Article 8: Compliance with the Requirements
Article 9: Risk Management System
Article 10: Data and Data Governance
Article 11: Technical Documentation
Article 12: Record-Keeping
Article 13: Transparency and Provision of Information to Deployers
Article 14: Human Oversight
Article 15: Accuracy, Robustness and Cybersecurity