[{"data":1,"prerenderedAt":422},["ShallowReactive",2],{"navigation_docs_fr":3,"dtpr-schemas-index":14,"dtpr-element-detail-marketing_personalization":22,"dtpr-element-detail-categories":56,"dtpr-element-overlay-marketing_personalization":121},[4,8],{"title":5,"path":6,"stem":7},"Citer DTPR for AI","/fr/cite","fr/11.cite",{"title":9,"path":10,"stem":11,"children":12},"Outils","/fr/tools","fr/8.tools/0.index",[13],{"title":9,"path":10,"stem":11},{"ok":15,"versions":16},true,[17],{"id":18,"status":19,"created_at":20,"content_hash":21},"ai@2026-05-06-beta","beta","2026-05-06T20:23:42.963Z","sha256-2d208111b0c597ff2b38cb1c24168799b0a5ff9290203ebf46c4f7c16a0fcb24",{"ok":15,"version":18,"element":23},{"id":24,"category_id":25,"title":26,"description":30,"authoring_guidance":33,"examples":34,"sources":35,"symbol_id":24,"variables":45,"shape":52,"icon_variants":53},"marketing_personalization","purpose",[27],{"locale":28,"value":29},"en","Marketing & Personalization",[31],{"locale":28,"value":32},"Targets advertising, personalizes recommendations, or profiles audiences for marketing — for example, in-store loyalty offers, personalized signage, behavioural ad targeting.",[],[],[36,41],{"type":37,"title":38,"url":39,"citation":40},"regulation","GDPR Article 22 — Automated individual decision-making, including profiling","https://eur-lex.europa.eu/eli/reg/2016/679/oj","Regulation (EU) 2016/679, Article 22.",{"type":37,"title":42,"url":43,"citation":44},"EU Digital Services Act Articles 26 and 39 — Online platform advertising transparency","https://eur-lex.europa.eu/eli/reg/2022/2065/oj","Regulation (EU) 2022/2065, Articles 26 and 39.",[46],{"id":47,"label":48,"required":51},"additional_description",[49],{"locale":28,"value":50},"Description",false,"hexagon",[54,55],"default","dark",{"ok":15,"version":18,"categories":57},[58,79,130,192,248,292,311,329,353,374,400],{"id":59,"name":60,"description":63,"prompt":66,"authoring_guidance":69,"examples":70,"sources":71,"required":51,"order":72,"datachain_type":73,"shape":74,"element_variables":75},"access",[61],{"locale":28,"value":62},"Access",[64],{"locale":28,"value":65},"Who can see or use the data produced by this AI system.",[67],{"locale":28,"value":68},"Who has access to the data?",[],[],[],9,"ai","rounded-square",[76],{"id":47,"label":77,"required":51},[78],{"locale":28,"value":50},{"id":80,"name":81,"description":84,"prompt":87,"authoring_guidance":90,"examples":91,"sources":92,"required":15,"order":93,"datachain_type":73,"shape":52,"element_variables":94,"element_context":104},"accountable",[82],{"locale":28,"value":83},"Accountable",[85],{"locale":28,"value":86},"The organization responsible for deploying and operating this AI system.",[88],{"locale":28,"value":89},"Who is accountable for this AI system?",[],[],[],2,[95,100],{"id":96,"label":97,"required":15},"title",[98],{"locale":28,"value":99},"Title",{"id":101,"label":102,"required":15},"description",[103],{"locale":28,"value":50},{"id":105,"name":106,"description":109,"values":112},"role",[107],{"locale":28,"value":108},"Role",[110],{"locale":28,"value":111},"How this organization participates in the deployment of the AI system.",[113,122],{"id":114,"name":115,"description":118,"color":121},"vendor",[116],{"locale":28,"value":117},"Vendor",[119],{"locale":28,"value":120},"The organization that builds, supplies, or licenses the AI system.",null,{"id":123,"name":124,"description":127,"color":121},"deployer",[125],{"locale":28,"value":126},"Deployer",[128],{"locale":28,"value":129},"The organization that deploys and operates the AI system in this place.",{"id":131,"name":132,"description":135,"prompt":138,"authoring_guidance":141,"examples":144,"sources":145,"required":15,"order":151,"datachain_type":73,"shape":52,"element_variables":152,"element_context":156},"functional_modes",[133],{"locale":28,"value":134},"Functional Modes",[136],{"locale":28,"value":137},"How this AI system operates — the functional modes (e.g. analytical, semantic, generative, agentic, perceptive, physical) it composes.",[139],{"locale":28,"value":140},"What is the AI system doing?",[142],{"locale":28,"value":143},"Pick one or more functional modes.",[],[146],{"type":147,"title":148,"url":149,"citation":150},"framework","AI Taxonomy — An Operational Framework for Precision in AI Discourse","https://dropleaf.app/d/AlXez8scbd","Narain Jashanmal, v1.1, January 2026.",3,[153],{"id":47,"label":154,"required":51},[155],{"locale":28,"value":50},{"id":157,"name":158,"description":161,"values":164},"autonomy",[159],{"locale":28,"value":160},"Autonomy",[162],{"locale":28,"value":163},"How much this mode decides and acts on its own. The element name says what the mode does; this label says who chooses and who carries out the result.",[165,174,183],{"id":166,"name":167,"description":170,"color":173},"human_decides",[168],{"locale":28,"value":169},"Human decides",[171],{"locale":28,"value":172},"This mode suggests; a person decides what to do next. The AI is always advisory — a human is in the loop on every decision. Example: a triage tool ranks cases for a clinician who chooses which to see first.","#2A9D8F",{"id":175,"name":176,"description":179,"color":182},"human_executes",[177],{"locale":28,"value":178},"Human executes",[180],{"locale":28,"value":181},"This mode decides; a person carries out the result. Example: an optimizer plans the day’s trash-collection routes, and drivers run them.","#6A1B7A",{"id":184,"name":185,"description":188,"color":191},"autonomous",[186],{"locale":28,"value":187},"Autonomous",[189],{"locale":28,"value":190},"This mode decides and acts on its own. No person reviews each decision or carries out the resulting action.","#E76F51",{"id":193,"name":194,"description":197,"prompt":200,"authoring_guidance":203,"examples":204,"sources":205,"required":51,"order":206,"datachain_type":73,"shape":207,"element_variables":208,"element_context":212},"input_dataset",[195],{"locale":28,"value":196},"Input Dataset",[198],{"locale":28,"value":199},"The input data this deployed system processes when it operates. Distinct from training data.",[201],{"locale":28,"value":202},"What input data does this AI system process?",[],[],[],6,"circle",[209],{"id":47,"label":210,"required":15},[211],{"locale":28,"value":50},{"id":213,"name":214,"description":217,"values":220},"pii",[215],{"locale":28,"value":216},"Personal Information",[218],{"locale":28,"value":219},"How identifiable the data is when this system processes it. The element name says what the data is about; this colour says how directly it identifies a person.",[221,230,239],{"id":222,"name":223,"description":226,"color":229},"de_identified",[224],{"locale":28,"value":225},"Anonymized data",[227],{"locale":28,"value":228},"Data about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so this system can’t reasonably tie a record back to an individual.","#4A90D9",{"id":231,"name":232,"description":235,"color":238},"pseudonymous",[233],{"locale":28,"value":234},"Pseudonymous data",[236],{"locale":28,"value":237},"Each person’s data is tied to a token (hash, ID, template) that lets this system recognise the same person across events, but the token itself doesn’t reveal a name. Reidentification is possible with extra information.","#9575CD",{"id":240,"name":241,"description":244,"color":247},"identifiable",[242],{"locale":28,"value":243},"Identifiable data",[245],{"locale":28,"value":246},"The data either contains a direct identifier (name, address, account name, recognisable face or voice, plate number) or carries a token this system uses to look up legal identity during processing.","#FFD700",{"id":249,"name":250,"description":253,"prompt":256,"authoring_guidance":259,"examples":260,"sources":261,"required":51,"order":262,"datachain_type":73,"shape":207,"element_variables":263,"element_context":267},"output_dataset",[251],{"locale":28,"value":252},"Output Dataset",[254],{"locale":28,"value":255},"The output data this deployed system produces when it operates — decisions, content, and actions.",[257],{"locale":28,"value":258},"What does this AI system produce?",[],[],[],8,[264],{"id":47,"label":265,"required":15},[266],{"locale":28,"value":50},{"id":213,"name":268,"description":270,"values":273},[269],{"locale":28,"value":216},[271],{"locale":28,"value":272},"How identifiable the data is when this system produces it. The element name says what the output is about; this colour says how directly it identifies a person.",[274,280,286],{"id":222,"name":275,"description":277,"color":229},[276],{"locale":28,"value":225},[278],{"locale":28,"value":279},"Output about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so the result can’t reasonably be tied back to an individual.",{"id":231,"name":281,"description":283,"color":238},[282],{"locale":28,"value":234},[284],{"locale":28,"value":285},"The output is labelled with a token (hash, ID, template) that lets this system tie the result to the same person across events without revealing a name. Reidentification is possible with extra information.",{"id":240,"name":287,"description":289,"color":247},[288],{"locale":28,"value":243},[290],{"locale":28,"value":291},"The output names a person directly (name, address, account, recognisable face or voice, plate) or carries a token this system resolves to legal identity in the same step.",{"id":293,"name":294,"description":297,"prompt":300,"authoring_guidance":303,"examples":304,"sources":305,"required":51,"order":306,"datachain_type":73,"shape":207,"element_variables":307},"processing",[295],{"locale":28,"value":296},"Algorithm or Model",[298],{"locale":28,"value":299},"What processes the input — the algorithm family, model class, or technique used to turn inputs into outputs.",[301],{"locale":28,"value":302},"What algorithm or model processes the data?",[],[],[],7,[308],{"id":47,"label":309,"required":51},[310],{"locale":28,"value":50},{"id":25,"name":312,"description":315,"prompt":318,"authoring_guidance":321,"examples":322,"sources":323,"required":15,"order":324,"datachain_type":73,"shape":52,"element_variables":325},[313],{"locale":28,"value":314},"Purpose",[316],{"locale":28,"value":317},"Why this AI system exists — the outcome it’s designed to achieve.",[319],{"locale":28,"value":320},"What is the purpose of this AI system?",[],[],[],1,[326],{"id":47,"label":327,"required":51},[328],{"locale":28,"value":50},{"id":330,"name":331,"description":334,"prompt":337,"authoring_guidance":340,"examples":341,"sources":342,"required":51,"order":343,"datachain_type":73,"shape":74,"element_variables":344},"retention",[332],{"locale":28,"value":333},"Retention",[335],{"locale":28,"value":336},"How long the data produced by this AI system is kept.",[338],{"locale":28,"value":339},"How long is the data kept?",[],[],[],10,[345,348],{"id":47,"label":346,"required":51},[347],{"locale":28,"value":50},{"id":349,"label":350,"required":15},"duration",[351],{"locale":28,"value":352},"Duration",{"id":354,"name":355,"description":358,"prompt":361,"authoring_guidance":364,"examples":365,"sources":366,"required":51,"order":367,"datachain_type":73,"shape":368,"element_variables":369},"rights",[356],{"locale":28,"value":357},"Rights",[359],{"locale":28,"value":360},"What you can do in relation to this AI system — how to access, contest, or opt out.",[362],{"locale":28,"value":363},"What are your rights?",[],[],[],5,"octagon",[370],{"id":354,"label":371,"required":15},[372],{"locale":28,"value":373},"Description of Rights",{"id":375,"name":376,"description":379,"prompt":382,"authoring_guidance":385,"examples":386,"sources":387,"required":51,"order":393,"datachain_type":73,"shape":368,"element_variables":394},"risks_mitigation",[377],{"locale":28,"value":378},"Risks & Mitigation",[380],{"locale":28,"value":381},"The risks this AI system could create and how they’re being addressed.",[383],{"locale":28,"value":384},"What are the risks and how are they mitigated?",[],[],[388],{"type":389,"title":390,"url":391,"citation":392},"research_paper","A Collaborative, Human-Centred Taxonomy of AI, Algorithmic, and Automation Harms","https://arxiv.org/abs/2407.01294","Abercrombie et al. (2024). arXiv:2407.01294. CC BY-SA 4.0.",4,[395],{"id":396,"label":397,"required":15},"mitigation",[398],{"locale":28,"value":399},"Description of Risks & Mitigations",{"id":401,"name":402,"description":405,"prompt":408,"authoring_guidance":411,"examples":412,"sources":413,"required":51,"order":414,"datachain_type":73,"shape":74,"element_variables":415},"storage",[403],{"locale":28,"value":404},"Data Storage",[406],{"locale":28,"value":407},"Where the data produced by this AI system is kept.",[409],{"locale":28,"value":410},"Where is the data stored?",[],[],[],11,[416,419],{"id":47,"label":417,"required":51},[418],{"locale":28,"value":50},{"id":349,"label":420,"required":15},[421],{"locale":28,"value":352},1779049710737]