[{"data":1,"prerenderedAt":425},["ShallowReactive",2],{"navigation_docs_fr":3,"dtpr-schemas-index":14,"dtpr-element-detail-output_decision":22,"dtpr-element-detail-categories":61,"dtpr-element-overlay-output_decision":128},[4,8],{"title":5,"path":6,"stem":7},"Citer DTPR for AI","/fr/cite","fr/11.cite",{"title":9,"path":10,"stem":11,"children":12},"Outils","/fr/tools","fr/8.tools/0.index",[13],{"title":9,"path":10,"stem":11},{"ok":15,"versions":16},true,[17],{"id":18,"status":19,"created_at":20,"content_hash":21},"ai@2026-05-06-beta","beta","2026-05-06T20:23:42.963Z","sha256-2d208111b0c597ff2b38cb1c24168799b0a5ff9290203ebf46c4f7c16a0fcb24",{"ok":15,"version":18,"element":23},{"id":24,"category_id":25,"title":26,"description":30,"authoring_guidance":33,"examples":34,"sources":35,"symbol_id":44,"variables":45,"shape":51,"icon_variants":52},"output_decision","output_dataset",[27],{"locale":28,"value":29},"en","A decision about you",[31],{"locale":28,"value":32},"The AI produces a binding determination about a person — eligibility, classification, ranking, or yes/no. Examples: an access-control system deciding to open a gate, an automated benefits eligibility result, an automated screening that rules someone out.",[],[],[36,41],{"type":37,"title":38,"url":39,"citation":40},"regulation","EU AI Act Article 3(1) — output class \"decisions\"","https://eur-lex.europa.eu/eli/reg/2024/1689/oj","Regulation (EU) 2024/1689, Article 3(1).",{"type":37,"title":42,"url":39,"citation":43},"EU AI Act Annex III — High-risk decision domains","Regulation (EU) 2024/1689, Annex III — biometric ID, employment, essential services, justice, migration, education.","dm_accept-or-deny",[46],{"id":47,"label":48,"required":15},"additional_description",[49],{"locale":28,"value":50},"Description","circle",[53,54,55,56,57,58,59,60],"default","dark","de_identified","de_identified.dark","pseudonymous","pseudonymous.dark","identifiable","identifiable.dark",{"ok":15,"version":18,"categories":62},[63,85,137,199,251,294,313,332,356,377,403],{"id":64,"name":65,"description":68,"prompt":71,"authoring_guidance":74,"examples":75,"sources":76,"required":77,"order":78,"datachain_type":79,"shape":80,"element_variables":81},"access",[66],{"locale":28,"value":67},"Access",[69],{"locale":28,"value":70},"Who can see or use the data produced by this AI system.",[72],{"locale":28,"value":73},"Who has access to the data?",[],[],[],false,9,"ai","rounded-square",[82],{"id":47,"label":83,"required":77},[84],{"locale":28,"value":50},{"id":86,"name":87,"description":90,"prompt":93,"authoring_guidance":96,"examples":97,"sources":98,"required":15,"order":99,"datachain_type":79,"shape":100,"element_variables":101,"element_context":111},"accountable",[88],{"locale":28,"value":89},"Accountable",[91],{"locale":28,"value":92},"The organization responsible for deploying and operating this AI system.",[94],{"locale":28,"value":95},"Who is accountable for this AI system?",[],[],[],2,"hexagon",[102,107],{"id":103,"label":104,"required":15},"title",[105],{"locale":28,"value":106},"Title",{"id":108,"label":109,"required":15},"description",[110],{"locale":28,"value":50},{"id":112,"name":113,"description":116,"values":119},"role",[114],{"locale":28,"value":115},"Role",[117],{"locale":28,"value":118},"How this organization participates in the deployment of the AI system.",[120,129],{"id":121,"name":122,"description":125,"color":128},"vendor",[123],{"locale":28,"value":124},"Vendor",[126],{"locale":28,"value":127},"The organization that builds, supplies, or licenses the AI system.",null,{"id":130,"name":131,"description":134,"color":128},"deployer",[132],{"locale":28,"value":133},"Deployer",[135],{"locale":28,"value":136},"The organization that deploys and operates the AI system in this place.",{"id":138,"name":139,"description":142,"prompt":145,"authoring_guidance":148,"examples":151,"sources":152,"required":15,"order":158,"datachain_type":79,"shape":100,"element_variables":159,"element_context":163},"functional_modes",[140],{"locale":28,"value":141},"Functional Modes",[143],{"locale":28,"value":144},"How this AI system operates — the functional modes (e.g. analytical, semantic, generative, agentic, perceptive, physical) it composes.",[146],{"locale":28,"value":147},"What is the AI system doing?",[149],{"locale":28,"value":150},"Pick one or more functional modes.",[],[153],{"type":154,"title":155,"url":156,"citation":157},"framework","AI Taxonomy — An Operational Framework for Precision in AI Discourse","https://dropleaf.app/d/AlXez8scbd","Narain Jashanmal, v1.1, January 2026.",3,[160],{"id":47,"label":161,"required":77},[162],{"locale":28,"value":50},{"id":164,"name":165,"description":168,"values":171},"autonomy",[166],{"locale":28,"value":167},"Autonomy",[169],{"locale":28,"value":170},"How much this mode decides and acts on its own. The element name says what the mode does; this label says who chooses and who carries out the result.",[172,181,190],{"id":173,"name":174,"description":177,"color":180},"human_decides",[175],{"locale":28,"value":176},"Human decides",[178],{"locale":28,"value":179},"This mode suggests; a person decides what to do next. The AI is always advisory — a human is in the loop on every decision. Example: a triage tool ranks cases for a clinician who chooses which to see first.","#2A9D8F",{"id":182,"name":183,"description":186,"color":189},"human_executes",[184],{"locale":28,"value":185},"Human executes",[187],{"locale":28,"value":188},"This mode decides; a person carries out the result. Example: an optimizer plans the day’s trash-collection routes, and drivers run them.","#6A1B7A",{"id":191,"name":192,"description":195,"color":198},"autonomous",[193],{"locale":28,"value":194},"Autonomous",[196],{"locale":28,"value":197},"This mode decides and acts on its own. No person reviews each decision or carries out the resulting action.","#E76F51",{"id":200,"name":201,"description":204,"prompt":207,"authoring_guidance":210,"examples":211,"sources":212,"required":77,"order":213,"datachain_type":79,"shape":51,"element_variables":214,"element_context":218},"input_dataset",[202],{"locale":28,"value":203},"Input Dataset",[205],{"locale":28,"value":206},"The input data this deployed system processes when it operates. Distinct from training data.",[208],{"locale":28,"value":209},"What input data does this AI system process?",[],[],[],6,[215],{"id":47,"label":216,"required":15},[217],{"locale":28,"value":50},{"id":219,"name":220,"description":223,"values":226},"pii",[221],{"locale":28,"value":222},"Personal Information",[224],{"locale":28,"value":225},"How identifiable the data is when this system processes it. The element name says what the data is about; this colour says how directly it identifies a person.",[227,235,243],{"id":55,"name":228,"description":231,"color":234},[229],{"locale":28,"value":230},"Anonymized data",[232],{"locale":28,"value":233},"Data about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so this system can’t reasonably tie a record back to an individual.","#4A90D9",{"id":57,"name":236,"description":239,"color":242},[237],{"locale":28,"value":238},"Pseudonymous data",[240],{"locale":28,"value":241},"Each person’s data is tied to a token (hash, ID, template) that lets this system recognise the same person across events, but the token itself doesn’t reveal a name. Reidentification is possible with extra information.","#9575CD",{"id":59,"name":244,"description":247,"color":250},[245],{"locale":28,"value":246},"Identifiable data",[248],{"locale":28,"value":249},"The data either contains a direct identifier (name, address, account name, recognisable face or voice, plate number) or carries a token this system uses to look up legal identity during processing.","#FFD700",{"id":25,"name":252,"description":255,"prompt":258,"authoring_guidance":261,"examples":262,"sources":263,"required":77,"order":264,"datachain_type":79,"shape":51,"element_variables":265,"element_context":269},[253],{"locale":28,"value":254},"Output Dataset",[256],{"locale":28,"value":257},"The output data this deployed system produces when it operates — decisions, content, and actions.",[259],{"locale":28,"value":260},"What does this AI system produce?",[],[],[],8,[266],{"id":47,"label":267,"required":15},[268],{"locale":28,"value":50},{"id":219,"name":270,"description":272,"values":275},[271],{"locale":28,"value":222},[273],{"locale":28,"value":274},"How identifiable the data is when this system produces it. The element name says what the output is about; this colour says how directly it identifies a person.",[276,282,288],{"id":55,"name":277,"description":279,"color":234},[278],{"locale":28,"value":230},[280],{"locale":28,"value":281},"Output about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so the result can’t reasonably be tied back to an individual.",{"id":57,"name":283,"description":285,"color":242},[284],{"locale":28,"value":238},[286],{"locale":28,"value":287},"The output is labelled with a token (hash, ID, template) that lets this system tie the result to the same person across events without revealing a name. Reidentification is possible with extra information.",{"id":59,"name":289,"description":291,"color":250},[290],{"locale":28,"value":246},[292],{"locale":28,"value":293},"The output names a person directly (name, address, account, recognisable face or voice, plate) or carries a token this system resolves to legal identity in the same step.",{"id":295,"name":296,"description":299,"prompt":302,"authoring_guidance":305,"examples":306,"sources":307,"required":77,"order":308,"datachain_type":79,"shape":51,"element_variables":309},"processing",[297],{"locale":28,"value":298},"Algorithm or Model",[300],{"locale":28,"value":301},"What processes the input — the algorithm family, model class, or technique used to turn inputs into outputs.",[303],{"locale":28,"value":304},"What algorithm or model processes the data?",[],[],[],7,[310],{"id":47,"label":311,"required":77},[312],{"locale":28,"value":50},{"id":314,"name":315,"description":318,"prompt":321,"authoring_guidance":324,"examples":325,"sources":326,"required":15,"order":327,"datachain_type":79,"shape":100,"element_variables":328},"purpose",[316],{"locale":28,"value":317},"Purpose",[319],{"locale":28,"value":320},"Why this AI system exists — the outcome it’s designed to achieve.",[322],{"locale":28,"value":323},"What is the purpose of this AI system?",[],[],[],1,[329],{"id":47,"label":330,"required":77},[331],{"locale":28,"value":50},{"id":333,"name":334,"description":337,"prompt":340,"authoring_guidance":343,"examples":344,"sources":345,"required":77,"order":346,"datachain_type":79,"shape":80,"element_variables":347},"retention",[335],{"locale":28,"value":336},"Retention",[338],{"locale":28,"value":339},"How long the data produced by this AI system is kept.",[341],{"locale":28,"value":342},"How long is the data kept?",[],[],[],10,[348,351],{"id":47,"label":349,"required":77},[350],{"locale":28,"value":50},{"id":352,"label":353,"required":15},"duration",[354],{"locale":28,"value":355},"Duration",{"id":357,"name":358,"description":361,"prompt":364,"authoring_guidance":367,"examples":368,"sources":369,"required":77,"order":370,"datachain_type":79,"shape":371,"element_variables":372},"rights",[359],{"locale":28,"value":360},"Rights",[362],{"locale":28,"value":363},"What you can do in relation to this AI system — how to access, contest, or opt out.",[365],{"locale":28,"value":366},"What are your rights?",[],[],[],5,"octagon",[373],{"id":357,"label":374,"required":15},[375],{"locale":28,"value":376},"Description of Rights",{"id":378,"name":379,"description":382,"prompt":385,"authoring_guidance":388,"examples":389,"sources":390,"required":77,"order":396,"datachain_type":79,"shape":371,"element_variables":397},"risks_mitigation",[380],{"locale":28,"value":381},"Risks & Mitigation",[383],{"locale":28,"value":384},"The risks this AI system could create and how they’re being addressed.",[386],{"locale":28,"value":387},"What are the risks and how are they mitigated?",[],[],[391],{"type":392,"title":393,"url":394,"citation":395},"research_paper","A Collaborative, Human-Centred Taxonomy of AI, Algorithmic, and Automation Harms","https://arxiv.org/abs/2407.01294","Abercrombie et al. (2024). arXiv:2407.01294. CC BY-SA 4.0.",4,[398],{"id":399,"label":400,"required":15},"mitigation",[401],{"locale":28,"value":402},"Description of Risks & Mitigations",{"id":404,"name":405,"description":408,"prompt":411,"authoring_guidance":414,"examples":415,"sources":416,"required":77,"order":417,"datachain_type":79,"shape":80,"element_variables":418},"storage",[406],{"locale":28,"value":407},"Data Storage",[409],{"locale":28,"value":410},"Where the data produced by this AI system is kept.",[412],{"locale":28,"value":413},"Where is the data stored?",[],[],[],11,[419,422],{"id":47,"label":420,"required":77},[421],{"locale":28,"value":50},{"id":352,"label":423,"required":15},[424],{"locale":28,"value":355},1779049714706]