Chapter 4|Supervision, Investigation, Enforcement and Monitoring of VLOPs and VLOSEs|đ 5 min read
1. In order to carry out the tasks assigned to it under this Section, the Commission may conduct all necessary inspections at the premises of the provider of the very large online platform or of the very large online search engine or other persons referred to in Article 67(1).
2. Officials and other persons authorised by the Commission to conduct an inspection are empowered to:
(a) enter any premises, land and means of transport of the provider or other persons subject to inspection;
(b) examine books and other records irrespective of the medium on which they are stored;
(c) take or obtain in any form copies or extracts from such books or records;
(d) require the provider, other persons or their representatives to provide access to, and explanations on, its organisation, functioning, IT system, algorithms, data-handling and business practices;
(e) seal any business premises and books or records for the period and to the extent necessary for the inspection.
[Note: Article 69 has 10 paragraphs total. Paragraphs 3-10 address: prior consultation with establishment DSC, decision requirements and content, sealing justifications, Member State assistance obligations, judicial authorization procedures for premises entry, national court review scope and limitations, inspection process, notice requirements, and penalties for obstruction.]
Understanding This Article
Article 69 grants Commission its most powerful and intrusive investigatory toolâphysical on-site inspections of VLOP/VLOSE premises and third-party locations, often called 'dawn raids' in competition law context. Addresses evidential challenge: sophisticated compliance violations may be hidden in digital systems, internal communications, algorithmic code, database configurations, and organizational practices that Article 67 information requests cannot fully uncover because providers control what documents they produce and may sanitize, withhold, or destroy incriminating evidence. Unannounced inspections with surprise element prevent evidence destruction, enable examination of systems in operational state, allow inspectors to access complete unfiltered records including materials providers wouldn't voluntarily disclose. Inspection powers extremely broad: enter any premises/land/transport, examine all records regardless of format (paper, digital, cloud), copy/extract documents, require system access and explanations, seal premises preventing evidence tampering. Targets algorithmic systems and technical infrastructure: Article 69(2)(d) empowers Commission to access IT systems, examine algorithm source code, review data-handling processes, require technical explanationsâcritical for investigating Article 27 recommender transparency, Article 35 algorithmic risk mitigation, Article 38 recommender system design. Procedural safeguards balance enforcement power with fundamental rights: DSC consultation requirement, judicial authorization when needed, national court proportionality review, clear decision requirements, sealing justificationsâpreventing arbitrary inspections while enabling legitimate investigations.
Inspection Scope and Powers - Paragraphs 1-2: Commission can inspect 'premises of VLOP/VLOSE provider or other persons referred to in Article 67(1)'âsame broad third-party scope as information requests including auditors, service providers, business partners, anyone with relevant information. 'All necessary inspections' grants discretion to Commission determining inspection necessity based on investigation needs. Five specific powers (paragraph 2): (a) Premises entryâany business premises (offices, data centers, content moderation facilities), land (owned or leased property), means of transport (vehicles, aircraft, vessels if relevant to investigation); (b) Records examinationâ'books and other records irrespective of medium'âpaper documents, digital files, databases, cloud storage, email systems, instant messaging, source code repositories, version control systems, backup archives; (c) Copying/extractingâ'in any form'âphotocopies, digital copies, forensic images of servers/devices, screenshots, photographs, printouts enabling offline analysis; (d) System access and explanationsâmost critical for VLOP investigations: 'access to IT system' means inspectors can examine servers, databases, algorithm deployment environments, content moderation tools, live operational systems; 'algorithms' access enables code review, parameter examination, training data inspection; 'data-handling' includes data flows, processing logic, storage architecture; 'explanations' requires technical staff to walk inspectors through systems describing functionality, design rationale, operational procedures; (e) Sealing powerâcan seal premises or records preventing access by provider while inspection ongoing or pending Commission analysis, prevents evidence destruction/alteration during multi-day inspections or between inspection and document review, requires justification and proportionality given business disruption.
DSC Consultation and Member State Assistance: Full Article 69 text (paragraphs 3-10) requires: Commission must consult DSC of establishment before deciding inspection providing opportunity for DSC input on investigation approach and proportionality; inspection decision must state subject matter/purpose/date/penalties for obstruction/judicial review rights; Member States must provide inspection assistance including coercive measures if provider refuses entryânational police or authorities can force premises access executing Commission decision; when inspection requires premises entry against will (anticipated resistance), Commission must obtain prior national judicial authorization protecting fundamental rights against arbitrary search; national judge verifies inspection decision authenticity and proportionality (not arbitrary or excessive) but cannot question necessity or review Commission's case assessmentâlimited procedural review not substantive investigation oversight; provider may refuse inspection without judicial authorization but then Commission obtains authorization for subsequent attempt; obstructing inspection triggers Article 74 fines (up to 1% turnover) and Article 76 periodic penalties compelling cooperation.
Key Points
Commission may conduct necessary inspections at VLOP/VLOSE premises and third parties
Most intrusive investigatory power similar to competition law dawn raids
Officials authorized to enter any premises, land, and means of transport
Can examine books and records regardless of storage medium
Can copy or extract documents in any form
Can require access to and explanations of organization, IT systems, algorithms, data-handling, business practices
Can seal business premises and records for period and extent necessary for inspection
Commission must consult DSC of establishment before inspection decision
Member States must provide assistance including coercive measures if needed
National courts can verify decision authenticity and proportionality when judicial authorization required
Judicial review protects against arbitrary inspections and fundamental rights violations
Non-compliance triggers Article 74 fines and Article 76 periodic penalties
Enables direct examination of code, databases, and internal communications
Critical for investigating algorithmic transparency and systemic risk compliance
Balances enforcement effectiveness with procedural safeguards
Supports Commission's VLOP supervision with powerful evidence-gathering tool
Practical Application
TikTok Algorithm Inspection: Commission investigating TikTok Article 35 systemic risk mitigation decides on-site inspection necessary. Commission consults Irish DSC and issues inspection decision. Inspection team arrives at Dublin offices. Inspectors access algorithm deployment servers, review source code repositories, copy training data and parameters, inspect content systems, require engineer explanations, and access internal communications. Inspection reveals algorithm prioritizes engagement over safety with insufficient misinformation detectionâevidence for Article 73 non-compliance finding.
Meta Content Moderation Inspection: Commission inspects Meta's Dublin moderation center with Irish DSC assistance. Inspectors observe real-time operations, examine moderation software, access decision databases, review training materials, and interview moderators. Inspection reveals performance metrics prioritizing speed over accuracy and inadequate quality assuranceâcontradicting Meta's Article 14 compliance documentation.
Judicial Authorization Example: Commission decides to inspect X's Polish offices. X signals resistance. Commission obtains judicial authorization from Polish court. Court verifies authenticity and proportionality. Commission executes inspection with law enforcement assistance examining crisis protocols and communications.
For Commission: Plan inspections meticulously. Consult establishment DSC. Determine judicial authorization needs. Assemble technically skilled teams. Execute surprise inspections when appropriate. Document thoroughly. Use sealing power strategically. Coordinate with Member State authorities.
For VLOPs/VLOSEs: Maintain compliance readiness. Train staff on inspection procedures. Designate response teams. Prepare premises for access. Avoid evidence destruction. Cooperate constructively. Document inspections. Consider legal advice.
For Member States: Allocate support resources. Train DSC officials. Establish judicial authorization processes. Provide coercive measures if needed. Ensure national laws compatible with Commission requirements.