2026-04-16·12 min read·

EU AI Act Art.45 Information Obligations on Notified Bodies: Reporting, Cross-Notification & Market Surveillance Cooperation — Developer Guide (2026)

EU AI Act Article 45 is a short article with a long reach. Its five paragraphs define the information architecture that keeps the notified body system honest: who learns what, when, and from whom, when a notified body makes a decision about a certificate of conformity. For providers who have gone through Annex VII assessment and hold an Art.44 certificate, Art.45 is the hidden mechanism that determines how certificate problems — suspension, revocation, post-certification non-conformity — flow through the system to reach market surveillance authorities, peer notified bodies, and ultimately the Commission.

The practical significance for developers is asymmetric. Art.45 imposes obligations directly on notified bodies, not on providers. But the consequences of Art.45 activating flow immediately to providers: if your notified body reports a certificate suspension to the notifying authority under Art.45(1), if it cross-notifies peer bodies under Art.45(2), if it finds post-certification non-conformity and triggers Art.45(4), the provider's CE marking, Declaration of Conformity, and market placement rights are all directly affected. Understanding Art.45 means understanding what triggers your notified body to act — and what you must do in response.

For most SaaS developers, Art.45 is academic in the same sense as Art.44: if you are using Art.43(1) Annex VI internal control (no notified body involved), there is no notified body to impose Art.45 obligations on. But for providers building biometric identification systems, regulated product safety components, or systems where a Commission implementing act under Art.43(3) mandates Annex VII assessment, Art.45 defines the information environment in which your Art.44 certificate lives.


Art.45 in the Notified Body Obligation Framework

Art.45 is one of several articles that govern notified body conduct after designation. The full obligation framework for notified bodies runs from Art.33 through Art.38:

ArticleObligationWho Is Subject
Art.33Notified body requirements: independence, competence, impartialityNotified bodies
Art.34Procedural obligations: application handling, subsidiary, assessment conductNotified bodies
Art.35Notified bodies coordination group: cooperation mechanismsNotified bodies + Commission
Art.36Suspension/withdrawal of designation by notifying authorityNotifying authority
Art.45Information obligations: reporting, cross-notification, MSA cooperationNotified bodies

Art.45 is distinct from Art.36: Art.36 governs what the notifying authority does to a notified body's designation; Art.45 governs what the notified body does with certificate information it generates during its assessment work. The two articles interact: Art.45(1) reporting to the notifying authority is the trigger that enables Art.36 enforcement if a pattern of problematic certificates emerges.

Art.45 also sits between Art.44 (certificate issuance) and Art.44(4) (certificate suspension/revocation by the notified body). The information flows required by Art.45 are the mechanism that makes the certificate lifecycle visible to regulators — without Art.45, certificate problems could remain siloed within individual notified body relationships with no systemic visibility.


Art.45(1): Reporting to the Notifying Authority

Art.45(1) requires notified bodies to inform the notifying authority (the Member State body that designated them) about specific certificate decisions. This is a proactive reporting obligation — the notified body must report without being asked.

What must be reported under Art.45(1):

Decision TypeTriggerReporting Obligation
Certificate issuedSuccessful Annex VII assessmentReport to notifying authority
Certificate refusedAssessment finds non-compliance, no certificate issuedReport refusal + grounds to notifying authority
Certificate restrictedCertificate issued with added conditions/limitationsReport restriction + basis to notifying authority
Certificate suspendedTemporary suspension pending provider corrective actionReport suspension + trigger to notifying authority
Certificate withdrawnPermanent withdrawal of previously issued certificateReport withdrawal + grounds to notifying authority
Supplement issuedSignificant change assessment covered by supplemental certificateReport supplement to notifying authority

Why this matters for providers:

Refusal, restriction, suspension, and withdrawal are not confidential events between the provider and the notified body. They flow immediately to the notifying authority. If a provider attempts to work around a certificate refusal by approaching another notified body without disclosing the prior refusal, Art.45(1) reporting creates a discoverable trail — the first notified body's refusal is on record with the notifying authority.

The notifying authority also receives this information as a check on the notified body's own conduct: if a notified body issues a certificate that the notifying authority considers questionable, the Art.45(1) reporting creates the basis for scrutiny under Art.36.

Practical consequence: Treat every significant development in your notified body relationship as potentially visible to the notifying authority. There is no confidential back-channel for certificates.


Art.45(2): Cross-Notification to Peer Notified Bodies

Art.45(2) requires each notified body to inform other notified bodies carrying out similar conformity assessment activities covering the same AI systems of relevant cases — including both negative and positive assessment outcomes.

The Art.45(2) information duty:

Information TypeDirectionScope
Negative assessment outcomesTo peer notified bodiesRefused certificates, suspended/withdrawn certificates, major non-conformities found
Positive assessment outcomes (on request)To peer notified bodies on requestIssued certificates, supplement decisions, QMS certifications
Relevant casesTo peer notified bodiesCases that inform peer bodies about compliance standards, new technical interpretations, material non-conformities in a product category

The multi-application prevention mechanism:

Art.45(2) is designed to prevent a practice known in other EU conformity regimes as "forum shopping" — approaching multiple notified bodies for the same assessment and choosing the one that issues a favourable certificate. When a notified body refuses or suspends a certificate, peer bodies receive notification. If a provider then approaches a peer body for the same system, the peer body is informed of the prior negative outcome.

This does not automatically bar the provider from a second assessment, but it means the second notified body enters the assessment with knowledge of the first body's concerns. If the second body proceeds and issues a certificate despite the known negative history, that decision is subject to scrutiny — and the Commission and notifying authority can request information under Art.45(3).

For providers: If a notified body declines to issue your Art.44 certificate, do not assume you can simply move to another body without disclosure. The Art.45(2) cross-notification system means the prior refusal is likely already known to your alternative notified body candidates. Transparent disclosure of prior assessment history — including the grounds for any refusal — is the legally sound approach.


Art.45(3): Information Access by Commission and Member States

Art.45(3) requires each notified body to make available to the Commission and to Member States, on request, all information held by it relevant to conformity assessment activities carried out under the Regulation.

What this means in practice:

RequesterInformation AvailableBasis
CommissionAll conformity assessment information, certificate records, assessment reportsArt.45(3) on request
Member States (any)All conformity assessment information relevant to the requesting stateArt.45(3) on request
Market surveillance authoritiesCertificate and assessment information relating to their supervisory functionsArt.45(5) cooperation
Notifying authorityCertificate decisions, reportsArt.45(1) proactive reporting

The Art.45(3) right extends beyond the Member State that designated the notified body — any Member State can request information from any notified body. This reflects the single market dimension: a high-risk AI system certified in Germany may be deployed across all 27 Member States, and market surveillance authorities in Poland or Spain need access to the certification evidence.

Practical implication: Technical documentation, QMS audits, assessment reports, and certificate records held by your notified body are accessible to EU-wide regulatory infrastructure on request. This is another reason to ensure that the underlying technical documentation and QMS are genuinely compliant — not optimistically drafted for assessment purposes only.


Art.45(4): Post-Certification Non-Conformity Response

Art.45(4) is the most consequential provision for providers. It establishes what a notified body must do when — after issuing an Art.44 certificate — it discovers or is informed that the certified AI system is no longer in conformity with the applicable requirements.

The Art.45(4) escalation sequence:

StepActionActorCondition
1Require corrective measuresNotified body → ProviderNon-conformity discovered or reported
2Set reasonable deadlineNotified bodyFor provider to implement corrective measures
3Assess corrective measuresNotified bodyAre measures sufficient to restore conformity?
4aCertificate suspendedNotified bodyIf measures are insufficient or not implemented
4bCertificate withdrawnNotified bodyIf measures are not sufficient, not implemented, or non-conformity is irreparable
5Report to notifying authorityNotified bodyUnder Art.45(1)
6Cross-notify peer bodiesNotified bodyUnder Art.45(2)

Triggers for Art.45(4):

Art.45(4) can be activated by several pathways:

  1. Notified body's own surveillance audits — Annex VII §4 requires periodic QMS audits. If a post-certification audit reveals the provider's QMS has deteriorated or the system has been substantially modified without re-assessment, the notified body must act under Art.45(4).

  2. Post-market monitoring data from the provider — Art.30 requires providers to implement and maintain post-market monitoring systems. If the provider's own PMS data reveals the system is underperforming on safety metrics, and the provider submits this data under Art.30, the notified body may conclude conformity has been lost.

  3. Market surveillance authority findings — If a market surveillance authority investigates a complaint or serious incident and finds non-conformity, it can inform the notified body, triggering Art.45(4).

  4. Serious incident reports — Art.73 requires providers to report serious incidents. If a serious incident reveals a fundamental deficiency in the certified system, the notified body must assess whether conformity is maintained.

  5. Third-party information — A competitor, academic researcher, or civil society organization may provide evidence of non-conformity to the notified body or market surveillance authority.

Provider obligations when Art.45(4) activates:

When a notified body requires corrective measures under Art.45(4):

What cannot be done: CE marking a system whose Art.44 certificate has been suspended. The CE marking under Art.49 requires a valid Art.44 certificate as its prerequisite for Track 2 systems. A suspended certificate means no valid CE marking, which means the system cannot be placed on the EU market (Art.16(a) requires CE marking for high-risk AI systems).


Art.45(5): Cooperation with Market Surveillance Authorities

Art.45(5) requires notified bodies to cooperate with market surveillance authorities (MSAs) and exchange information relating to AI systems covered by certificates the notified body has issued, in particular regarding cases of non-compliance.

The Art.45(5) cooperation model:

Information ChannelDirectionContent
MSA request to notified bodyMSA → Notified bodyCertificate records, assessment reports, PMS data submitted by provider
Notified body to MSANotified body → MSANon-conformity findings, Art.45(4) actions taken, certificate status changes
Joint investigation supportBidirectionalNotified body assists MSA investigation of certified system
Art.74 market surveillance accessMSA ← Provider (via notified body)Technical documentation (Art.18), QMS records, incident reports

Why Art.45(5) matters for providers:

Art.45(5) creates a direct information bridge between your notified body and national market surveillance authorities (the national competent authorities designated under Art.70). If a German market surveillance authority is investigating a certified biometric AI system, it can request the German-designated notified body's assessment records and certificate history.

This cooperation extends to serious incident investigations. Art.73 requires providers to report serious incidents to market surveillance authorities. Art.45(5) means that the same MSA can simultaneously request the notified body's assessment records to determine whether the incident reveals a systematic certification failure — not just an isolated operational problem.

CLOUD Act angle: Art.45(5) cooperation covers certificate records and technical documentation held by or accessible to the notified body. If a notified body is a US-headquartered organization (or a subsidiary of one), Art.45(5) information — including provider technical documentation submitted for assessment — could theoretically be accessible under US law via CLOUD Act compellability orders. Providers building biometric AI systems that submit detailed technical documentation to US-linked notified bodies face the same CLOUD Act documentation exposure as providers storing compliance evidence in US-headquartered cloud infrastructure. EU-native notified bodies (designated bodies headquartered and controlled entirely within the EU) eliminate this exposure.


Art.45 Intersection Matrix

Art.45 connects to provider obligations through a network of cross-references:

Art.45 ProvisionIntersects WithHow They Connect
Art.45(1) reportingArt.36Notifying authority uses Art.45(1) reports to exercise Art.36 suspension/withdrawal of designation
Art.45(1) refusalsArt.35Coordination group aggregates refusal data to identify systemic assessment issues
Art.45(2) cross-notificationArt.34Art.34 subsidiary assessment rules connect to cross-notified peer body decisions
Art.45(3) Commission accessArt.85Commission's supervisory powers backed by Art.45(3) information right
Art.45(4) corrective actionArt.44(4)Art.45(4) is the mechanism that activates Art.44(4) suspension/revocation
Art.45(4) non-conformityArt.3(23)Substantial modification test determines whether Art.45(4) fix requires new certificate
Art.45(4) suspensionArt.49Suspended Art.44 certificate invalidates CE marking under Art.49
Art.45(4) suspensionArt.48Suspended certificate invalidates Declaration of Conformity under Art.48
Art.45(4) suspensionArt.16(a)CE marking requirement for market placement — cannot be met with suspended certificate
Art.45(4) triggersArt.30Provider PMS data (Art.30) can be the evidence triggering Art.45(4)
Art.45(4) triggersArt.73Serious incident reports (Art.73) can trigger Art.45(4) notified body review
Art.45(5) MSA cooperationArt.74MSA market surveillance powers backed by Art.45(5) notified body information duty
Art.45(5) cooperationArt.75Mutual assistance between MSAs extended to notified body records via Art.45(5)

What Art.45 Means for Providers

Article 45 imposes obligations on notified bodies, not providers. But every Art.45 provision has a provider consequence:

From Art.45(1) — Assume your certificate status is visible: Certificate decisions — including refusals, restrictions, suspensions, and withdrawals — are reported to the notifying authority. There is no private certificate problem. Plan your compliance posture assuming certificate status is regulatory-visible from the moment of any adverse decision.

From Art.45(2) — Prior assessment history follows you: If a notified body refuses your Art.44 certificate, peer notified bodies are informed. The approach of seeking multiple opinions to find an accommodating body is structurally counteracted by Art.45(2). Disclose prior assessment history proactively; attempting to conceal it risks the integrity of any subsequently issued certificate.

From Art.45(3) — Technical documentation must be defensible everywhere: Any EU Member State can request your technical documentation package from your notified body. Compliance documentation that is calibrated to satisfy only the designated assessment body — rather than representing the actual system accurately — is legally exposed. Draft documentation as if it will be read by every Member State's market surveillance authority.

From Art.45(4) — Post-certification compliance is a continuing obligation: Receiving an Art.44 certificate does not conclude the compliance obligation. The certificate's validity depends on continued conformity with the requirements. Post-market monitoring (Art.30), quality management system maintenance (Art.17), and the Art.3(23) substantial modification test for system updates are all mechanisms for demonstrating continued conformity — the data these generate can trigger or prevent Art.45(4) activation.

From Art.45(5) — Notified body is a regulatory information conduit: Your notified body is not a private compliance partner. It is a regulated body with direct information obligations to market surveillance authorities. Technical documentation and QMS records submitted for Annex VII assessment flow through the Art.45(5) cooperation channel into the regulatory enforcement system. Structure your compliance records accordingly.


Python Implementation

from dataclasses import dataclass, field
from datetime import date, datetime
from enum import Enum
from typing import Optional, List
import json

class CertificateDecisionType(Enum):
    ISSUED = "issued"
    REFUSED = "refused"
    RESTRICTED = "restricted"
    SUSPENDED = "suspended"
    WITHDRAWN = "withdrawn"
    SUPPLEMENT_ISSUED = "supplement_issued"

class NonConformityTrigger(Enum):
    SURVEILLANCE_AUDIT = "surveillance_audit"
    PROVIDER_PMS_DATA = "provider_pms_data"
    MSA_FINDING = "msa_finding"
    SERIOUS_INCIDENT_REPORT = "serious_incident_report"
    THIRD_PARTY_INFORMATION = "third_party_information"
    MARKET_SURVEILLANCE_REQUEST = "market_surveillance_request"

@dataclass
class NotifiedBodyInformationRecord:
    """
    Art.45(1) — Tracks what a notified body must report to the notifying authority.
    For providers: each entry here represents a potential regulatory visibility event.
    """
    certificate_reference: str
    decision_type: CertificateDecisionType
    decision_date: date
    reported_to_notifying_authority: bool
    reporting_date: Optional[date]
    grounds: str  # Legal and technical basis for the decision
    peer_bodies_notified: bool  # Art.45(2) cross-notification done
    peer_notification_date: Optional[date]
    commission_request_received: bool  # Art.45(3) information request
    msa_cooperation_request: bool  # Art.45(5) MSA information request

    def is_adverse_decision(self) -> bool:
        """Returns True if this decision restricts the certificate in any way."""
        return self.decision_type in (
            CertificateDecisionType.REFUSED,
            CertificateDecisionType.RESTRICTED,
            CertificateDecisionType.SUSPENDED,
            CertificateDecisionType.WITHDRAWN,
        )

    def reporting_compliant(self) -> bool:
        """Art.45(1) compliance: adverse decisions must be reported to notifying authority."""
        if self.is_adverse_decision():
            return self.reported_to_notifying_authority and self.reporting_date is not None
        # Issued certificates must also be reported
        return self.reported_to_notifying_authority

    def peer_notification_compliant(self) -> bool:
        """
        Art.45(2) compliance: negative outcomes must be cross-notified to peer bodies.
        Positive outcomes must be provided on request — track separately.
        """
        if self.is_adverse_decision():
            return self.peer_bodies_notified and self.peer_notification_date is not None
        return True  # Positive: on-request only, not proactive obligation


@dataclass
class PostCertificationNonConformityCase:
    """
    Art.45(4) — Manages the post-certification non-conformity escalation sequence.
    For providers: this is the object the notified body creates when triggering Art.45(4).
    """
    certificate_reference: str
    trigger: NonConformityTrigger
    trigger_date: date
    non_conformity_description: str
    corrective_measures_required: List[str]
    corrective_deadline: date
    measures_implemented: bool = False
    measures_implementation_date: Optional[date] = None
    measures_assessed_sufficient: Optional[bool] = None
    certificate_suspended: bool = False
    suspension_date: Optional[date] = None
    certificate_withdrawn: bool = False
    withdrawal_date: Optional[date] = None
    notifying_authority_notified: bool = False  # Art.45(1)
    peer_bodies_notified: bool = False  # Art.45(2)

    def ce_marking_valid(self) -> bool:
        """
        Art.49 + Art.48 — CE marking requires valid Art.44 certificate.
        Suspended or withdrawn certificate = invalid CE marking.
        """
        return not self.certificate_suspended and not self.certificate_withdrawn

    def provider_market_placement_permitted(self) -> bool:
        """
        Art.16(a) — High-risk AI systems require CE marking for market placement.
        Invalid CE marking = market placement prohibited.
        """
        return self.ce_marking_valid()

    def escalation_required(self) -> bool:
        """Returns True if corrective measures deadline has passed without sufficient action."""
        today = date.today()
        if today > self.corrective_deadline:
            if not self.measures_implemented or self.measures_assessed_sufficient is False:
                return True
        return False

    def generate_provider_action_list(self) -> List[str]:
        """Generates the provider's required responses to an Art.45(4) activation."""
        actions = []
        actions.append(f"Implement corrective measures by {self.corrective_deadline}")
        actions.append("Document all corrective actions in Art.17 QMS records")
        actions.append("Run Art.3(23) substantial modification test on all proposed fixes")
        if self.certificate_suspended:
            actions.append("CRITICAL: Cease market placement — CE marking invalid (Art.49 + Art.16)")
            actions.append("Update Declaration of Conformity (Art.48) — suspend pending certificate restoration")
            actions.append("Notify deployers and distributors of suspension status")
        return actions


@dataclass
class MSACooperationTracker:
    """
    Art.45(5) — Tracks information exchanges between notified body and market surveillance authorities.
    For providers: visibility into regulatory information flows affecting your certificate.
    """
    certificate_reference: str
    msa_requests: List[dict] = field(default_factory=list)
    information_provided: List[dict] = field(default_factory=list)
    joint_investigations: List[dict] = field(default_factory=list)

    def add_msa_request(
        self,
        requesting_msa: str,
        request_date: date,
        information_type: str,
        response_date: Optional[date] = None
    ):
        """Record an Art.45(5) information request from a market surveillance authority."""
        self.msa_requests.append({
            "requesting_msa": requesting_msa,
            "request_date": request_date.isoformat(),
            "information_type": information_type,
            "response_date": response_date.isoformat() if response_date else None,
            "status": "responded" if response_date else "pending"
        })

    def cloud_act_risk_assessment(self, notified_body_headquarters: str) -> dict:
        """
        Art.45(5) + CLOUD Act: Assess whether MSA cooperation requests
        could expose provider technical documentation to US jurisdiction.
        """
        us_linked = notified_body_headquarters.lower() in [
            "united states", "us", "usa"
        ] or "inc." in notified_body_headquarters.lower()

        return {
            "notified_body_headquarters": notified_body_headquarters,
            "us_jurisdiction_risk": us_linked,
            "risk_description": (
                "Technical documentation submitted for Annex VII assessment is held by "
                "this US-linked notified body and may be subject to CLOUD Act compellability "
                "orders independently of Art.45(5) MSA cooperation requests."
                if us_linked
                else
                "EU-native notified body: Art.45(5) information flows remain within EU "
                "jurisdiction and are not subject to CLOUD Act compellability."
            ),
            "mitigation": (
                "Consider designating an EU-native notified body for future assessments. "
                "EU-native PaaS for compliance record storage eliminates dual-jurisdiction exposure."
                if us_linked
                else "Single-regime jurisdiction: Art.45(5) cooperation is fully EU-governed."
            )
        }


class Art45ComplianceAuditor:
    """
    End-to-end Art.45 compliance checker for providers holding Art.44 certificates.
    """
    def __init__(
        self,
        certificate_reference: str,
        notified_body_headquarters: str
    ):
        self.certificate_reference = certificate_reference
        self.information_records: List[NotifiedBodyInformationRecord] = []
        self.non_conformity_cases: List[PostCertificationNonConformityCase] = []
        self.msa_tracker = MSACooperationTracker(certificate_reference)
        self.notified_body_headquarters = notified_body_headquarters

    def audit(self) -> dict:
        """Run full Art.45 compliance audit."""
        reporting_gaps = [
            r for r in self.information_records
            if not r.reporting_compliant()
        ]
        peer_notification_gaps = [
            r for r in self.information_records
            if not r.peer_notification_compliant()
        ]
        active_non_conformities = [
            c for c in self.non_conformity_cases
            if not c.certificate_withdrawn
        ]
        ce_marking_invalid = [
            c for c in self.non_conformity_cases
            if not c.ce_marking_valid()
        ]
        escalation_required = [
            c for c in self.non_conformity_cases
            if c.escalation_required()
        ]

        cloud_act = self.msa_tracker.cloud_act_risk_assessment(
            self.notified_body_headquarters
        )

        return {
            "certificate_reference": self.certificate_reference,
            "audit_date": date.today().isoformat(),
            "art_45_1_reporting_compliant": len(reporting_gaps) == 0,
            "reporting_gaps": len(reporting_gaps),
            "art_45_2_peer_notification_compliant": len(peer_notification_gaps) == 0,
            "peer_notification_gaps": len(peer_notification_gaps),
            "active_non_conformity_cases": len(active_non_conformities),
            "ce_marking_currently_valid": len(ce_marking_invalid) == 0,
            "market_placement_permitted": len(ce_marking_invalid) == 0,
            "escalation_required": len(escalation_required) > 0,
            "msa_requests_pending": sum(
                1 for r in self.msa_tracker.msa_requests
                if r["status"] == "pending"
            ),
            "cloud_act_risk": cloud_act["us_jurisdiction_risk"],
            "cloud_act_detail": cloud_act["risk_description"],
            "overall_status": (
                "CRITICAL" if ce_marking_invalid
                else "ACTION_REQUIRED" if escalation_required or reporting_gaps
                else "COMPLIANT"
            )
        }

Art.45 Compliance Checklist for Providers

While Art.45 directly obliges notified bodies, providers should verify these items to ensure the Art.45 information environment around their Art.44 certificate is correctly managed.

Before Obtaining an Art.44 Certificate

After Certificate Issuance

Ongoing Post-Certification Compliance

If Art.45(4) Is Activated (Notified Body Requests Corrective Action)

Market Surveillance Authority Cooperation


Art.45 for SaaS Developers: The Honest Assessment

If you use Art.43(1) Annex VI internal control: Art.45 does not apply to your compliance obligations. There is no notified body in your conformity chain, so there is no body on which Art.45 obligations fall. You are responsible for maintaining your own Declaration of Conformity (Art.48) and CE marking (Art.49) without a notified body intermediary.

If you use Art.43(2) Annex VII notified body assessment (biometric systems, regulated product safety components, or Commission-mandated track): Art.45 governs the information environment in which your Art.44 certificate lives. Key implications:

  1. Certificate problems are publicly visible: Refusals, suspensions, and withdrawals are reported to the notifying authority (Art.45(1)) and peer notified bodies (Art.45(2)) proactively. Assume any adverse certificate decision is known to regulators within days.

  2. Prior refusals follow you: Art.45(2) cross-notification means shopping for a more accommodating notified body after a refusal is detectable. Disclose prior assessment history.

  3. Technical documentation is EU-wide accessible: Submitted documentation can reach any Member State's market surveillance authority (Art.45(3)). Draft it to withstand multi-jurisdiction scrutiny.

  4. Post-certification compliance is continuous: Art.45(4) means the certificate can be suspended or withdrawn at any point after issuance. Maintained QMS, post-market monitoring, and transparent incident reporting are the ongoing inputs that protect certificate validity.

  5. Choose your notified body jurisdiction carefully: EU-native notified bodies eliminate CLOUD Act exposure for technical documentation submitted for Annex VII assessment. If your notified body is US-linked, the documentation you submitted for assessment may face dual-jurisdiction legal demands independently of your own hosting choices.


See Also