CertifiedData.io
EU AI Act · Article 19

Article 19 Record-Keeping Obligations

Article 19 of the EU AI Act requires providers of high-risk AI systems to retain comprehensive technical documentation for a minimum of ten years following the system's placement on the market. Training data documentation is explicitly within scope.

The Retention Obligation

"Providers of high-risk AI systems shall keep the technical documentation referred to in Article 11, the EU declaration of conformity, and, where applicable, the certificate issued by the notified body at the disposal of the national competent authorities for a period of ten years after the high-risk AI system has been placed on the market or put into service."

— EU AI Act, Article 19(1)

What Article 19 Requires You to Keep

Training dataset documentation

Origin, composition, collection methodology, and pre-processing steps for every training dataset. For synthetic datasets: the generation algorithm, parameters, and a cryptographic fingerprint of the output.

→ Satisfied by CertifiedData certification artifact

Test and validation procedures

The procedures used to evaluate the AI system, including the datasets used and the metrics applied. Results of evaluation runs must be preserved.

Conformity assessment records

For systems subject to third-party conformity assessment: the full assessment documentation, including the notified body certificate and any conditions or limitations.

Technical specifications

Architecture, algorithm design, computational requirements, and system integration details as specified in Article 11 technical documentation.

Post-market monitoring data

Operational performance data and any incidents or anomalies identified during deployment, as required by Article 72.

EU declaration of conformity

The formal declaration that the high-risk AI system meets EU AI Act requirements, signed by the authorized representative.

Why Ten-Year Retention Requires Cryptographic Binding

Ten-year retention creates a unique technical challenge: the documentation must remain verifiable long after the original dataset may be deleted, the generation infrastructure may be replaced, and the organization structure may change. A textual description of what data was used is not sufficient — an auditor needs cryptographic evidence that the described data was actually the data used.

CertifiedData's certification artifacts solve this with a SHA-256 fingerprint embedded in an Ed25519-signed record. Ten years after issuance:

  • The certificate is still retrievable from the public transparency log
  • The Ed25519 signature is still verifiable using the published public key
  • The SHA-256 hash can be recomputed against the stored dataset to prove identity
  • The generation algorithm and timestamp remain immutably recorded

Retention Requirements by Record Type

Record typeMinimum retentionCertifiedData approach
Training dataset documentation10 yearsIndefinite — certificates stored permanently
Test/evaluation records10 yearsOut of scope — managed by provider
Technical documentation (Art. 11)10 yearsOut of scope — managed by provider
Conformity assessment records10 years post-marketOut of scope — managed by notified body
Post-market monitoring logsDuration of deployment + 10yDecision lineage records (separate product)
Transparency log entriesIndefinite (Art. 12)Append-only log — records never deleted

Preparing for a Regulatory Audit

When a national competent authority requests documentation under Article 19, the expected deliverable is the full Article 11 technical documentation package. For training data, this includes:

Certification artifact JSON (via GET /api/certificates/{id})
Transparency log entry (verifiable at /transparency/certificates)
Signing key provenance (/.well-known/signing-keys.json)
Dataset SHA-256 fingerprint + file-level hash (payload.hashes.datasets)
Generation algorithm and parameter record (payload.algorithm_spec)

All of these are available via the CertifiedData API and public endpoints — no authentication required for regulators to independently verify.