Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Cyber Laws & Regulations

U.S. defense article and services trade regulator outlines expectations for global compliance | Hogan Lovells

admin by admin
Dec 20, 2022
in Cyber Laws & Regulations
0 0
A A
0
FacebookTwitterLinkedIn

In December 2022, the U.S. Department of State, Bureau of Political-Military Affairs, Directorate of Defense Trade Controls (“DDTC”), the agency responsible for regulating the brokering, export, reexport, retransfer, and temporary import of defense articles and services, issued International Traffic in Arms Regulations (“ITAR”) Compliance Program Guidelines ( the “Guidelines”) which outlines eight elements DDTC considers to be essential for an effective risk-based compliance program.

Importance of building and maintaining a compliance program

A robust ITAR Compliance Program (“ICP”) ensures that organizations and their staff who engage in ITAR-controlled activities do so in compliance with the ITAR, integrate ITAR requirements into their business and research process, and helps mitigate the risk of the violating the regulations. Criminal and civil penalties for violating the ITAR are severe because such violations may harm U.S. national security and foreign policy objectives. Criminal convictions for willful ITAR violations can result in a maximum criminal penalty of $1 million per violation, and/or imprisonment of up to 20 years. Civil penalties for ITAR violations can result in a fine of more than $1.2 million per violation, and this amount increases annually to adjust for inflation.

Any ITAR violation, regardless of intent, may trigger administrative debarment actions. Debarment renders organizations and/or individuals ineligible to participate directly or indirectly in defense trade. Lastly, DDTC administrative settlements are posted publicly on DDTC’s website, which may result in both negative publicity and reputational damage for the organizations.

Eight key elements of an ITAR compliance program

The DDTC Guidelines set forth the following ICP elements:

  1. Management commitment;

  2. DDTC registration, jurisdiction & classification, authorizations, and other ITAR activities;

Other ITAR activities to be addressed in the ICP include:

  • Restricted party screening

  • Brokering

  • Reporting of political contributions, fees, and commissions

  • Cybersecurity and encryption for the protection of technical data

  1. Recordkeeping requirements;

  2. Detecting, reporting, and disclosing violations;

  3. ITAR training;

  4. Risk assessment;

  5. Audits and compliance monitoring; and

  6. ITAR compliance manual

Holistic compliance program approach

For decades, DDTC has provided guidance on ITAR compliance. DDTC priorities could be gleaned from an overview document called “Compliance Program Guidelines” and guidance and checklists generated in the DDTC acquisition notification process. DDTC has acknowledged that the eight elements in the Guidelines are focused on assisting organizations with ITAR compliance and recognizes that a company’s activities may require compliance with multiple U.S. trade laws and regulations. These obligations are best served when the ICP functions effectively within the context of a holistic trade compliance program.

In May 2019, the U.S. Treasury’s Office of Foreign Assets Control (“OFAC”), the agency responsible for enforcing economic sanctions, published “A Framework for OFAC Compliance Commitments” (“OFAC Framework”) which outlines five components OFAC considers to be essential for an effective risk-based sanctions compliance program. The Hogan Lovells alert on the OFAC Framework is here. In February 2017, the U.S. Bureau of Industry and Security (“BIS”) updated the content of its Export Compliance Guidelines (“BIS Guidelines”). It provides details on the eight elements that BIS has determined are critical for an effective Export Compliance Program under the Export Administration Regulations (“EAR”).

The following elements have been addressed by each of DDTC, BIS, and OFAC in their compliance guidance:

DDTC, BIS, and OFAC aim to ensure that company executives understand and promote corporate compliance through a top-down approach to U.S. trade control compliance. These guidelines are also consistent with those issued by the U.S. Department of Justice (“DOJ”). The Hogan Lovells alert on the DOJ policy is here.

DDTC cybersecurity and encryption concerns

The ITAR does not explicitly require organizations to implement specific cyber security or encryption measures for the storage or transmission of technical data. However, certain exemptions may apply that necessitate encrypted data. The Guidelines contain a dedicated and separate section on cyber intrusion events, and explain that the theft of technical data may result in unauthorized exports. DDTC expects organizations to take steps to protect their technical data from cyber intrusions and theft and consider carefully what cyber security solutions work most effectively for them. This section underscores the importance of this topic to DDTC and other agencies.

DDTC stressed that having specific policies, procedures, and tools for the encryption of technical data is a critical part of cyber security. Organizations should consider both how to encrypt the storage and transmission of technical data externally, and how to appropriately encrypt technical data on portable devices like mobile phones and laptops.

Importantly, Part 126 of ITAR requires organizations to promptly disclose the release of ITAR technical data to a number countries subject to arms embargo such as China. Where a breach is determined, or reasonably suspected, to involve one of these “proscribed” countries, mandatory disclosure requirements are implicated.

DDTC enforcement and practice tips

DDTC will consider the implementation of a risk-based tailored ICP program as a mitigating factor in an enforcement action. A robust ICP will be an important consideration for an organization in settlement or warning letter negotiations.

Whether in the context of an internal investigation or compliance more generally, organizations should encourage employees to report suspected ITAR violations. Further, organizations should regularly update their compliance programs to reflect regulatory changes, learning from published enforcement matters and business developments that trigger compliance reevaluation.

A robust ICP can be helpful in the voluntary disclosure process in demonstrating a commitment to compliance and in describing both the potential violation and how the ICP can be refined in response thereto. The disclosure should include mitigation efforts, such as retraining or reorganization of the responsible business unit(s), and describe any additional planned corrective actions that might address the root causes and prevent the recurrence of similar violations.

Next steps

Companies should review their export control compliance plans and procedures, including:

  • Export jurisdiction and export classification are the cornerstone of an ICP.

  • Registration is required to use certain exemptions under the ITAR, including government contractor work. See Hogan Lovells article on the evolution of the ITAR exemptions for U.S. Government contracts.

  • Registration is also required for domestic companies engaged solely in manufacturing ITAR items.

  • Ensuring that their global ITAR compliance program is up-to-date and reflects the Guidelines and the eight elements

  • Establishing regular training for those responsible for ITAR compliance.

  • Conducting risk assessments and gap analysis exercises to evaluate ITAR compliance, as well as EAR, OFAC and customs regulations compliance as applicable. (Companies should use the helpful audit checklists in the Guidelines which are organized by function.)

Because the DDTC Guidelines are similar to those issued by BIS and OFAC, organizations should expand their policies and procedures to confirm that these elements are captured if they engage in ITAR regulated activities.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Hub Security Announced the Fulfillment of All Conditions Precedent for the Upcoming $1.28 Billion Merger Transaction
Cyber Laws & Regulations

HUB Cyber Security – Updates on Nasdaq Listing and Pipe Investor Change

Why are Company Ransomware Payments Dropping Dramatically? | Kohrman Jackson & Krantz LLP
Cyber Laws & Regulations

Why are Company Ransomware Payments Dropping Dramatically? | Kohrman Jackson & Krantz LLP

EIOPA Supervisory Statement On The Management Of Non-affirmative Cyber Exposures – Insurance Laws and Products
Cyber Laws & Regulations

Ethics & Compliance: Let’s Talk About Cybersecurity – Security

UK Cyber-Crime Agencies Probing Suspected Royal Mail Attack (1)
Cyber Laws & Regulations

Bankman-Fried Wins Texas Ruling as States Go After Lost Funds

Meeting the AI moment: advancing the future through responsible AI
Cyber Laws & Regulations

Meeting the AI moment: advancing the future through responsible AI

NHRC Chief Seeks Stringent Law To Deal With Unlawful Internet Behaviour, Cybercrime
Cyber Laws & Regulations

NHRC Chief Seeks Stringent Law To Deal With Unlawful Internet Behaviour, Cybercrime

Why are Pennsylvania cyber charter schools allowed to have large fund balances?
Cyber Laws & Regulations

Why are Pennsylvania cyber charter schools allowed to have large fund balances?

Gain Control of Business Data to Reduce Costs, Increase Productivity, Inform Decisions, and Improve Security
Cyber Laws & Regulations

Gain Control of Business Data to Reduce Costs, Increase Productivity, Inform Decisions, and Improve Security

SEC suit ‘charts a perilous new course,’ hacked law firm says
Cyber Laws & Regulations

SEC suit ‘charts a perilous new course,’ hacked law firm says

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Understanding the Implications & Guarding Privacy- Axios Security Group

Understanding the Implications & Guarding Privacy- Axios Security Group

Hackers Actively Using Pupy RAT to Attack Linux Systems

Hackers Actively Using Pupy RAT to Attack Linux Systems

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.