The Digital Omnibus Gamble: How to Plan the AI Act Deadline
Some engineering roadmaps assume that EU AI Act compliance work can wait until 2027.
For organisations that build or operate high-risk AI systems in scope of the Act, that is a fragile assumption.
Aside: If you are unsure whether your system is high-risk, start with our EU AI Act engineering guide; it sets out how the Act classifies systems and when Annex III high-risk obligations apply.
If you do operate a high-risk AI system, read on.
Subscribe to our blog
Receive insights on agentic AI, compliance, and automation in regulated industries.
No spam. Unsubscribe at any time.
Under the AI Act as it stands, the high-risk obligations in Articles 9 to 15 apply from 2 August 2026.
The proposed 'Digital Omnibus' (an EU Commission package intended to make parts of the EU's digital rulebook cheaper and simpler to comply with, without changing the headline policy goals) may shift that practical deadline for parts of the high-risk regime towards December 2027.
That possibility is already prompting a familiar question at leadership level:
"Do we slow down and wait for certainty?".
The more defensible posture is to treat any extension as additional execution margin, not as the foundation of the plan.
The difference between August 2026 and December 2027 affects hiring, platform investment, CI/CD, release controls, audit readiness, and enterprise sales cycles. It does not materially change the underlying work.
Or in other words, the Omnibus adjusts timing but it does not reduce scope.
What the Omnibus actually changes
The Omnibus does not rewrite the AI Act. It primarily adjusts timing and attempts to reduce friction where obligations would otherwise apply before harmonised standards are available.
Under the current law, Articles 9 to 15 apply from 2 August 2026, regardless of whether harmonised standards are ready.
The Omnibus proposes:
- For Annex III high-risk systems: compliance six months after harmonised standards are published, with a backstop of 2 December 2027
- For Annex I product-safety systems: twelve months after standards, with a backstop of 2 August 2028
- Everything else stays the same: prohibited practices, GPAI obligations, classification rules, penalties, and extraterritorial scope.
If the Omnibus passes you will gain time, but you will not gain reduced scope for compliance.
The legislative timeline
The ordinary EU legislative procedure typically runs 18 to 36 months. The Omnibus has not yet completed Parliament and Council positions, and final adoption before August 2026 would be unusually fast.
There are therefore broadly three plausible outcomes:
- It passes before August 2026
- It passes after August 2026
- It stalls or is materially amended
In two of those three scenarios, the August 2026 obligations apply on the current timetable.
A risk-weighted planning baseline is therefore quite straightforward.
The engineering decision
Plan for August 2026 and architect so that December 2027 becomes the contingency only.
This is less about pessimism and more about execution risk. If the plan assumes 2027 and the extension fails or arrives late, architectural change is compressed into emergency cycles and the organisation pays for that compression in quality, delivery risk, and audit exposure.
If the plan assumes 2026 and the deadline moves, the organisation gains schedule buffer whilst completing the same engineering work.
Where the real work sits
The AI Act is not, in practice, a documentation exercise. The highest-effort items are infrastructure and system design changes, and the evidence you need is only credible when it is derived from system state.
Logging is the long pole
Article 12 record-keeping is consistently the most expensive retrofit when left late.
If a high-risk decision cannot be reconstructed end-to-end, the system is exposed in precisely the scenarios regulators care about.
The practical questions are concrete:
- Do you capture model version, input, output, and decision context for each event?
- Are the logs structured and queryable, with integrity and retention aligned to risk exposure?
- Can you generate an audit trail without manual assembly?
If the answer is No, the deadline debate is secondary because logging becomes the constraint.
Documentation must be generated, not written
Annex IV requires structured technical documentation across nine categories. Organisations that assume they can write this as a one-off exercise in 2027 tend to discover, late, that the hard part is keeping it current as the system changes.
The pragmatic approach is documentation-as-code: derive it from infrastructure-as-code, extract it from model registries and evaluation stores, version it alongside releases, and generate it as part of CI/CD (because manually authored compliance documentation scales poorly and decays quickly).
Risk management must gate deployment
Article 9 describes a risk management system, not a policy file. In engineering terms, the test is whether releases can fail when risk thresholds are breached.
If deployment never blocks on model behaviour, drift, or evaluation failures, the risk management system is advisory rather than operational. That remains an exposure issue regardless of which timetable ultimately applies.
Human oversight is product design
Article 14 is often treated as governance. In practice, it is product and interface design.
The requirements are practical: override pathways exist and are usable; overrides are logged; reviewers have meaningful context; escalation routes are defined. Oversight that only exists in governance documentation tends not to survive contact with production.
The budget illusion
Assuming December 2027 can feel fiscally conservative, but the financial dynamics often run the other way.
If the plan assumes 2027 and the extension fails or arrives late, work compresses into reactive delivery; contractor spend rises, defect rates increase, and audit exposure spikes. If the plan assumes August 2026, costs distribute over multiple quarters, architecture changes integrate into the product lifecycle, procurement friction reduces, and any extension becomes schedule buffer.
The Omnibus affects timing, not total effort. Delaying does not reduce the work; it concentrates it.
Commercial pressure arrives first
Enterprise customers are already pricing regulatory risk into procurement. It is increasingly common for due diligence to ask for evidence of logging architecture, risk management controls, technical documentation samples, and governance structures. Many buyers will not wait for enforcement dates because they are managing their own exposure now.
If your roadmap assumes compliance in 2027 but a customer expects credible controls in 2026, credibility is lost well before a regulator becomes involved. The commercial clock tends to run ahead of the regulatory clock.
The real risk: waiting
The largest avoidable risk is not enforcement itself; it is organisational hesitation.
Compliance architecture touches logging pipelines, data governance, CI/CD controls, monitoring systems, and documentation workflows. These are quarter-scale initiatives. Teams that wait for legislative certainty often attempt, under pressure, to do in weeks what should have taken months, and that is how technical debt becomes regulatory debt.
What the Omnibus does not change
It is worth being explicit about what the Omnibus leaves untouched, because timeline debates can obscure the substance.
Prohibited practices remain prohibited. Article 5 prohibitions on social scoring, manipulation, exploitation of vulnerabilities, and certain biometric uses have been in force since February 2025.
GPAI obligations remain on their current timeline. Articles 51 through 56 took effect in August 2025.
The classification system is unchanged. Annex III still defines the same high-risk use cases. If your system is high-risk today, it will be high-risk after the Omnibus.
The substance of Articles 9 through 15 is unchanged. Risk management, data governance, technical documentation, logging, transparency, human oversight, accuracy, and robustness requirements remain the same.
Penalties are unchanged. Up to 35 million EUR or 7% of global turnover for prohibited practice violations, up to 15 million EUR or 3% for high-risk violations.
Extraterritorial scope is unchanged. If your system's output affects people in the EU, you are in scope.
The standards gap is real regardless
Even if the Omnibus passes, the underlying problem it addresses does not disappear. It becomes more manageable, not irrelevant.
The AI Act defines obligations in legal language that requires technical translation, and the harmonised standards that should provide that translation are not yet available. This is not unprecedented. The GDPR's "appropriate technical and organisational measures" language required years of case law and guidance to operationalise.
The difference is that several AI Act obligations are technically specific. Article 12 record-keeping, Article 9 risk management, and Annex IV documentation describe engineering artefacts with enough specificity to build against, even without harmonised standards.
Build against the legal text and published guidance, then plan to update when finalised standards arrive. This is compliance-as-architecture: requirements are built into the system so it is compliant by construction, rather than relying on retrospective documentation.
What to do now
Plan for August 2026, and benefit from December 2027 if it arrives.
Concretely, this means starting or accelerating work in three areas.
Logging and audit trails. If your production AI system does not capture structured decision traces with enough fidelity to reconstruct any decision end-to-end, this is usually the highest-priority retrofit. We built @systima/aiact-audit-log specifically for this; it provides Article 12 logging infrastructure so your team can focus on defining which events are relevant for your system.
Technical documentation. Annex IV requires documentation across nine categories. Most of this can and should be generated from system state. The gap between what a typical codebase already contains and what Annex IV requires is often smaller than teams assume, but it still needs to be made explicit and kept current.
Risk management gates. If your CI/CD pipeline does not include evaluation gates that can block deployment when risk thresholds are breached, you do not have a risk management system in the Article 9 sense. Define thresholds for your highest-risk failure modes and implement them as enforceable pipeline gates.
The work is bounded and the requirements are known. The deadline is August 2026 or later, not earlier. The high-risk strategy failure mode is postponement.
Systima works with engineering teams to design and implement compliance architecture for the EU AI Act. If your team is navigating Omnibus uncertainty and needs to make architectural decisions now, we can help.