<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IETF" docName="draft-veridom-omp-euaia-00" category="info" ipr="trust200902" obsoletes="" updates="" xml:lang="en" symRefs="true" sortRefs="false" tocInclude="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <!-- Generated by id2xml 1.5.2 on 2026-04-03T09:54:03Z -->
	<front>
    <title abbrev="OMP Domain Profile: EU AI Act Article 12">OMP Domain Profile: EU AI Act Article 12 Logging and Traceability Requirements for High-Risk AI System Operators</title>
    <seriesInfo name="Internet-Draft" value="draft-veridom-omp-euaia-00"/>
    <author initials="T." surname="Adebayo" fullname="Tolulope Adebayo">
      <organization>Veridom Ltd</organization>
      <address>
        <postal>
          <street>London, United Kingdom</street>
        </postal>
      </address>
    </author>
    <author initials="O." surname="Apalowo" fullname="Oluropo Apalowo">
      <organization>Veridom Ltd</organization>
      <address>
        <postal>
          <street>Awka, Nigeria</street>
        </postal>
      </address>
    </author>
    <author initials="F." surname="Makanjuola" fullname="Festus Makanjuola">
      <organization>Veridom Ltd</organization>
      <address>
        <postal>
          <street>Toronto, Canada</street>
        </postal>
      </address>
    </author>
    <date year="2026" month="April" day="2"/>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <t>
   This document defines a domain profile of the Operating Model
   Protocol (OMP) for high-risk AI system operators subject to Article
   12 of Regulation (EU) 2024/1689 (the EU AI Act).  Article 12
   requires that high-risk AI systems automatically generate tamper-
   resistant logs capable of ensuring traceability throughout the
   system's lifetime.  This profile specifies how OMP's deterministic
   routing invariant, Watchtower enforcement framework, and three-layer
   cryptographic integrity architecture (SHA-256, RFC 3161, institution
   signature) satisfy the Article 12 requirements, and defines the
   domain-specific Watchtower configurations and Audit Trace schema
   extensions applicable to EU high-risk AI deployments under Annex III
   of the Regulation.</t>
      <t>
   The core OMP specification is defined in a separate Internet-Draft
   (\"Operating Model Protocol (OMP): A Deterministic Decision-Enforcement Protocol with Externalized Proof-of-Integrity\").</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sect-1" numbered="true" toc="default">
      <name>Introduction</name>
      <t>
   Regulation (EU) 2024/1689 (the EU AI Act) <xref target="EUAIA" format="default"/> establishes
   obligations for providers and deployers of high-risk AI systems,
   including requirements for logging and traceability under Article 12.
   The Article 12 obligations apply to the Annex III categories of
   high-risk AI systems, including those used in:</t>
      <ul spacing="normal">
        <li>
          <t>credit scoring and creditworthiness assessment (Annex III
      point 5(b));</t>
        </li>
        <li>
          <t>employment and worker management AI (Annex III point 4);</t>
        </li>
        <li>
          <t>AI systems used in education and vocational training (Annex III
      point 3);</t>
        </li>
        <li>
          <t>AI systems used by competent authorities (Annex III point 6);</t>
        </li>
        <li>
          <t>AI systems used in the administration of justice (Annex III
      point 8).</t>
        </li>
      </ul>
      <t>
   The Article 12 obligations take full effect on August 2, 2026.</t>
      <t>
   The Operating Model Protocol (OMP) <xref target="I-D.veridom-omp" format="default"/> is a
   deterministic decision-enforcement protocol that classifies every
   interaction in a regulated operation into exactly one of three
   outcome states (AUTONOMOUS, ASSISTED, or ESCALATED) and generates a
   tamper-evident Audit Trace sealed with a three-layer cryptographic
   integrity architecture at the point of every decision.  This
   architecture is designed to satisfy the Article 12 requirements
   structurally — through the design of the decision pipeline — rather
   than through retrospective reporting.</t>
      <t>
   This document defines the domain-specific parameters and Watchtower
   configurations that instantiate OMP for EU AI Act Article 12
   compliance, and specifies how the OMP Audit Trace schema extensions
   for this profile map to the specific logging requirements of Article
   12(2).</t>
      <t>
   Operators who implement OMP under this profile produce per-decision
   evidence records that:</t>
      <ul spacing="normal">
        <li>
          <t>are generated automatically as an integral output of the decision
      pipeline (Article 12(1));</t>
        </li>
        <li>
          <t>are tamper-resistant through cryptographic sealing with a
      Qualified Electronic Timestamp under eIDAS Article 41 (Article
      12(1));</t>
        </li>
        <li>
          <t>capture the operational period of each use with externally
      verifiable temporal anchoring (Article 12(2)(a));</t>
        </li>
        <li>
          <t>capture the state of all external reference databases queried
      at the moment of the decision (Article 12(2)(b));</t>
        </li>
        <li>
          <t>record input data in canonical form enabling decision re-
      verification (Article 12(2)(c));</t>
        </li>
        <li>
          <t>support decision-level traceability for post-market monitoring
      and supervisory examination (Article 12(3)).</t>
        </li>
      </ul>
      <t>
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/>.</t>
    </section>
    <section anchor="sect-2" numbered="true" toc="default">
      <name>Terminology</name>
      <t>
   This document uses the terminology defined in <xref target="I-D.veridom-omp" format="default"/>.  In
   addition:</t>
      <dl newline="true" spacing="normal" indent="3">
        <dt>Article 12 Logging Obligation</dt>
        <dd>
	The requirements imposed on high-risk AI system operators by
      Article 12 of Regulation (EU) 2024/1689 (EU AI Act).
	</dd>
        <dt>High-Risk AI System</dt>
        <dd>
	An AI system listed in Annex III of Regulation (EU) 2024/1689, or
      designated as high-risk by the European Commission under Article
      7.
	</dd>
        <dt>Qualified Electronic Timestamp (QTS)</dt>
        <dd>
	A qualified electronic timestamp as defined in Article 3(34) of
      Regulation (EU) 910/2014 (eIDAS), produced by a Qualified Trust
      Service Provider (QTSP) listed in a Member State's trusted list
      under Article 22 of eIDAS.
	</dd>
        <dt>QTSP</dt>
        <dd>
	Qualified Trust Service Provider.  Under this profile, QTSP is
      used as the issuing authority for the RFC 3161 TimeStampToken
      required by the OMP three-layer integrity architecture.
	</dd>
        <dt>EU AI Act Profile (EUAIA Profile)</dt>
        <dd>
	The domain-specific configuration of OMP defined in this
      document.
	</dd>
        <dt>Post-Market Monitoring System (PMMS)</dt>
        <dd>
	The system required under Article 72 of the EU AI Act for
      providers of high-risk AI systems to collect and review data on
      the performance of deployed systems throughout their lifetime.
	</dd>
        <dt>Supervisory Authority</dt>
        <dd>
	A national competent authority designated under Article 70 of the
      EU AI Act, responsible for market surveillance and enforcement.
	</dd>
      </dl>
    </section>
    <section anchor="sect-3" numbered="true" toc="default">
      <name>EU AI Act Article 12 Requirements Analysis</name>
      <t>
   Article 12 imposes six distinct technical requirements on high-risk
   AI system operators.  This section maps each requirement to the OMP
   mechanism that satisfies it.</t>
      <section anchor="sect-3.1" numbered="true" toc="default">
        <name>Requirement 1: Automatic generation</name>
        <t>
   Article 12(1) requires that high-risk AI systems be designed and
   developed with capabilities enabling the automatic generation of
   logs.</t>
        <t>
   OMP MECHANISM: The OMP Audit Trace is generated as an integral
   output of Stage S5 of the five-stage OMP pipeline.  Stage S5 is
   mandatory — no interaction can complete the OMP pipeline without
   producing a sealed Audit Trace.  The Audit Trace is not produced by
   a secondary logging process that reads from the primary system; it
   is the output of Stage S5, which executes as part of the decision
   pipeline itself.  This satisfies the automatic generation
   requirement structurally, not through configuration.</t>
        <t>
   Under this profile, implementations MUST NOT implement Stage S5 as
   an optional or configurable component.  Audit Trace generation MUST
   be mandatory for all interactions regardless of routing outcome.</t>
      </section>
      <section anchor="sect-3.2" numbered="true" toc="default">
        <name>Requirement 2: Tamper resistance</name>
        <t>
   Article 12(1) requires that logs have tamper-resistant capabilities
   to ensure traceability throughout the AI system's lifetime.</t>
        <t>
   OMP MECHANISM: OMP seals every Audit Trace with a three-layer
   integrity architecture:</t>
        <ul spacing="normal">
          <li>
            <t>Layer 1 (SHA-256 content hash): proves that the content of the
      Audit Trace record has not been altered since sealing.  The
      records are chained in a Merkle structure; modification of any
      historical record invalidates all subsequent chain hashes,
      making deletion detectable without access to the deleted record.</t>
          </li>
          <li>
            <t>Layer 2 (RFC 3161 TimeStampToken <xref target="RFC3161" format="default"/> from a QTSP):
      proves the Audit
      Trace existed at a specific moment in time, attested by a party
      external to the operator.  The QTSP's signature cannot be
      retroactively obtained for a fabricated or post-hoc record.
      Under this profile, the RFC 3161 timestamp MUST be obtained from
      a QTSP listed in an EU Member State trusted list under eIDAS
      Article 22.  This produces a Qualified Electronic Timestamp
      under eIDAS Article 3(34), which carries legal presumption of
      accuracy of the date and time it indicates under eIDAS
      Article 41.</t>
          </li>
          <li>
            <t>Layer 3 (institution signature): the deploying operator signs
      the Audit Trace and the TimeStampToken.  The OMP protocol
      implementer (Veridom or any other party implementing this
      profile) does not sign.  This preserves evidentiary
      independence: the integrity claim does not depend on the
      continued operation, trustworthiness, or cooperation of the
      implementer.</t>
          </li>
        </ul>
        <t>
   The combination of these three layers satisfies the Article 12(1)
   tamper-resistance requirement.  The Qualified Electronic Timestamp
   satisfies the requirement through an EU-recognised legal standard
   rather than a proprietary mechanism.</t>
      </section>
      <section anchor="sect-3.3" numbered="true" toc="default">
        <name>Requirement 3: Operational period logging</name>
        <t>
   Article 12(2)(a) requires that logs capture, at minimum, the
   operational period of each use of the AI system.</t>
        <t>
   OMP MECHANISM: Every OMP Audit Trace record includes a
   received_at field (ISO 8601 UTC, millisecond precision) capturing
   the timestamp at which Stage S1 received the interaction, and a
   tst_token field containing the RFC 3161 TimeStampToken from the
   QTSP, which provides an externally verifiable timestamp independent
   of the operator's own clocks.</t>
        <t>
   Under this profile, operators MUST record both timestamps.  The
   received_at field establishes the operational period from the
   operator's system perspective.  The tst_token provides independent
   temporal anchoring that does not depend on the integrity of the
   operator's system clock.</t>
      </section>
      <section anchor="sect-3.4" numbered="true" toc="default">
        <name>Requirement 4: Reference database state capture</name>
        <t>
   Article 12(2)(b) requires that logs capture the reference database
   against which the system's input has been checked.</t>
        <t>
   OMP MECHANISM: OMP computes a Source State Hash (H_s) for every
   external data source queried during a decision.  H_s is computed
   as SHA-256(canonical_form(api_response) || query_timestamp_ms).
   This captures the exact state of the external source at the
   millisecond of the query.  Any change to the source after the
   decision does not affect H_s.</t>
        <t>
   Under this profile, H_s computation is MANDATORY for every external
   data query, including:</t>
        <ul spacing="normal">
          <li>
            <t>Credit reference bureau queries;</t>
          </li>
          <li>
            <t>Identity verification database queries;</t>
          </li>
          <li>
            <t>Employer or educational institution verification queries;</t>
          </li>
          <li>
            <t>Any model inference API that contributes to the confidence
      score computation.</t>
          </li>
        </ul>
        <t>
   The H_s values are recorded in the Audit Trace source_state_hashes
   field (defined in Section 4.4 of this document) alongside the
   query timestamp and the identifier of the queried source.</t>
      </section>
      <section anchor="sect-3.5" numbered="true" toc="default">
        <name>Requirement 5: Input data recording</name>
        <t>
   Article 12(2)(c) requires that logs capture the input data for
   which the system log refers, subject to applicable data protection
   legislation.</t>
        <t>
   OMP MECHANISM: OMP normalises all interaction payloads to RFC 8785
   JSON Canonicalization Scheme (JCS) <xref target="RFC8785" format="default"/> at Stage S1 and records
   the interaction_hash (SHA-256 of the canonical payload) in the Audit
   Trace.  The canonical form is preserved in the payload_canonical
   field of the Interaction Schema.</t>
        <t>
   Under this profile, implementations MUST record input data in
   canonical form to enable decision re-verification.  Where the input
   data constitutes personal data under GDPR, operators MUST apply
   appropriate pseudonymisation before the payload_canonical field is
   committed to the Audit Trace.  The interaction_hash field MUST
   reflect the hash of the data as actually presented to the AI
   system (post-pseudonymisation, if applicable), so that the canonical
   form can be re-verified against the pseudonymised record.</t>
        <t>
   Note: The requirement to record input data is subject to Article 10
   GDPR lawfulness and data minimisation requirements.  Operators MUST
   ensure that Audit Trace records do not constitute unlawful data
   retention.  The interaction_hash mechanism (recording a hash of the
   canonical payload rather than the payload itself) is designed to
   satisfy Article 12(2)(c) while minimising personal data retention.</t>
      </section>
      <section anchor="sect-3.6" numbered="true" toc="default">
        <name>Requirement 6: Decision traceability</name>
        <t>
   Article 12(3) requires that, to the extent possible and technically
   feasible, the logging capabilities enable monitoring of the
   operation of the AI system with respect to the occurrence of
   situations that may result in risks, and to facilitate the post-
   market monitoring.</t>
        <t>
   OMP MECHANISM: The OMP Audit Trace records, for every decision:</t>
        <ul spacing="normal">
          <li>
            <t>The intent class and classification confidence;</t>
          </li>
          <li>
            <t>The three Confidence Score components (C_m, C_p, C_d);</t>
          </li>
          <li>
            <t>The evaluation result of every active Watchtower gate;</t>
          </li>
          <li>
            <t>The routing outcome (AUTONOMOUS, ASSISTED, or ESCALATED) with
      routing rationale and explicit rule reference;</t>
          </li>
          <li>
            <t>The Named Accountable Officer identity and resolution action
      for ASSISTED and ESCALATED outcomes.</t>
          </li>
        </ul>
        <t>
   Under this profile, the Proof-Point artefact generation mechanism
   (defined in <xref target="I-D.veridom-omp" format="default"/> Section 7.5) MUST be capable of
   producing a supervisory review package for any defined time window
   within 30 seconds of request, containing all sealed Audit Traces
   for that window sorted by temporal sequence, for direct submission
   to a Supervisory Authority upon request.</t>
      </section>
    </section>
    <section anchor="sect-4" numbered="true" toc="default">
      <name>OMP EU AI Act Profile</name>
      <section anchor="sect-4.1" numbered="true" toc="default">
        <name>Routing states under this profile</name>
        <t>
   The three OMP routing states apply unchanged under this profile:</t>
        <dl newline="false" spacing="normal" indent="3">
          <dt>AUTONOMOUS:</dt>
          <dd>
            <t>
	The AI system operates without human review for this
            </t>
            <t>
	interaction.  The operator bears full accountability for the
      outcome.  Audit Trace is generated and sealed automatically.
            </t>
          </dd>
          <dt>ASSISTED:</dt>
          <dd>
            <t>
	A Named Accountable Officer reviews the AI system's
            </t>
            <t>
	recommendation before final action.  The Named Accountable
      Officer's identity and decision are recorded in the Audit Trace.
      This state is the minimum required for interactions above the
      configured significance threshold.
            </t>
          </dd>
          <dt>ESCALATED:</dt>
          <dd>
            <t>
	A Watchtower HARD_BLOCK has been triggered or the
            </t>
            <t>
	minimum confidence floor has not been met.  Mandatory human
      intervention is required before the interaction can proceed.
      Audit Trace records the escalation reason and the Named
      Accountable Officer assignment.
            </t>
          </dd>
        </dl>
      </section>
      <section anchor="sect-4.2" numbered="true" toc="default">
        <name>Confidence Score configuration</name>
        <t>
   Under this profile, the Confidence Score components MUST be
   configured as follows:</t>
        <ul spacing="normal">
          <li>
            <t>C_p (policy compliance score): A value of 0.0 MUST force
      ESCALATED routing regardless of C_m or C_d values.  This
      ensures that any detected policy non-compliance triggers
      mandatory human oversight, consistent with the Article 14(4)
      requirement for human oversight of high-risk AI systems.</t>
          </li>
          <li>
            <t>C_d (data completeness score): The minimum C_d threshold MUST
      be set such that decisions based on incomplete or unavailable
      external data are routed to ASSISTED or ESCALATED rather than
      AUTONOMOUS.</t>
          </li>
        </ul>
      </section>
      <section anchor="sect-4.3" numbered="true" toc="default">
        <name>Watchtower definitions</name>
        <t>
   The following Watchtowers are REQUIRED under the EUAIA Profile.
   Operators MAY add additional Watchtowers appropriate to their
   specific deployment context.</t>
        <dl newline="true" spacing="normal" indent="3">
          <dt>WT-EUAIA-01: Fundamental Rights Impact Gate</dt>
          <dd>
            <t>
	Trigger condition: Any interaction that, if resolved
      AUTONOMOUS, would result in a significant effect on a natural
      person within the scope of Article 22 GDPR (automated individual
      decision-making), or where a human oversight obligation applies
      under Article 14 of the EU AI Act.
            </t>
            <t>
	Action: FORCE_ASSISTED.  A Named Accountable Officer MUST
      review the AI system's recommendation before final action.
            </t>
            <t>
	Rationale: Article 14(4) of the EU AI Act requires that natural
      persons with human oversight responsibility be able to intervene
      in or interrupt the functioning of the AI system.  This
      Watchtower ensures that a human oversight opportunity exists for
      every interaction with potential fundamental rights implications.
            </t>
          </dd>
          <dt>WT-EUAIA-02: Significant Decision Threshold Gate</dt>
          <dd>
            <t>
	Trigger condition: Any interaction where the projected outcome
      exceeds an operator-configured significance threshold (examples:
      loan decisions above a configured value; employment decisions
      affecting continued engagement; educational assessments affecting
      qualification status).
            </t>
            <t>
	Action: FORCE_ASSISTED.
            </t>
            <t>
	Rationale: Ensures that high-impact individual decisions receive
      human oversight regardless of the AI system's confidence score.
            </t>
          </dd>
          <dt>WT-EUAIA-03: Anomaly Detection Gate</dt>
          <dd>
            <t>
	Trigger condition: Any interaction where the AI system's output
      deviates from expected operating parameters, as defined in the
      operator's technical documentation under Article 11 of the EU
      AI Act.
            </t>
            <t>
	Action: FORCE_ESCALATED.
            </t>
            <t>
	Rationale: Article 12(3) requires that logging enable monitoring
      of situations that may result in risks.  This Watchtower ensures
      that detected anomalies generate an escalation record with full
      Audit Trace, enabling post-market monitoring under Article 72.
            </t>
          </dd>
          <dt>WT-EUAIA-04: Data Quality Verification Gate</dt>
          <dd>
            <t>
	Trigger condition: Any interaction where the data completeness
      score C_d falls below a configured minimum, indicating that
      the AI system is operating with incomplete or degraded input data.
            </t>
            <t>
	Action: FORCE_ASSISTED or FORCE_ESCALATED, depending on the
      severity of the data quality issue.
            </t>
            <t>
	Rationale: Article 12(2)(b) requires that logs capture the
      reference database against which inputs have been checked. Where
      the reference database query fails or returns incomplete data,
      the interaction cannot be resolved AUTONOMOUS without human
      review of the data quality issue.
            </t>
          </dd>
        </dl>
      </section>
      <section anchor="sect-4.4" numbered="true" toc="default">
        <name>Audit Trace schema extensions</name>
        <t>
   Under the EUAIA Profile, the following fields are REQUIRED in the
   Audit Trace schema (in addition to the core fields defined in
   <xref target="I-D.veridom-omp" format="default"/> <xref target="sect-7" format="default"/>):</t>
        <ul empty="true" spacing="normal">
          <li>
            <dl newline="false" spacing="normal" indent="3">
              <dt>euaia_annex_iii_category</dt>
              <dd>
                <t>
	(string, REQUIRED)
                </t>
                <t>
	The Annex III category applicable to this interaction.
         Example: "5b-credit-scoring" or "4-employment".
                </t>
              </dd>
              <dt>euaia_article_14_oversight</dt>
              <dd>
                <t>
	(boolean, REQUIRED)
                </t>
                <t>
	Indicates whether the Article 14 human oversight requirement
         applies to this interaction.  If true, WT-EUAIA-01 MUST have
         been evaluated.
                </t>
              </dd>
              <dt>source_state_hashes</dt>
              <dd>
                <t>
	(array of objects, REQUIRED)
                </t>
                <t>
	An array of H_s records, one per external data source queried
         during this interaction.  Each record MUST contain:
         - source_id (string): identifier of the queried source;
         - query_timestamp_ms (integer): Unix timestamp in milliseconds
           at which the query was made;
                </t>
                <ul spacing="normal">
                  <li>
                    <t>response_hash (string): SHA-256 of the canonical form of
           the API response;</t>
                  </li>
                  <li>
                    <t>h_s (string): SHA-256(canonical_form(response) ||
           query_timestamp_ms).</t>
                  </li>
                </ul>
              </dd>
              <dt>pseudonymisation_applied</dt>
              <dd>
                <t>
	(boolean, REQUIRED)
                </t>
                <t>
	Indicates whether pseudonymisation was applied to personal
         data before payload_canonical was committed to the Audit Trace.
         If true, the interaction_hash reflects the hash of the
         pseudonymised payload.
                </t>
              </dd>
              <dt>proof_point_version</dt>
              <dd>
                <t>
	(string, REQUIRED)
                </t>
                <t>
	Semantic version of the EUAIA Profile specification under
         which this Audit Trace was generated.  MUST be set to
         "VERIDOM-EUAIA-v1.0" for this profile version.
                </t>
              </dd>
              <dt>supervisory_authority_jurisdiction</dt>
              <dd>
                <t>
	(string, REQUIRED)
                </t>
                <t>
	The ISO 3166-1 alpha-2 country code of the EU Member State
         whose designated Supervisory Authority has jurisdiction over
         this deployment.  Example: "DE", "FR", "NL".
                </t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sect-5" numbered="true" toc="default">
      <name>eIDAS Legal Framework Alignment</name>
      <t>
   The OMP three-layer integrity architecture produces a Qualified
   Electronic Timestamp under eIDAS when the RFC 3161 TimeStampToken
   is issued by a QTSP listed in an EU Member State trusted list.</t>
      <t>
   The legal significance of this alignment is precise:</t>
      <ul spacing="normal">
        <li>
          <t>eIDAS Article 41(1) establishes legal presumption of the
      accuracy of the date and time a Qualified Electronic Timestamp
      indicates and the integrity of the data to which the date and
      time are bound.</t>
        </li>
        <li>
          <t>This legal presumption applies in legal proceedings in all EU
      Member States under Article 41(2).</t>
        </li>
        <li>
          <t>A Supervisory Authority examining an OMP Audit Trace sealed with
      a Qualified Electronic Timestamp receives an evidence record
      with statutory presumption of integrity and temporal accuracy.</t>
          <t>
	Regulation (EU) No 910/2014 on electronic identification and
      trust services (eIDAS) <xref target="EIDAS" format="default"/>
          </t>
        </li>
      </ul>
      <t>
   Under this profile, implementations MUST use a QTSP that is listed
   in an EU Member State trusted list maintained under Article 22 of
   eIDAS.  Acceptable QTSPs include DigiCert EU (DE), GlobalSign
   (BE), and Actalis (IT), among others listed at
   esignature.ec.europa.eu/tl-browser.</t>
      <t>
   Implementations MAY use a non-EU TSA for development or testing
   purposes, but production deployments under this profile MUST use a
   QTSP.</t>
    </section>
    <section anchor="sect-6" numbered="true" toc="default">
      <name>Annex III Category Mapping</name>
      <t>
   The following table maps the primary Annex III categories of the EU
   AI Act to the applicable Watchtower configurations and the OMP
   domain profiles that should be used in conjunction with this profile.</t>
      <dl newline="true" spacing="normal" indent="3">
        <dt>Category 5(b) -- Credit scoring and creditworthiness:</dt>
        <dd>
	Required Watchtowers: WT-EUAIA-01, WT-EUAIA-02, WT-EUAIA-04.
      Complementary profile: <xref target="I-D.veridom-omp-ndtcp" format="default"/> for Kenya
      deployments.
	</dd>
        <dt>Category 4 -- Employment and worker management:</dt>
        <dd>
	Required Watchtowers: WT-EUAIA-01, WT-EUAIA-02, WT-EUAIA-03.
      Rationale: Employment decisions have high fundamental rights
      impact; anomaly detection is particularly important for
      automated hiring or performance management systems.
	</dd>
        <dt>Category 3 -- Education and vocational training:</dt>
        <dd>
	Required Watchtowers: WT-EUAIA-01, WT-EUAIA-02.
	</dd>
        <dt>Category 8 -- Administration of justice:</dt>
        <dd>
	Required Watchtowers: WT-EUAIA-01, WT-EUAIA-02, WT-EUAIA-03.
      Complementary profile: a forthcoming OMP legal domain profile
      for ABA Rule 5.3 / CA SB 574 deployments.
	</dd>
      </dl>
      <t>
   For categories not listed above, operators MUST apply at minimum
   WT-EUAIA-01 and WT-EUAIA-04, and SHOULD apply WT-EUAIA-02 for
   any interaction with individual-level consequences.</t>
    </section>
    <section anchor="sect-7" numbered="true" toc="default">
      <name>Conformity Assessment</name>
      <t>
   Operators deploying OMP under this profile who are subject to the
   Article 43 conformity assessment requirement may present the
   following evidence to a Notified Body or in a self-assessment under
   Article 43(4):</t>
      <ul spacing="normal">
        <li>
          <t>The OMP™ Technical Specification [ZENODO-OMP] as the reference
      technical documentation for the logging and traceability
      mechanism;</t>
        </li>
        <li>
          <t>The IETF Internet-Draft <xref target="I-D.veridom-omp" format="default"/> as evidence of the
      open, publicly reviewed specification of the cryptographic
      sealing architecture;</t>
        </li>
        <li>
          <t>A sample Audit Trace record sealed under this profile, together
      with the output of the OMP Reference Validator
      [OMP-OPEN-CORE], demonstrating chain integrity and Qualified
      Electronic Timestamp authenticity;</t>
        </li>
        <li>
          <t>The operator's domain-specific Watchtower configuration,
      demonstrating that WT-EUAIA-01 through WT-EUAIA-04 are
      implemented as required.</t>
        </li>
      </ul>
      <t>
   The OMP Reference Validator is published as open-source software
   under the Apache 2.0 licence at [OMP-OPEN-CORE].  Any Notified
   Body, Supervisory Authority, or third-party auditor may run the
   Reference Validator against any OMP Audit Trace chain without
   access to the operator's infrastructure or Veridom's systems.</t>
    </section>
    <section anchor="sect-8" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
   The security considerations of <xref target="I-D.veridom-omp" format="default"/> apply in full
   to this profile.  The following additional considerations apply
   to EU AI Act deployments.</t>
      <t>
   Key management: Operators MUST implement appropriate key management
   practices for the institution signature private key, consistent
   with eIDAS Annex II requirements for advanced electronic signatures.
   Compromise of the institution signature private key does not
   invalidate historical Audit Traces, whose integrity is anchored by
   the QTSP TimeStampToken, but would allow fabrication of future
   records attributed to the institution.</t>
      <t>
   GDPR interaction: Audit Trace records that contain or are
   associated with personal data are subject to GDPR data retention
   and erasure requirements.  Operators MUST implement a mechanism
   for satisfying Article 17 GDPR erasure requests in a manner
   consistent with the chain integrity properties of the Merkle
   structure.  Recommended approach: selective pseudonymisation of
   personal data fields in historical records, with a public record
   of the pseudonymisation event in the chain, rather than deletion
   of the Audit Trace record itself.</t>
      <t>
   Supervisory access: Operators MUST be capable of producing the
   full Audit Trace chain for any deployment period to the designated
   Supervisory Authority within the timeframes specified by national
   implementing legislation.  The Proof-Point artefact generation
   mechanism (<xref target="sect-3.6" format="default"/>) is designed to support this capability.</t>
    </section>
    <section anchor="sect-9" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>
   This document has no IANA actions.</t>
    </section>
  </middle>
    <back>
    <references title="Normative References">
      <reference anchor="I-D.veridom-omp" target="draft-veridom-omp-00">
        <front>
          <title>Operating Model Protocol (OMP): A Deterministic Decision-Enforcement Protocol with Externalized Proof-of-Integrity</title>
          <author fullname="Tolulope Adebayo"/>
          <author fullname="Oluropo Apalowo"/>
          <author fullname="Festus Makanjuola"/>
          <date month="March" year="2026"/>
        </front>
      </reference>

      <reference anchor="RFC2119" target="https://www.rfc-editor.org/rfc/rfc2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner"/>
          <date month="March" year="1997"/>
        </front>
      </reference>

      <reference anchor="RFC8174" target="https://www.rfc-editor.org/rfc/rfc8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba"/>
          <date month="May" year="2017"/>
        </front>
      </reference>

      <reference anchor="RFC3161" target="https://www.rfc-editor.org/rfc/rfc3161">
        <front>
          <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
          <author fullname="C. Adams"/>
          <author fullname="P. Cain"/>
          <author fullname="D. Pinkas"/>
          <author fullname="R. Zuccherato"/>
          <date month="August" year="2001"/>
        </front>
      </reference>

      <reference anchor="RFC8785" target="https://www.rfc-editor.org/rfc/rfc8785">
        <front>
          <title>JSON Canonicalization Scheme (JCS)</title>
          <author fullname="A. Rundgren"/>
          <author fullname="B. Jordan"/>
          <author fullname="S. Erdtman"/>
          <date month="June" year="2020"/>
        </front>
      </reference>
    </references>

    <references title="Informative References">
      <reference anchor="EUAIA">
        <front>
          <title>Regulation (EU) 2024/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence (Artificial Intelligence Act)</title>
          <author fullname="European Parliament and of the Council"/>
          <date year="2024"/>
        </front>
      </reference>

      <reference anchor="EIDAS">
        <front>
          <title>Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market</title>
          <author fullname="European Parliament and of the Council"/>
          <date year="2014"/>
        </front>
      </reference>

      <reference anchor="I-D.veridom-omp-ndtcp" target="draft-veridom-omp-ndtcp-00">
        <front>
          <title>OMP Domain Profile: Kenya Digital Credit Providers -- CBK NDTCP Regulations 2022</title>
          <author fullname="Tolulope Adebayo"/>
          <author fullname="Oluropo Apalowo"/>
          <author fullname="Festus Makanjuola"/>
          <date month="March" year="2026"/>
        </front>
      </reference>

      <reference anchor="OMP-OPEN-CORE" target="https://github.com/veridomltd/omp-open-core">
        <front>
          <title>OMP Open Core: Reference Validator and Schema Library</title>
          <author fullname="Veridom Ltd"/>
          <date year="2026"/>
        </front>
      </reference>

      <reference anchor="ZENODO-OMP" target="https://doi.org/10.5281/zenodo.19140948">
        <front>
          <title>OMP -- Operating Model Protocol: A Deterministic Routing Invariant for Tamper-Evident AI Decision Accountability in Regulated Industries</title>
          <author fullname="Tolulope Adebayo"/>
          <author fullname="Oluropo Apalowo"/>
          <author fullname="Festus Makanjuola"/>
          <date month="March" year="2026"/>
        </front>
      </reference>
    </references>
  </back>
</rfc>
