EU AI Act · Governance Control

EU AI Act Supervisor Approval — no system advances without a named approval.

In EAB, every governance stage has an approval gate. Every gate requires a named supervisor. Every decision — including bypasses — is logged with identity, timestamp, and justification.

This is not an access control layer. It is the mechanism by which accountability is made structural — before any AI system reaches the obligation management stage.

Approval Control
Named supervisor required at every governance gate
Override & bypass logged — never silent
Justification required for all non-standard decisions
Approval record sealed & immutable on submission
Full bypass log visible to auditors in read-only view
The approval principle

“An approval without a named author is not an approval. It is a gap in the record — and gaps are exactly what auditors look for.”

EAB Design Principle · Named Accountability
The approval chain

Four gates. Every one attributed.

EAB separates what different roles can do by design. A business operator can register a system. An AI system owner can complete the technical profile. But no single actor can move a system through the full governance chain alone. The supervisor approval gate enforces this separation at every critical transition.

When a supervisor approves a screening result, their identity is anchored to that record — not as a metadata field that could be edited, but as a sealed part of the immutable record. If a supervisor bypasses a screening gate or overrides an Art. 5 concern, the bypass is logged with their identity, the timestamp, and the justification they provided. There is no silent override.

The bypass log is visible to auditors in the read-only workspace. Every non-standard decision is reconstructable — who made it, when, and why. An auditor does not need to interview anyone to determine whether the approval chain was followed.

Supervisor Access Includes
  • Gate 1Initiate screening session (locks technical profile)
  • Gate 2Art. 5 review — state each prohibition category
  • Gate 3Approve or reject screening result
  • Gate 4Approve obligation completion
  • OverrideBypass any gate — logged with justification
  • LogFull bypass history visible to auditors
What supervisors control

Six approval capabilities.

Supervisors are the accountability anchor in EAB — every critical decision flows through their approval.

Screening

Initiate & Approve Screening

Only a supervisor can initiate a screening session. On completion, the supervisor reviews the result and approves or rejects it. Approval seals the screening record — it cannot be modified after this point.

Art. 5

Prohibited Practices Review

The Art. 5 review is conducted by the supervisor as the first stage of every screening. Each of the seven categories must be explicitly stated. A confirmed prohibition blocks further progression — an override is possible but permanently logged.

Bypass Log

Every Override Attributed

When a supervisor bypasses a gate, overrides a prohibition concern, or approves under exceptional conditions, the action is logged with their identity, the exact timestamp, and the justification they provided. This log is immutable and visible to auditors independently.

Delegation

Role Separation Enforced

Operators register. Owners complete technical profiles. Supervisors screen and approve. No role can perform another role's gate action. The separation is enforced at the system level — not by policy documents.

Obligations

Obligation Completion Review

As obligation areas are completed and evidence attached, the supervisor reviews and approves completion. A partially evidenced obligation cannot be approved — the gate requires explicit per-obligation sign-off.

Audit View

Auditor-Visible Approval Trail

The complete approval chain — every gate, every bypass, every identity — is visible in the auditor's read-only workspace without any preparation from the compliance team. The record reconstructs itself.

Governance control

Accountability that is structural — not procedural.

When approval is enforced by the system — not by a process document — it cannot be skipped, forgotten, or reconstructed after the fact.

EU-hosted · Anchored to CELEX 32024R1689

Get in Touch
Request More Information

Tell us about your organization and what you’re looking to address. We’ll follow up with the relevant information.