Skip to content

Why Article 28 of the EU AI Act Redefines What It Means to Be “Compliant”-And Why Only Proof Will Protect You

For senior compliance leaders, Article 28 isn’t just another regulatory hoop-it’s where theory meets operational grit. The law demands more than policy boilerplate or annual declarations. Regulators want evidence you’re living compliance in real time: who did what, when, and according to which agreed process. When authorities investigate, promises and process charts go straight to the bottom of the file. It’s only traceable, timestamped action that will save your organisation’s credibility-and its bottom line.

If your evidence chain can’t be summoned instantly, the best policy in the world won’t save you.

National “notifying authorities”-appointed by each EU Member State-serve as independent watchdogs for AI risk. Their job is not to accept reassurance or friendly narratives; their mission is to see, on demand, exactly how you identified a risk, mapped an incident, escalated notification, and documented the result. If your proof chain is scattered across emails, file servers, and personal chats, your risk posture is exposed. In today’s regulatory climate-especially given Recital 77’s warning that enforcement will be swift-the boardroom expects certainty and speed, not best intentions.

Yet even discipline is not enough. What exactly triggers notification? Not every IT exception, patch, or uptime wobble. Authorities require formal notice only for:

  • New high-risk AI deployments targeting the EU market.
  • Substantive AI system changes-think model retraining, change of intended use, risk re-classification.
  • Incidents affecting the rights or safety of individuals (especially those with legal consequences spanning multiple laws, such as GDPR Article 33).
  • Any event formally crossing the “notification” line-never low-level maintenance or informal status alerts.

In short, Article 28 enforcement is binary: Either your organisation can demonstrate a living chain of notifiable events, or it stands exposed when-not if-a regulator knocks.


How Do You Actually Map Notification Triggers, Responsible Parties, and Deadlines-Without Missing a Critical Event?

Most organisations fall short of compliance not from malice, but due to fuzzy logic and accidental process gaps. Both Article 28 and GDPR Article 33 demand prompt-not comfortable or convenient-notification. Drag your feet, and you may face regulatory action, reputational haemorrhage, and business interruption.

Most notification failures aren’t malicious-they’re born of missed handoffs, unclear roles, and events lost in the noise of daily operation.

What Events Really Trigger Notification?

The law’s intent is concrete. Your process must spell out, with no ambiguity:

  • Deployment triggers: -Each launch of a new high-risk AI system to EU data subjects is covered-not legacy systems or R&D pilots.
  • Major system changes: -Like retraining, integration of new data types, or shifts in regulatory classification.
  • Reportable incidents: -Defined as events with a direct impact on safety, rights, or legal status, including GDPR-reportable breaches.
  • Threshold events only: -Never for routine, low-risk maintenance or minor operational blips.

Regulatory authorities expect these events to be mapped in your business logic, not left to HR, legal, or ad-hoc human judgement. That means automated detection and escalation, every time.

Who Gets Notified, and How Fast?

  • Who: The national AI Act “notifying authority”-distinct from your notified body and, where applicable, your GDPR supervisory authority.
  • When: The industry best-practice (mirroring GDPR Article 33) is 72 hours from point of awareness. But “without undue delay” leaves no safe harbour for inaction.
  • How: Tamper-evident logs and auto-synced notification chains-no manual scavenging or email trails.

Whose Name Is On It-And How Are Dual Compliance Needs Managed?

  • Every process should assign *named individuals*-not just roles-to detection, classification, notification drafting, and submission.
  • Overlap between AI Act and GDPR? Design evidence to fulfil both, not forcing a trade-off or burden of duplicate reporting.

Checklist for Defensible Mapping

  • All triggers are live-mapped and reviewed in both policy and operational workflow.
  • Timelines are enforced by configurable, automated alerts.
  • All recipients, authority contact points, and notification templates are current and registry-tracked.
  • Incident-to-notification linkage is never a matter of after-the-fact reconstruction-one action chain, one source of truth.
  • Real drills-not tabletop theory-verify that nothing slips.

If your map misses a beat, an auditor or authority will zero in on the hole faster than any technical threat actor.




Everything you need for ISO 42001, in ISMS.online

Structured content, mapped risks and built-in workflows to help you govern AI responsibly and with confidence.




Why “Living” Evidence Chains Trump Static Files-And How to Make Audit Survival Routine

For many, “evidence” still means a binder or file share-updated when compliance gets top-of-mind. This is a liability. Auditors now want living, real-time records: versioned, signed, tied directly to each system event, retrievable in minutes, and ready to defend your position in court or under regulatory glare.

Live compliance chains beat paper logs-because regulators won’t wait while you search email history.

What Does a Living Evidence Chain Actually Look Like?

  • Immutability and Traceability: Every log is append-only, every change timestamped, every notification linked to its root cause and forward to its regulatory response.
  • Continuous Update: Evidence isn’t static-if policy, processes, or system states change, auto-generate a new entry, trigger review, and tie it to a living chain.
  • Immediate Retrieval: Can you display every notification chain, authority acknowledgment, and incident link in under two minutes? If not, your evidence isn’t real-time.
  • Audit-Ready Integration: Where evidence is fragmented-emails, spreadsheets, unlinked logs-risk escalates, not recedes.

Modern Tooling Is Non-Negotiable

  • Incident management integrating trigger-to-notification pipelines.
  • Policy platforms (like ISMS.online) with automated audit trails, workflow assignments, compliance dashboards, and zero-friction retrieval.
  • Proactive reminders-systems that warn you about pending or missed notification deadlines, not regulators.

It isn’t just about doing things right. Modern compliance is about demonstrating, rapidly and indelibly, that you did things right, every time, and for the right reasons.




ISO 42001 Controls A.8.4 & A.8.5: Embedding Defensible Notification as Code, Not Goodwill

ISO 42001 wasn’t designed as a paper exercise. Its controls, particularly A.8.4 (“Communication of incidents”) and A.8.5 (“External reporting”), turn notification discipline into enforceable, auditable code.

  • A.8.4: demands living, role-assigned incident communication-even the best plans fail if they live in a dusty manual. *Automate triggers, keep logs timestamped, and assign accountability to named individuals*.
  • A.8.5: establishes a persistent, always-current registry of authorities, notification templates, requirements, and proof of execution for every notifiable event.

Without standardised automation, authorities will doubt your ability to surface compliance when it really counts.

How to Operationalize A.8.4

  • Evergreen, published communication plans and templates; role and person assignments always visible and current.
  • Triggers mapped straight to authority, channel, and message, with all steps signed and time-stamped.
  • Logs never left to manual entry-if it’s not in the chain, it didn’t happen.

How to Make A.8.5 Fail-Safe

  • Registry of every authority and recipient, maintained with notification templates and version-tracked requirements.
  • Outbound notification and authority acknowledgment, versioned and signed, tied to policy and incident root.
  • Causal connection-every notification mapped to policy sections and evidence, for closed-loop auditability.

6-Step Notification Proof Chain

  1. Event Occurs
  2. Event Assessed-Is Notification Required?
  3. Control A.8.4/A.8.5 Engaged-Notification Prepped
  4. Notification Sent-With Live Log Capture
  5. Authority Response Recorded and Verified
  6. Process Closed, Proof Audited

Any break-unlogged action, missing approval, or template drift-in this chain is a red flag for regulators, and a competitive disadvantage inside your organisation.




ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.




Why Centralising Evidence Is the Only Way to Survive Modern Audits-or Regulatory Scrutiny

Leadership and regulators want a single, battle-ready file: every notification, acknowledgment, log, evidence snapshot, and contact registry in one live platform, never scattered or stale. Why? Because every minute of delay or “file not found” erodes trust and inflates business risk.

Excuses won’t hold up-auditors want proof, not apologies, at the speed of business disruption.

The Modern “Unified Compliance File” Looks Like This

  • Real-time, Historically Complete Logs-live, compressed, tamper-evident.
  • Automated audit trails-no manual reconciliation, no suspicious timeline gaps.
  • Documented versioning-mapped by who authored what, when, and in response to which event.
  • Notification/acknowledgment chains-linked to every incident and policy trigger.
  • Recipient registry-aligned to the latest requirements, contacts, and templates.

Unified File Must-Haves

  • Live updating-no end-of-week or quarter reconciliations.
  • Closed incident chains-notifications and responses tied, signed, and instantly shown.
  • Digital signatures-no ambiguity about who performed which step.
  • Drill-ready two-minute retrieval-and drills run under stress, not as token gestures.

This is operational resilience, not paperwork. A unified file backs your reputation when stakes are highest.

Book a demo




How Human Error and Fragmented Systems Cause Most Notification Failures-And How to Engineer Them Out

Regulatory punishment doesn’t target hackers or technical mishaps. It lands squarely on organisations that fumble responsibilities, drop evidentiary chains, or rely on memory and goodwill. The most expensive mistakes aren’t breaches themselves; they’re missed, delayed, or undocumented notifications.

Fines rarely punish the root event-it’s disconnected handoffs and lost records that escalate loss and media fallout.

Typical Process Pitfalls

  • Notification routed offline or via untracked channels-nothing for auditors to reconstruct.
  • Change records without version control-resulting in finger-pointing and memory gaps.
  • Fuzzy or unassigned responsibilities-no one can prove who was accountable.
  • Fractured evidence-scattered spreadsheets, email attachments, Slack messages.

The ISO 42001 Blueprint for Reliability

  • Route every event and associated notification through version-controlled tools-no tolerance for “side channels”.
  • Automate trigger detection-systems shouldn’t wait for someone to spot the issue.
  • Require sign-off at every handoff-compliance is built on digital accountability.
  • Drill until retrieval and event simulation is business-as-usual, not a one-off scramble.

Common Flaws and ISO 42001 Solutions

Weakness Audit Threat ISO 42001 Remedy
Fragmented logs Lost evidence A.8.5: Single registry
Manual process Missed events A.8.4: Automated triggers
Unlogged edits Dispute, ambiguity 7.5.3: Versioned documents
Fuzzy criteria Wrong events flagged A.8.4/A.8.5: Explicit mapping

A board or regulator who can’t walk the chain on-demand knows it’s not a tech issue-it’s a leadership one.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




How to Streamline and Automate Article 28 While Maintaining Human Command

Building compliance on heroics or memory ensures eventual failure. “Automate” needn’t mean “absent human control”; instead, it means no handoff or acknowledgment goes untracked, and compliance officers remain the decision-makers. The best platforms-like ISMS.online-let you automate mapping, notifications, and evidence while giving compliance leads override power and oversight.

Real operational confidence is achieved when every notification is mapped, time-stamped, and retrievable-not left to improvisation.

Features to Demand (and Never Settle For Less)

  • End-to-End Incident Pipeline-detection through acknowledgment, all logged and verified in one stream.
  • Universal Registry-a single, always-updated hub for templates, contact points, and requirements.
  • Version Control & Digital Audit Trail-every edit and sign-off visible, no shadow steps.
  • Drill Capability-pull logs and simulate a full notification in real time, even under audit pressure.

Article 28 in Practice, Not Theory

  • Triggering event detected (high-risk deployment, breach, or major change).
  • System instantly maps and crafts correct notification, files to right authority.
  • Live logs auto-generate, all steps time-stamped and validated.
  • Authority response and subsequent action chained in a single file.
  • Boardroom or regulatory inspection triggers zero manual “file roundups”.

This discipline transforms compliance from reactivity to resilience, making Article 28 a differentiator-not just a regulatory drag.

Book a demo




“Show, Don’t Tell”: How to Prove Real-World Defensibility with Live Compliance Drills

When the chips are down, policy binds matter less than live, on-demand display of your notification evidence chain. The question is never “got compliance policy?” but “can every event and proof-point be summoned at audit speed-by anyone responsible, no matter location or circumstance?”

Audits and surprise inspections don’t come with ‘prep’ windows-only what you can surface live truly exists.

Executive and Regulator Drill Questions

  • Can the team complete a start-to-finish notification, with evidence, in under five minutes-under stress?
  • Are all roles, policy steps, and notification records signed, versioned, and instantaneously accessible?
  • Can viewing the incident, decision, notification, and authority reply be achieved-even if a key employee is unavailable?
  • How often are compliance teams drilled under operational reality (not in ideal, tabletop conditions)?

Most organisations discover their gaps under fire. ISMS.online enables continuous readiness-with built-in drill modules-so that proof trumps hope and your organisation leads with operational confidence.




The ISMS.online Advantage-Making Compliance with Article 28 and ISO 42001 an Operational Fact

ISMS.online is built for the exact pressures Article 28 creates. Every trigger, process, and notification is auto-mapped, versioned, and logged-enabling leadership to operate at “regulator speed” rather than resorting to workaround or fire-drill. Moving from theory to disciplined, real-time execution is no longer optional-boards and authorities now expect it as the starting point.

With ISMS.online, your team steps into audits with live, drill-proof evidence, unified files, and confidence that each link in your compliance chain stands up to scrutiny. No more scattershot files, loose notifications, or finger-pointing in the boardroom. Just an operational infrastructure designed for today’s risk and regulatory reality.

When compliance is live, leadership trust-and regulatory certainty-follows naturally. Now is the time to act; let ISMS.online be the backbone of your AI Act and ISO 42001 compliance journey.



Frequently Asked Questions

Who qualifies as a notifying authority, and how do their hidden priorities shape Article 28 compliance?

Notifying authorities are regulatory bodies granted power to audit and enforce under Article 28-think national Data Protection Authorities or newly formed AI oversight commissions. While they publish guidance, what matters in practice is their forensic curiosity: they want airtight notification evidence that withstands adversarial review and exposes no chain-of-custody gaps. These authorities approach every notification as if it’s the first step in an investigation, not a compliance courtesy. Their silent demand? Unambiguous accountability-evidence that timestamps, names, and proves every step, not just a record that “the job got done.”

It isn’t the policy binders that get questioned when the breach alarm rings; it’s the live audit log and its signatures that keep your boardroom from breaking a sweat.

What operational markers separate real compliance from checkbox theatre?

  • Real-time notification logs: with immutable entries-no spreadsheets, no backdating.
  • Personal accountability: every alert traced directly to a named individual, digitally signed.
  • Authority confirmation: not just “sent” but receipt acknowledged by the actual regulatory contact, with proof on file.
  • Instant evidence recall: if finding last quarter’s notification chain takes more than a minute, your system fails their pressure test.

ISMS.online automates this standard-every alert, every recipient, every timestamp-and ensures your evidence stands up, no matter how hostile the scrutiny.


When do you have to notify under the EU AI Act and GDPR, and what stops compliance from derailing in the heat of an incident?

Notification obligations are triggered the moment a high-risk AI deployment or incident endangers individual rights or a major breach is detected-there’s no buffer for slow triage. GDPR’s 72-hour window starts the moment the breach is discovered, not when legal finally meets. Article 28 of the EU AI Act expects notification even on suspicion of system compromise or failure. Authorities aren’t interested in your intent to inform; they care that no handoff or escalation can slip by without record.

How do you prove immediate, targeted action?

  • The right recipients: Notification must reach the current authority of record for AI or data protection in every affected jurisdiction.
  • Provable process: Digital evidence must show a chain from incident detection, through risk analysis, to timed notification-no steps inferred or stitched after the fact.
  • Redundancy for resilience: Automated escalation ensures a missed handoff or out-of-office doesn’t block the requirement.

If your entire regulatory evidence chain relies on a single compliance lead or an out-of-office handover, you’re betting your reputation on luck, not process.

ISMS.online embeds role-based accountability, automates escalation, and provides live status views, so you’re never left guessing who’s notified-or left exposed by a weekend incident.


Why do living evidence chains matter more than static records in regulatory scrutiny today?

Static records-the typical PDF trails, email threads, or policy binders-are exactly what regulators expect to fail. Post-incident reconstruction broadcasts that operational controls are hollow and that someone could tamper with, lose, or circumvent the system. Inspectors test “living” evidence: append-only, versioned logs; audit drills that surface instant, tamper-evident chains; and no gaps between detection, notification, and confirmation.

An evidence chain you assemble after the event is an admission of control drift-regulators expect every step to be logged as it happens, not retrofitted.

What operational standards define “audit-ready” now?

  • Cross-referenced, live logs: every policy update, incident trigger, and notification points to the actual event.
  • Versioned, append-only registries: deletions, backfills, or silent edits are impossible-every action leaves an immutable mark.
  • Centralised authority directories: all notification templates and contacts are current, with history and audit of every change.
  • Digital chain-of-custody: identity, timestamp, and output receipt for every alert and response-no anonymous hands, no orphaned entries.

ISMS.online brings this to life, surfacing living audit trails and automating custody at every junction, so audit requests become a show of strength, not a last-minute scramble.


Which ISO 42001 controls set the rules for notification-and how do you guarantee you’ll pass their toughest audit scenarios?

ISO 42001 advances notification compliance from paper policy to real-world discipline with controls like A.8.4 (communication of incidents) and A.8.5 (external reporting to authorities and partners). Control 7.5.3 (documentation management) underpins both, demanding evidence be versioned, accessible, and tamper-proof. Note: these are not “checklist” controls-they require live demonstration and operational drilling, not static evidence.

What does a high-trust notification workflow look like?

  • Event-driven detection: Incidents get logged by system or sensor, not by human recollection.
  • Authority-matched alerts: Each type of risk automatically triggers the correct authority notification, with precise templates mapped.
  • Digitally signed, role-tied logs: Every handoff is attributed, timestamped, and auditable back to role-not generic “team” actions.
  • Live recall drills: Teams rehearse the production of evidence at audit speed; no gap is hidden by outdated folders or lost handbooks.
ISO 42001 Control Notification Focus ISMS.online Capability
A.8.4 Incident comms role-mapping Automated, role-based triggers
A.8.5 Authority alert registry Centralised contact directory
7.5.3 Proof: versioned documentation Tamper-evidence, recall-ready

ISMS.online wires these controls as living code-moving beyond policy to embedded operational truth that keeps you prepared for knock-down compliance tests.


Where do most organisations trip on notification and evidence-and how do top performers make audit confidence their norm?

The leading cause of authority failure is process fragmentation: evidence locked in email, outdated contacts in someone’s Excel, notification logs scattered across inboxes and cloud drives. When an audit comes, organisations hope for time to “get records in order”-regulators see that as a warning sign that controls are performative, not real.

High-performing teams leave nothing to chance. Evidence collection, notification, and authority confirmation become muscle memory, not a marathon.

What do the best compliance leaders operationalize?

  • Automated, unified logging: all notifications, signatures, and handoffs logged in a single evidence file.
  • Timestamped, digital sign-off for every action.
  • Regular recall drills and pre-audit evidence walkthroughs by line staff, not just management or IT.
  • Templates, authority registers, and protocols stored versioned-always current, always testable, never reliant on memory.
  • A “show me now” evidence mindset: readiness to produce a complete evidence chain on demand, not by request.
Risk Zone Regulator Reaction ISO 42001 Guardrail
Fragmented logs “Chain can’t be trusted” A.8.5 unified registry
Manual notification “Delay = enforcement action” A.8.4 event-based trigger
Documentation lag “Cannot verify compliance” 7.5.3 immediate proof, recall

With ISMS.online, every step is part of a resilient workflow, not improv. You turn the tables: audits become familiar territory, not breaking news.


How does a live evidence platform shift Article 28 and ISO 42001 from compliance box-ticking to operational authority?

ISMS.online isn’t just an archive-it’s an engine for compliance demonstrated in real time. Each system trigger, notification log, and authority handoff is tracked, versioned, and connected back to the correct control and regulatory requirement. Audits become verification points, not anxiety triggers; regulator visits become showcases, not traps.

  • Instant recall: Every notification, template, authority list, and approval is findable and provable at audit speed.
  • Automated workflow: Drills, live incident rehearsals, and authority confirmations run end-to-end, not just on paper.
  • Immutable evidence chain: Each action, person, and timestamp sealed as it happens and available for immediate inspection.

The organisations that thrive are those who treat compliance as an operating norm, not an event-systems that think and prove for you make crises less dangerous and reputations far more resilient.

Equip your team now-let ISMS.online make compliance evidence your permanent advantage, not your last-minute defence.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Spring 2026
High Performer - Spring 2026 Small Business UK
Regional Leader - Spring 2026 EU
Regional Leader - Spring 2026 EMEA
Regional Leader - Spring 2026 UK
High Performer - Spring 2026 Mid-Market EMEA

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.