,"symbol_id":46,"variables":47,"shape":53,"icon_variants":54},"input_sensitive_personal","input_dataset",[27],{"locale":28,"value":29},"en","Sensitive personal information",[31],{"locale":28,"value":32},"Health, finances, beliefs, sexuality, immigration status, or other personal information that carries legal and social risk. The AI takes in this kind of protected data. Examples: insurance eligibility at a clinic kiosk, a benefits-application status, a self-declared pronoun.",[],[],[36,41],{"type":37,"title":38,"url":39,"citation":40},"regulation","GDPR Article 9 — Special categories of personal data","https://eur-lex.europa.eu/eli/reg/2016/679/oj","Regulation (EU) 2016/679, Article 9.",{"type":42,"title":43,"url":44,"citation":45},"other","Apple App Store privacy labels — Sensitive Info / Health & Fitness / Financial Info","https://developer.apple.com/app-store/app-privacy-details/","Apple.","sensitive_personal",[48],{"id":49,"label":50,"required":15},"additional_description",[51],{"locale":28,"value":52},"Description","circle",[55,56,57,58,59,60,61,62],"default","dark","de_identified","de_identified.dark","pseudonymous","pseudonymous.dark","identifiable","identifiable.dark",{"ok":15,"version":18,"categories":64},[65,87,139,201,252,296,315,334,358,379,405],{"id":66,"name":67,"description":70,"prompt":73,"authoring_guidance":76,"examples":77,"sources":78,"required":79,"order":80,"datachain_type":81,"shape":82,"element_variables":83},"access",[68],{"locale":28,"value":69},"Access",[71],{"locale":28,"value":72},"Who can see or use the data produced by this AI system.",[74],{"locale":28,"value":75},"Who has access to the data?",[],[],[],false,9,"ai","rounded-square",[84],{"id":49,"label":85,"required":79},[86],{"locale":28,"value":52},{"id":88,"name":89,"description":92,"prompt":95,"authoring_guidance":98,"examples":99,"sources":100,"required":15,"order":101,"datachain_type":81,"shape":102,"element_variables":103,"element_context":113},"accountable",[90],{"locale":28,"value":91},"Accountable",[93],{"locale":28,"value":94},"The organization responsible for deploying and operating this AI system.",[96],{"locale":28,"value":97},"Who is accountable for this AI system?",[],[],[],2,"hexagon",[104,109],{"id":105,"label":106,"required":15},"title",[107],{"locale":28,"value":108},"Title",{"id":110,"label":111,"required":15},"description",[112],{"locale":28,"value":52},{"id":114,"name":115,"description":118,"values":121},"role",[116],{"locale":28,"value":117},"Role",[119],{"locale":28,"value":120},"How this organization participates in the deployment of the AI system.",[122,131],{"id":123,"name":124,"description":127,"color":130},"vendor",[125],{"locale":28,"value":126},"Vendor",[128],{"locale":28,"value":129},"The organization that builds, supplies, or licenses the AI system.",null,{"id":132,"name":133,"description":136,"color":130},"deployer",[134],{"locale":28,"value":135},"Deployer",[137],{"locale":28,"value":138},"The organization that deploys and operates the AI system in this place.",{"id":140,"name":141,"description":144,"prompt":147,"authoring_guidance":150,"examples":153,"sources":154,"required":15,"order":160,"datachain_type":81,"shape":102,"element_variables":161,"element_context":165},"functional_modes",[142],{"locale":28,"value":143},"Functional Modes",[145],{"locale":28,"value":146},"How this AI system operates — the functional modes (e.g. analytical, semantic, generative, agentic, perceptive, physical) it composes.",[148],{"locale":28,"value":149},"What is the AI system doing?",[151],{"locale":28,"value":152},"Pick one or more functional modes.",[],[155],{"type":156,"title":157,"url":158,"citation":159},"framework","AI Taxonomy — An Operational Framework for Precision in AI Discourse","https://dropleaf.app/d/AlXez8scbd","Narain Jashanmal, v1.1, January 2026.",3,[162],{"id":49,"label":163,"required":79},[164],{"locale":28,"value":52},{"id":166,"name":167,"description":170,"values":173},"autonomy",[168],{"locale":28,"value":169},"Autonomy",[171],{"locale":28,"value":172},"How much this mode decides and acts on its own. The element name says what the mode does; this label says who chooses and who carries out the result.",[174,183,192],{"id":175,"name":176,"description":179,"color":182},"human_decides",[177],{"locale":28,"value":178},"Human decides",[180],{"locale":28,"value":181},"This mode suggests; a person decides what to do next. The AI is always advisory — a human is in the loop on every decision. Example: a triage tool ranks cases for a clinician who chooses which to see first.","#2A9D8F",{"id":184,"name":185,"description":188,"color":191},"human_executes",[186],{"locale":28,"value":187},"Human executes",[189],{"locale":28,"value":190},"This mode decides; a person carries out the result. Example: an optimizer plans the day’s trash-collection routes, and drivers run them.","#6A1B7A",{"id":193,"name":194,"description":197,"color":200},"autonomous",[195],{"locale":28,"value":196},"Autonomous",[198],{"locale":28,"value":199},"This mode decides and acts on its own. No person reviews each decision or carries out the resulting action.","#E76F51",{"id":25,"name":202,"description":205,"prompt":208,"authoring_guidance":211,"examples":212,"sources":213,"required":79,"order":214,"datachain_type":81,"shape":53,"element_variables":215,"element_context":219},[203],{"locale":28,"value":204},"Input Dataset",[206],{"locale":28,"value":207},"The input data this deployed system processes when it operates. Distinct from training data.",[209],{"locale":28,"value":210},"What input data does this AI system process?",[],[],[],6,[216],{"id":49,"label":217,"required":15},[218],{"locale":28,"value":52},{"id":220,"name":221,"description":224,"values":227},"pii",[222],{"locale":28,"value":223},"Personal Information",[225],{"locale":28,"value":226},"How identifiable the data is when this system processes it. The element name says what the data is about; this colour says how directly it identifies a person.",[228,236,244],{"id":57,"name":229,"description":232,"color":235},[230],{"locale":28,"value":231},"Anonymized data",[233],{"locale":28,"value":234},"Data about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so this system can’t reasonably tie a record back to an individual.","#4A90D9",{"id":59,"name":237,"description":240,"color":243},[238],{"locale":28,"value":239},"Pseudonymous data",[241],{"locale":28,"value":242},"Each person’s data is tied to a token (hash, ID, template) that lets this system recognise the same person across events, but the token itself doesn’t reveal a name. Reidentification is possible with extra information.","#9575CD",{"id":61,"name":245,"description":248,"color":251},[246],{"locale":28,"value":247},"Identifiable data",[249],{"locale":28,"value":250},"The data either contains a direct identifier (name, address, account name, recognisable face or voice, plate number) or carries a token this system uses to look up legal identity during processing.","#FFD700",{"id":253,"name":254,"description":257,"prompt":260,"authoring_guidance":263,"examples":264,"sources":265,"required":79,"order":266,"datachain_type":81,"shape":53,"element_variables":267,"element_context":271},"output_dataset",[255],{"locale":28,"value":256},"Output Dataset",[258],{"locale":28,"value":259},"The output data this deployed system produces when it operates — decisions, content, and actions.",[261],{"locale":28,"value":262},"What does this AI system produce?",[],[],[],8,[268],{"id":49,"label":269,"required":15},[270],{"locale":28,"value":52},{"id":220,"name":272,"description":274,"values":277},[273],{"locale":28,"value":223},[275],{"locale":28,"value":276},"How identifiable the data is when this system produces it. The element name says what the output is about; this colour says how directly it identifies a person.",[278,284,290],{"id":57,"name":279,"description":281,"color":235},[280],{"locale":28,"value":231},[282],{"locale":28,"value":283},"Output about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so the result can’t reasonably be tied back to an individual.",{"id":59,"name":285,"description":287,"color":243},[286],{"locale":28,"value":239},[288],{"locale":28,"value":289},"The output is labelled with a token (hash, ID, template) that lets this system tie the result to the same person across events without revealing a name. Reidentification is possible with extra information.",{"id":61,"name":291,"description":293,"color":251},[292],{"locale":28,"value":247},[294],{"locale":28,"value":295},"The output names a person directly (name, address, account, recognisable face or voice, plate) or carries a token this system resolves to legal identity in the same step.",{"id":297,"name":298,"description":301,"prompt":304,"authoring_guidance":307,"examples":308,"sources":309,"required":79,"order":310,"datachain_type":81,"shape":53,"element_variables":311},"processing",[299],{"locale":28,"value":300},"Algorithm or Model",[302],{"locale":28,"value":303},"What processes the input — the algorithm family, model class, or technique used to turn inputs into outputs.",[305],{"locale":28,"value":306},"What algorithm or model processes the data?",[],[],[],7,[312],{"id":49,"label":313,"required":79},[314],{"locale":28,"value":52},{"id":316,"name":317,"description":320,"prompt":323,"authoring_guidance":326,"examples":327,"sources":328,"required":15,"order":329,"datachain_type":81,"shape":102,"element_variables":330},"purpose",[318],{"locale":28,"value":319},"Purpose",[321],{"locale":28,"value":322},"Why this AI system exists — the outcome it’s designed to achieve.",[324],{"locale":28,"value":325},"What is the purpose of this AI system?",[],[],[],1,[331],{"id":49,"label":332,"required":79},[333],{"locale":28,"value":52},{"id":335,"name":336,"description":339,"prompt":342,"authoring_guidance":345,"examples":346,"sources":347,"required":79,"order":348,"datachain_type":81,"shape":82,"element_variables":349},"retention",[337],{"locale":28,"value":338},"Retention",[340],{"locale":28,"value":341},"How long the data produced by this AI system is kept.",[343],{"locale":28,"value":344},"How long is the data kept?",[],[],[],10,[350,353],{"id":49,"label":351,"required":79},[352],{"locale":28,"value":52},{"id":354,"label":355,"required":15},"duration",[356],{"locale":28,"value":357},"Duration",{"id":359,"name":360,"description":363,"prompt":366,"authoring_guidance":369,"examples":370,"sources":371,"required":79,"order":372,"datachain_type":81,"shape":373,"element_variables":374},"rights",[361],{"locale":28,"value":362},"Rights",[364],{"locale":28,"value":365},"What you can do in relation to this AI system — how to access, contest, or opt out.",[367],{"locale":28,"value":368},"What are your rights?",[],[],[],5,"octagon",[375],{"id":359,"label":376,"required":15},[377],{"locale":28,"value":378},"Description of Rights",{"id":380,"name":381,"description":384,"prompt":387,"authoring_guidance":390,"examples":391,"sources":392,"required":79,"order":398,"datachain_type":81,"shape":373,"element_variables":399},"risks_mitigation",[382],{"locale":28,"value":383},"Risks & Mitigation",[385],{"locale":28,"value":386},"The risks this AI system could create and how they’re being addressed.",[388],{"locale":28,"value":389},"What are the risks and how are they mitigated?",[],[],[393],{"type":394,"title":395,"url":396,"citation":397},"research_paper","A Collaborative, Human-Centred Taxonomy of AI, Algorithmic, and Automation Harms","https://arxiv.org/abs/2407.01294","Abercrombie et al. (2024). arXiv:2407.01294. CC BY-SA 4.0.",4,[400],{"id":401,"label":402,"required":15},"mitigation",[403],{"locale":28,"value":404},"Description of Risks & Mitigations",{"id":406,"name":407,"description":410,"prompt":413,"authoring_guidance":416,"examples":417,"sources":418,"required":79,"order":419,"datachain_type":81,"shape":82,"element_variables":420},"storage",[408],{"locale":28,"value":409},"Data Storage",[411],{"locale":28,"value":412},"Where the data produced by this AI system is kept.",[414],{"locale":28,"value":415},"Where is the data stored?",[],[],[],11,[421,424],{"id":49,"label":422,"required":79},[423],{"locale":28,"value":52},{"id":354,"label":425,"required":15},[426],{"locale":28,"value":357},1779049713932]