Obligations for High-Risk AI Systems (EU/UK aligned)

Obligations for High-Risk AI Systems (EU/UK aligned)

Zen AI Governance — Knowledge Base EU/UK alignment Updated 05 Nov 2025 www.zenaigovernance.com ↗

Obligations for High-Risk AI Systems (EU/UK aligned)

EU AI Act Compliance Regulatory Knowledge EU/UK aligned
+ On this page
Key takeaways
  • High-risk AI obligations apply across the lifecycle and are prescriptive: design → operation → monitoring → corrective action.
  • Providers own RMS, documentation and CE marking; Deployers run operations, oversight, and serious incident reporting.
  • Maintain an audit-ready evidence pack: data lineage, model cards, metrics, incidents, CAPA, approvals.

Scope & actors

The EU AI Act governs the placing on the EU market, putting into service, and operation of AI systems. High-risk systems include those used in safety-critical domains, regulated products, and specified use-cases. Providers (developers or those placing the system on the market) bear design-time duties; Deployers (operators/users) bear run-time duties. Distributors/importers inherit obligations proportionate to control.

Risk management system (RMS)

  • Identify reasonably foreseeable misuse; characterise hazards/harms; map affected cohorts and contexts.
  • Plan risk controls by design: data curation, model constraints, guardrails, operational controls, and human oversight.
  • Define KPIs, tolerances and monitoring processes; encode escalation/runbooks; keep a living risk file.
  • Iterate RMS on evidence from evaluation, deployment feedback and post-market surveillance.

Data governance

  • Provenance, licensing and lawful basis; data minimisation and purpose limitation; representativeness and quality controls.
  • Bias management: cohort analysis, synthetic balancing, harmful proxy detection; pre/post-deployment equity metrics.
  • Privacy: DSR handling, redaction, differential privacy where applicable, and secure MLOps pipelines.

Technical documentation

  • System description, intended purpose/use, limitations, risk controls and operating conditions.
  • Data lineage; model cards; training/eval datasets; metrics and thresholds; explainability methods.
  • Deployment architecture; dependency BOM; security design; update policy; rollback strategy.

Logging & traceability

  • Capture inputs/outputs, prompts, features, decisions, explanations (where feasible), model/feature store versions.
  • Maintain event trails for threshold breaches, overrides, hand-offs, outages and user complaints.

Human oversight

  • Define when/how oversight intervenes: pre-authorization, warnings, two-person rules, and mandatory review gates.
  • Ensure effective override: stop, rollback, downgrade modes; clear UI cues; training; operator competency records.

Performance, robustness & security

  • Qualification and acceptance: target metrics per purpose/cohort/environment; stress and adversarial testing.
  • Hardening: input validation, content filters, prompt hygiene, rate-limits, sandboxing, signed artifacts, SCA.
  • Secure MLOps: SBOM/SLSA, attestations, policy-gated CI/CD, key management, model watermarking where relevant.

Conformity assessment & CE marking

  • Choose the applicable route (internal control, NB involvement, sectoral regulations); compile technical file.
  • Demonstrate RMS, governance, testing outcomes, and residual risk justifications; affix CE marking prior to placement.

Post-market monitoring & incidents

  • Run KPIs/thresholds; detect drift, bias and misuse; triage incidents; collect evidence bundles; notify authorities where mandated.
  • Feed CAPA and change control; update documentation and user instructions.

Provider vs Deployer – responsibilities

  • Provider: RMS, documentation, conformity, CE, instructions, post-market plan, security design.
  • Deployer: operate per instructions, ensure qualified staff, human oversight, logs, incident reporting.

Evidence pack & audit readiness

  • Risk file, model cards, data sheets, evaluation reports, approval minutes, deployment manifests, audit logs.
  • Incident & CAPA registers; training records; user communications; versioned user instructions.

Implementation checklist

  • RMS defined; hazards/harms & misuse mapped; controls designed; residual risk justified.
  • Data governance operational; documentation complete; oversight & security embedded.
  • Conformity route selected; CE plan ready; PMM live; evidence library maintained.

© Zen AI Governance UK Ltd • Regulatory Knowledge • v1 05 Nov 2025 • This page is general guidance, not legal advice.

    • Related Articles

    • What is the EU AI Act and who does it apply to?

      ? Overview The EU Artificial Intelligence Act (EU AI Act) is the world’s first comprehensive law regulating the development, deployment, and use of Artificial Intelligence within the European Union. Its aim is to ensure that AI systems placed on the ...
    • Risk Management System (EU/UK aligned)

      Zen AI Governance — Knowledge Base • EU/UK alignment • Updated 05 Nov 2025 www.zenaigovernance.com ↗ Risk Management System (EU/UK aligned) EU AI Act Compliance Regulatory Knowledge EU/UK aligned + On this page On this page Purpose & principles ...
    • Conformity Assessment & CE Marking (EU / UK Aligned)

      Zen AI Governance — Knowledge Base • EU AI Act Compliance • Updated 17 Nov 2025 www.zenaigovernance.com ↗ Conformity Assessment & CE Marking (EU / UK Aligned) EU AI Act Compliance Conformity Assessment & CE Marking + On this page On this page ...
    • Accuracy, Robustness & Cybersecurity Controls (EU / UK Aligned)

      Zen AI Governance — Knowledge Base • EU AI Act Compliance • Updated 17 Nov 2025 www.zenaigovernance.com ↗ Accuracy, Robustness & Cybersecurity Controls (EU / UK Aligned) EU AI Act Compliance Accuracy • Robustness • Cybersecurity + On this page On ...
    • Human Oversight (EU/UK aligned)

      Zen AI Governance — Knowledge Base • EU/UK alignment • Updated 05 Nov 2025 www.zenaigovernance.com ↗ Human Oversight (EU/UK aligned) EU AI Act Compliance Regulatory Knowledge EU/UK aligned + On this page On this page Role & goals Oversight patterns ...