[{"data":1,"prerenderedAt":434},["ShallowReactive",2],{"navigation_docs_fr":3,"dtpr-schemas-index":14,"dtpr-element-detail-output_generated_content":22,"dtpr-element-detail-categories":70,"dtpr-element-overlay-output_generated_content":137},[4,8],{"title":5,"path":6,"stem":7},"Citer DTPR for AI","/fr/cite","fr/11.cite",{"title":9,"path":10,"stem":11,"children":12},"Outils","/fr/tools","fr/8.tools/0.index",[13],{"title":9,"path":10,"stem":11},{"ok":15,"versions":16},true,[17],{"id":18,"status":19,"created_at":20,"content_hash":21},"ai@2026-05-06-beta","beta","2026-05-06T20:23:42.963Z","sha256-2d208111b0c597ff2b38cb1c24168799b0a5ff9290203ebf46c4f7c16a0fcb24",{"ok":15,"version":18,"element":23},{"id":24,"category_id":25,"title":26,"description":30,"authoring_guidance":33,"examples":34,"sources":35,"symbol_id":53,"variables":54,"shape":60,"icon_variants":61},"output_generated_content","output_dataset",[27],{"locale":28,"value":29},"en","Generated content",[31],{"locale":28,"value":32},"The AI produces new content — text, images, audio, or video that did not exist before. Examples: an LLM-written service advisory shown on a sign, a synthesized voice announcement played over a public-address system, a generated illustration on a digital kiosk.",[],[],[36,41,44,49],{"type":37,"title":38,"url":39,"citation":40},"regulation","EU AI Act Article 3(1) — output class \"content\"","https://eur-lex.europa.eu/eli/reg/2024/1689/oj","Regulation (EU) 2024/1689, Article 3(1).",{"type":37,"title":42,"url":39,"citation":43},"EU AI Act Article 50 — Synthetic-content disclosure","Regulation (EU) 2024/1689, Article 50.",{"type":45,"title":46,"url":47,"citation":48},"standard","NIST AI 100-4 — AI Risk Management Framework","https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-4.pdf","NIST.",{"type":45,"title":50,"url":51,"citation":52},"C2PA — Coalition for Content Provenance and Authenticity","https://c2pa.org","C2PA.","generated_content",[55],{"id":56,"label":57,"required":15},"additional_description",[58],{"locale":28,"value":59},"Description","circle",[62,63,64,65,66,67,68,69],"default","dark","de_identified","de_identified.dark","pseudonymous","pseudonymous.dark","identifiable","identifiable.dark",{"ok":15,"version":18,"categories":71},[72,94,146,208,260,303,322,341,365,386,412],{"id":73,"name":74,"description":77,"prompt":80,"authoring_guidance":83,"examples":84,"sources":85,"required":86,"order":87,"datachain_type":88,"shape":89,"element_variables":90},"access",[75],{"locale":28,"value":76},"Access",[78],{"locale":28,"value":79},"Who can see or use the data produced by this AI system.",[81],{"locale":28,"value":82},"Who has access to the data?",[],[],[],false,9,"ai","rounded-square",[91],{"id":56,"label":92,"required":86},[93],{"locale":28,"value":59},{"id":95,"name":96,"description":99,"prompt":102,"authoring_guidance":105,"examples":106,"sources":107,"required":15,"order":108,"datachain_type":88,"shape":109,"element_variables":110,"element_context":120},"accountable",[97],{"locale":28,"value":98},"Accountable",[100],{"locale":28,"value":101},"The organization responsible for deploying and operating this AI system.",[103],{"locale":28,"value":104},"Who is accountable for this AI system?",[],[],[],2,"hexagon",[111,116],{"id":112,"label":113,"required":15},"title",[114],{"locale":28,"value":115},"Title",{"id":117,"label":118,"required":15},"description",[119],{"locale":28,"value":59},{"id":121,"name":122,"description":125,"values":128},"role",[123],{"locale":28,"value":124},"Role",[126],{"locale":28,"value":127},"How this organization participates in the deployment of the AI system.",[129,138],{"id":130,"name":131,"description":134,"color":137},"vendor",[132],{"locale":28,"value":133},"Vendor",[135],{"locale":28,"value":136},"The organization that builds, supplies, or licenses the AI system.",null,{"id":139,"name":140,"description":143,"color":137},"deployer",[141],{"locale":28,"value":142},"Deployer",[144],{"locale":28,"value":145},"The organization that deploys and operates the AI system in this place.",{"id":147,"name":148,"description":151,"prompt":154,"authoring_guidance":157,"examples":160,"sources":161,"required":15,"order":167,"datachain_type":88,"shape":109,"element_variables":168,"element_context":172},"functional_modes",[149],{"locale":28,"value":150},"Functional Modes",[152],{"locale":28,"value":153},"How this AI system operates — the functional modes (e.g. analytical, semantic, generative, agentic, perceptive, physical) it composes.",[155],{"locale":28,"value":156},"What is the AI system doing?",[158],{"locale":28,"value":159},"Pick one or more functional modes.",[],[162],{"type":163,"title":164,"url":165,"citation":166},"framework","AI Taxonomy — An Operational Framework for Precision in AI Discourse","https://dropleaf.app/d/AlXez8scbd","Narain Jashanmal, v1.1, January 2026.",3,[169],{"id":56,"label":170,"required":86},[171],{"locale":28,"value":59},{"id":173,"name":174,"description":177,"values":180},"autonomy",[175],{"locale":28,"value":176},"Autonomy",[178],{"locale":28,"value":179},"How much this mode decides and acts on its own. The element name says what the mode does; this label says who chooses and who carries out the result.",[181,190,199],{"id":182,"name":183,"description":186,"color":189},"human_decides",[184],{"locale":28,"value":185},"Human decides",[187],{"locale":28,"value":188},"This mode suggests; a person decides what to do next. The AI is always advisory — a human is in the loop on every decision. Example: a triage tool ranks cases for a clinician who chooses which to see first.","#2A9D8F",{"id":191,"name":192,"description":195,"color":198},"human_executes",[193],{"locale":28,"value":194},"Human executes",[196],{"locale":28,"value":197},"This mode decides; a person carries out the result. Example: an optimizer plans the day’s trash-collection routes, and drivers run them.","#6A1B7A",{"id":200,"name":201,"description":204,"color":207},"autonomous",[202],{"locale":28,"value":203},"Autonomous",[205],{"locale":28,"value":206},"This mode decides and acts on its own. No person reviews each decision or carries out the resulting action.","#E76F51",{"id":209,"name":210,"description":213,"prompt":216,"authoring_guidance":219,"examples":220,"sources":221,"required":86,"order":222,"datachain_type":88,"shape":60,"element_variables":223,"element_context":227},"input_dataset",[211],{"locale":28,"value":212},"Input Dataset",[214],{"locale":28,"value":215},"The input data this deployed system processes when it operates. Distinct from training data.",[217],{"locale":28,"value":218},"What input data does this AI system process?",[],[],[],6,[224],{"id":56,"label":225,"required":15},[226],{"locale":28,"value":59},{"id":228,"name":229,"description":232,"values":235},"pii",[230],{"locale":28,"value":231},"Personal Information",[233],{"locale":28,"value":234},"How identifiable the data is when this system processes it. The element name says what the data is about; this colour says how directly it identifies a person.",[236,244,252],{"id":64,"name":237,"description":240,"color":243},[238],{"locale":28,"value":239},"Anonymized data",[241],{"locale":28,"value":242},"Data about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so this system can’t reasonably tie a record back to an individual.","#4A90D9",{"id":66,"name":245,"description":248,"color":251},[246],{"locale":28,"value":247},"Pseudonymous data",[249],{"locale":28,"value":250},"Each person’s data is tied to a token (hash, ID, template) that lets this system recognise the same person across events, but the token itself doesn’t reveal a name. Reidentification is possible with extra information.","#9575CD",{"id":68,"name":253,"description":256,"color":259},[254],{"locale":28,"value":255},"Identifiable data",[257],{"locale":28,"value":258},"The data either contains a direct identifier (name, address, account name, recognisable face or voice, plate number) or carries a token this system uses to look up legal identity during processing.","#FFD700",{"id":25,"name":261,"description":264,"prompt":267,"authoring_guidance":270,"examples":271,"sources":272,"required":86,"order":273,"datachain_type":88,"shape":60,"element_variables":274,"element_context":278},[262],{"locale":28,"value":263},"Output Dataset",[265],{"locale":28,"value":266},"The output data this deployed system produces when it operates — decisions, content, and actions.",[268],{"locale":28,"value":269},"What does this AI system produce?",[],[],[],8,[275],{"id":56,"label":276,"required":15},[277],{"locale":28,"value":59},{"id":228,"name":279,"description":281,"values":284},[280],{"locale":28,"value":231},[282],{"locale":28,"value":283},"How identifiable the data is when this system produces it. The element name says what the output is about; this colour says how directly it identifies a person.",[285,291,297],{"id":64,"name":286,"description":288,"color":243},[287],{"locale":28,"value":239},[289],{"locale":28,"value":290},"Output about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so the result can’t reasonably be tied back to an individual.",{"id":66,"name":292,"description":294,"color":251},[293],{"locale":28,"value":247},[295],{"locale":28,"value":296},"The output is labelled with a token (hash, ID, template) that lets this system tie the result to the same person across events without revealing a name. Reidentification is possible with extra information.",{"id":68,"name":298,"description":300,"color":259},[299],{"locale":28,"value":255},[301],{"locale":28,"value":302},"The output names a person directly (name, address, account, recognisable face or voice, plate) or carries a token this system resolves to legal identity in the same step.",{"id":304,"name":305,"description":308,"prompt":311,"authoring_guidance":314,"examples":315,"sources":316,"required":86,"order":317,"datachain_type":88,"shape":60,"element_variables":318},"processing",[306],{"locale":28,"value":307},"Algorithm or Model",[309],{"locale":28,"value":310},"What processes the input — the algorithm family, model class, or technique used to turn inputs into outputs.",[312],{"locale":28,"value":313},"What algorithm or model processes the data?",[],[],[],7,[319],{"id":56,"label":320,"required":86},[321],{"locale":28,"value":59},{"id":323,"name":324,"description":327,"prompt":330,"authoring_guidance":333,"examples":334,"sources":335,"required":15,"order":336,"datachain_type":88,"shape":109,"element_variables":337},"purpose",[325],{"locale":28,"value":326},"Purpose",[328],{"locale":28,"value":329},"Why this AI system exists — the outcome it’s designed to achieve.",[331],{"locale":28,"value":332},"What is the purpose of this AI system?",[],[],[],1,[338],{"id":56,"label":339,"required":86},[340],{"locale":28,"value":59},{"id":342,"name":343,"description":346,"prompt":349,"authoring_guidance":352,"examples":353,"sources":354,"required":86,"order":355,"datachain_type":88,"shape":89,"element_variables":356},"retention",[344],{"locale":28,"value":345},"Retention",[347],{"locale":28,"value":348},"How long the data produced by this AI system is kept.",[350],{"locale":28,"value":351},"How long is the data kept?",[],[],[],10,[357,360],{"id":56,"label":358,"required":86},[359],{"locale":28,"value":59},{"id":361,"label":362,"required":15},"duration",[363],{"locale":28,"value":364},"Duration",{"id":366,"name":367,"description":370,"prompt":373,"authoring_guidance":376,"examples":377,"sources":378,"required":86,"order":379,"datachain_type":88,"shape":380,"element_variables":381},"rights",[368],{"locale":28,"value":369},"Rights",[371],{"locale":28,"value":372},"What you can do in relation to this AI system — how to access, contest, or opt out.",[374],{"locale":28,"value":375},"What are your rights?",[],[],[],5,"octagon",[382],{"id":366,"label":383,"required":15},[384],{"locale":28,"value":385},"Description of Rights",{"id":387,"name":388,"description":391,"prompt":394,"authoring_guidance":397,"examples":398,"sources":399,"required":86,"order":405,"datachain_type":88,"shape":380,"element_variables":406},"risks_mitigation",[389],{"locale":28,"value":390},"Risks & Mitigation",[392],{"locale":28,"value":393},"The risks this AI system could create and how they’re being addressed.",[395],{"locale":28,"value":396},"What are the risks and how are they mitigated?",[],[],[400],{"type":401,"title":402,"url":403,"citation":404},"research_paper","A Collaborative, Human-Centred Taxonomy of AI, Algorithmic, and Automation Harms","https://arxiv.org/abs/2407.01294","Abercrombie et al. (2024). arXiv:2407.01294. CC BY-SA 4.0.",4,[407],{"id":408,"label":409,"required":15},"mitigation",[410],{"locale":28,"value":411},"Description of Risks & Mitigations",{"id":413,"name":414,"description":417,"prompt":420,"authoring_guidance":423,"examples":424,"sources":425,"required":86,"order":426,"datachain_type":88,"shape":89,"element_variables":427},"storage",[415],{"locale":28,"value":416},"Data Storage",[418],{"locale":28,"value":419},"Where the data produced by this AI system is kept.",[421],{"locale":28,"value":422},"Where is the data stored?",[],[],[],11,[428,431],{"id":56,"label":429,"required":86},[430],{"locale":28,"value":59},{"id":361,"label":432,"required":15},[433],{"locale":28,"value":364},1779049714710]