The International Trade Blog arrow Export Compliance

10 Tips for Applying Export Controls to Your Technical Data

On: March 30, 2015    |    By: Julie Gibbs Julie Gibbs    |    5 min. read

10 Tips for Applying Export Controls to Your Technical Data | Shipping SolutionsThe U.S. government controls exports of sensitive equipment, software and technology for reasons of national security and foreign policy objectives. While most people understand that these regulations apply to physical objects that may be exported, they don’t always understand that these same requirements may also apply to their data.

Because of its very nature, ensuring compliance with export regulations for your company’s data can present some special challenges. Physical objects can be locked in a room. Data can reside in multiple places at once and can move from point A to point B in an instant.

OK, I’ll admit it, I don’t have any tricks for applying export controls to your technical data, but I do have some tips. All companies, large and small, must understand where controlled data resides in hard or soft copy and what type of access controls need to be put in place to protect it from an unauthorized export—deemed export or otherwise.

Identifying Technical Data

There’s technical data everywhere, so how do you properly identify it and how do you know if it’s controlled for export purposes? Are we talking about just the proprietary secret sauce or is there more to it? Unfortunately, it depends; specifically it depends on whether we are talking about the Export Administration Regulations (EAR) or the International Traffic in Arms Regulations (ITAR).

There are strict regulations regarding export compliance. Download this free  whitepaper to make sure you know what's required of you.

The EAR is more explicit in the definition of controlled technical data than the ITAR. The EAR defines controlled technical data as an export of technology that is required for the “development, production or use” of items on the Commerce Control List is controlled according to the provisions in each product category.

1. Read the ECCN Classification

Be sure you actually read the ECCN classification that applies to your product. Don’t assume that the ECCN classification applies to all three aspects of technology—development, product and use. Sometimes it’s just development and production technology that’s controlled. And there are cases such as ECCN 9E515 that calls out specific information such as “failure analysis.”

2. Understand "Required"

The definition of Required in Part 772 of the EAR “refers to only that portion of ‘technology’ or ‘software’ which is peculiarly responsible for achieving or exceeding the controlled performance levels, characteristics or functions.” This definition could help eliminate technical data that is more benign in nature from being controlled.

The ITAR, on the other hand, does not define required, so you must assume it’s any information required for the design, development, production, manufacture, assembly, operation, repair, testing, maintenance or modification of a defense article.

3. Inventory Technical Data Storage

Work with IT to obtain an entire list of software applications, servers, cloud services, FTP sites, and other external facing tools (i.e. web conferencing services) to determine how controlled technical data could be stored or shared. Once you’ve done that, work with your development and production engineers, sales and marketing staff, and customer support personnel to find out what types of technical data is stored or shared on these systems.

4. Broaden Your Review of Data

In tip number 3, ask about all types of technical data. Just because marketing has decided to post information on your internet site doesn’t make it publicly available for export regulation purposes. And your customer support group shouldn’t be able to access controlled technical data such as a design diagram and send it to anyone who asks.

5. Control Access to Technical Data

Use automated controls for segregating controlled technical data. Once you identify what needs to be controlled, it’s time to make sure not just anyone can access it. SharePoint, share drives, and other databases need to have permissions established at a user level.

Theoretical access to controlled technical data is still a violation for foreign nationals who would otherwise require an export license for access. So, even though a foreign national has no reason to access controlled data or has never accessed controlled data, it’s still considered a violation if they could have theoretically accessed it.

Larger exporters and certainly ITAR- and defense-related companies might want to consider rights/entitlement management software that will identify and block controlled technical data from being emailed or downloaded from a laptop to a USB memory device.

6. Label Controlled Data

All controlled technical data should be marked as such to any extent possible. This means adding verbiage such as “EAR Controlled Technology” or “ITAR Restricted Technology” to each page of your document or picture files in both soft and hard copy. Any external storage such as CDs, DVDs or USB memory devices must be marked as well.

A more thorough statement might be warranted if your company shares controlled technical data with contract manufactures or other partners who require it. We’ve even seen companies mark documents with the ECCN classification to be extra diligent.

Unsure how the entire export process works? Download this free guide: Export  Procedures and Documentation: An In-Depth Guide.

7. Create a Technology Control Plan

Include a Technology Control Plan (TCP) within your company's Export Management and Compliance Program (EMCP). Both the Bureau of Industry and Security (BIS) and the Directorate of Defense Trade Controls (DDTC) will expect you to have one in place, and it’s best if you partner with your IT and security departments to create it. The TCP describes physical and automated methods of restricting access to areas that contain controlled technical data.

Even if no foreign personnel access is planned, your company still needs formal, written internal controls to prevent unauthorized access by any foreign persons on company premises or by electronic means. This means a full description of physical building and site security (e.g. gates, badges, secured entry/exits, locked file cabinets, etc.) where controlled technical data exists, as well as the applications, servers and back up devices where the data is stored.

8. Control Travel with Technical Data

Don’t let your engineers (or anyone else for that matter) travel with controlled technical data unless there is an export license or other government authorization in place. Your company might have procedures for hand carrying tools of the trade (e.g. laptops, PDAs, smartphones, etc) through customs, but many companies forget that the data on these devices could be subject to export regulations.

If an employee will be travelling with controlled technical data, make sure the files and folders are encrypted and non-essential controlled technical data is removed altogether.

9. Provide Training

Include a technical data section in your annual company-wide export training. People need reminders that they should not be emailing or sending controlled technical data by FTP—even internally—unless there are secure methods being used and the recipient is authorized. This is also a great opportunity to remind your sales team that trade show materials and other marketing documents should be scrutinized for controlled technical data information prior to the show.

10. Audit Your Procedures

Include a section in your next export audit for ensuring controls are in place for accessing controlled technical data. Make sure system owners get approval from trade compliance for adding or changing access permissions for foreign nationals. Also check to see if any cloud computing, offshore IT, or contract manufacturing agreements have been put in place since the last audit and what controls have been put in place if necessary.

I hope these tips have triggered at least a few ideas to strengthen your export compliance program. Controlled technical data is an area every company needs to address, even if you are not a direct exporter. It can be a painful process to add access controls, but having a TCP and EMCP in place will help ensure that a company-wide effort is employed and you’re not alone in the effort!

 

Julie Gibbs

About the Author: Julie Gibbs

Julie has been working in the logistics and trade compliance industry since 1991. Since joining BPE Global in 2007, she has had a wide variety of experience in creating import and export compliance programs for companies of all sizes. This includes creating and implementing import and export policies and procedures, providing classification services including encryption items, establishing restricted party screening and deemed export programs, providing C-TPAT and ISA support, implementing trade compliance software, creating foreign trade agreement certification programs and performing internal audits.

Julie has been a licensed customs broker with CBP since 1997. Prior to joining BPE Global, Julie was Director of Product Management and Professional Services at Ensenda, a carrier management and "last mile" logistics service provider.

Julie has served on the board of WIT-NC as Vice President and Treasurer. Julie holds an M.B.A. from Santa Clara University and a B.A. in Business Economics from U.C. Santa Barbara.

An Export Compliance Program will help your company avoid export violations.

If you haven’t written down your company’s export procedures, chances are that something is slipping through the cracks. Our whitepaper helps you know what to include in your written ECP and where to go for free assistance.

Download Now

How to Create and Implement an Export Compliance Program | Shipping Solutions
email

Subscribe to the Newsletter!

Join the 33,143 other exporters and importers who get the latest news, tips and insights from international trade professionals.