ITAR / EAR Security Briefing Company Overview March 12, 2015 - - PowerPoint PPT Presentation

itar ear security briefing
SMART_READER_LITE
LIVE PREVIEW

ITAR / EAR Security Briefing Company Overview March 12, 2015 - - PowerPoint PPT Presentation

ITAR / EAR Security Briefing Company Overview March 12, 2015 INTRODUCTION ITAR & EAR Training For Employees Working with ITAR &EAR Controlled Technology I nternational E xport T raffic in A dministration A rms R egulations R


slide-1
SLIDE 1

Company Overview – March 12, 2015

ITAR / EAR Security Briefing

slide-2
SLIDE 2

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing ITAR & EAR Training For Employees Working with ITAR &EAR Controlled Technology

INTRODUCTION Export Administration Regulations International Traffic in Arms Regulations

slide-3
SLIDE 3

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

Cumbernauld, Scotland

NATIONAL SECURITY

Something of Value… Country Job Freedom Family

slide-4
SLIDE 4

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

TYPES OF NATIONAL SECURITY INFORMATION Unclassified Sensitive Information

SECRET

CONFIDENTIAL

TOP SECRET

RESTRICTED FOR OFFICIAL USE ONLY NATO CNWDI COMSEC

slide-5
SLIDE 5

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

TWO LISTS GOVERNING EXPORTS

USML: US Munitions List

Administered by the Department of State with concurrence of the Department of Defense

Defense Articles and Defense Services items controlled under the ITAR

Items controlled under USML (categories I-XXI) CCL: Commerce Control List

Administered by the Department of Commerce under the Bureau of Industry and Security

Commercial items controlled for export under the EAR

Items controlled by ECCN (numeric, alpha, numeric numbers – i.e. example: 3A001,5A991,3A611.y

slide-6
SLIDE 6

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

ITAR SECURITY BRIEFING

What is ITAR?

Procedures for processing ITAR orders & handling technical data

Reporting obligations and requirements

slide-7
SLIDE 7

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

ITAR IS…

International T raffic and Arms (ITAR) controls defense articles, defense services, and related technical data, including most non-sporting weapons

Protecting ITAR Information to protect the War Fighter

Regulated by the Department of State Directorate of Defense T rade Controls(DDTC)

Insures Arms and Protected T echnology does not fall into the wrong hands

slide-8
SLIDE 8

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

WHO IS A U.S. PERSON?

US citizen

Permanent resident with a “green card”

Designated an asylee or refugee

A temporary resident under amnesty provisions

Entity incorporated to do business in the U.S.

* but the company itself may have foreign persons employees

Under ITAR 22 CFR § 120.15

= U.S. PERSON

slide-9
SLIDE 9

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

WHO IS A FOREIGN PERSON

A “Foreign Person” is:

Not a U.S. citizen, permanent resident, or protected person (political asylee)

Definition of “person” includes corporations and other business associations, as well as natural persons Why is this important?

Deemed Exports

Physical or electronic access to technical data by foreign national in the U.S.

Oral exchanges of information in the U.S.

Visual inspection by foreign national of U.S.-origin equipment and manufacturing operations

Observations by foreign persons of application to situations of personal knowledge or technical experience

I-129 Forms

Under ITAR 22 CFR § 120.16

slide-10
SLIDE 10

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

WHAT IS “TECHNICAL DATA”?

Information required to design, develop, produce, manufacture, assemble, operate, repair , test, maintain or modify defense articles, e.g.:

  • Blue prints
  • Drawings
  • Photographs
  • Instructions
  • Plans
  • Documentation

Classified information relating to defense articles and defense services on the USML and 600 series items controlled by the Commerce Control List

Information covered by an Invention Secrecy Order

Software directly related to a defense article

120.45(f)Software includes but is not limited to the system functional design, logic flow, algorithms, application programs, operating systems, and support software for design, implementation, test, operation, diagnosis and repair

But does not include information in the public domain

Under ITAR 22 CFR § 120.10

slide-11
SLIDE 11

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

TECHNOLOGY TARGETS

Electronic Systems and Subsystems

Integrated Circuits

Radar Electronics

Guidance & Navigation Electronics

Collection Methods

Phishing Requests

Screen Photos with Cell Phone

Image Drives in Conference Room

Stealing Data on Laptop in Hotel Room

slide-12
SLIDE 12

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

ITAR COMPLIANCE TIMELINE

Corporate Systems Transition

Network Bridge Server Upgrade Cameras Badge Readers Badge Upgrade Molex Email Accounts & Intranet Upgrade ITAR Technical Data Security Training Physical Security Training Watch Dox Training Veronis Training Universal PDM Tool Training

ITAR Training Requirements

slide-13
SLIDE 13

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

WHO RECEIVES ITAR TECHNICAL DATA ACCESS? PERMISSION

Administrative action, usually involving a USA Person check and permission granting by your supervisor

NEED TO KNOW

Duties and projects that require you to work with ITAR sensitive material

+ =

slide-14
SLIDE 14

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

ITAR DATA SECURITY PRACTICES

 Vigilance

Security Awareness  Training

Formal

Impromptu  Standard Procedures

Working with

T ransmitting (Can’t be emailed as it is stored in the Cloud)

Securing

slide-15
SLIDE 15

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

WHAT IS EAR?

 Export Administration Regulations  Administered by The Department of Commerce  In essence, the EAR control any item warranting control

that is not exclusively controlled for export, reexport, or transfer (in-country) by another agency of the U.S. Government or otherwise excluded from being subject to the EAR pursuant to Sec. 734.3(b) of the EAR.

 Controls Dual-use items* * dual-use" item is one that has civil applications as well as terrorism and military or weapons of mass destruction (WMD)-related applications

slide-16
SLIDE 16

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

WHAT IS CONTROLLED TECHNOLOGY UNDER THE EAR?

The US Export Administration Regulations define technology under the EAR §772 as:

“T echnology” – is specific information necessary for the “development,” “production,” or “use” of a product. The information takes the form of “technical data” or “technical assistance.”

“T echnical assistance” may take forms such as instruction, skills training, working knowledge, consulting services.

“T echnical data” may take forms such as blueprints, plans, diagrams, models, formulae, tables, engineering designs and specifications, manuals and instructions written or recorded on other media or devices such as disk, tape, read-only memories.

Under the Export Administration the releasing of controlled technology to a foreign person is informally referred to as a Deemed Export. Release of controlled technology to foreign persons in the U.S. are "deemed" to be an export to the person’s country or countries of nationality

slide-17
SLIDE 17

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

DEEMED EXPORT UNDER THE EAR

 T

echnology is "released" for export when it is available to foreign nationals for visual inspection (such as reading technical specifications, plans, blueprints, etc.); when technology is exchanged

  • rally or electronically or when technology is

made available by practice or application under the guidance of persons with knowledge of the technology

slide-18
SLIDE 18

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

HOW DO I MANAGE CONTROLLED TECHNOLOGY?

TRAINING-AWARENESS

PROPER IDENTIFICATION/CLASSIFICATION

  • Determine jurisdiction -subject to the ITAR or EAR?

TECHNOLOGY CONTROL PLAN (TCP) Develop and implement T echnology Control Plan

Company wide, project specific, or employee specific?

CONTRACT CLAUSES - Include robust export compliance clause in

relevant contract or obtain compliance certifications

Each party to retain responsibility for compliance with export control and economic sanctions laws

Require parties to provide notice prior to transferring controlled items

slide-19
SLIDE 19

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

SECURITY PROCEDURES AND DUTIES

It is your personal responsibility to know that the person you are dealing with is both properly permissioned and has a need to know

You must never reveal or discuss ITAR ,EAR or Sensitive/controlled technology information with anyone other than those that are properly permissioned and have a need to know

slide-20
SLIDE 20

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

PROTECTION OF ITAR & EAR INFORMATION:

Make sure secure Screen Saver installed and working (if not submit helpdesk request)

Know and use correct email procedures for ITAR &EAR sensitive data transmission Always use ZIP and encrypting before sending ITAR & EAR sensitive data to customers and vendors

slide-21
SLIDE 21

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

SALES

CURRENT ITAR DATA FOLDER STRUCTURE

ITAR Data Folder Structure: Appendix C X:\ ITAR JOB FILES QUOTES ENGINEERING WIP DEVELOPMENT PROJECTS PROCESS

slide-22
SLIDE 22

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

FUTURE TOOL – RECEIVING/TRANSMITTING ITAR DATA

Use current encryption process

slide-23
SLIDE 23

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

CONTROL OF CUSTOMER DATA POLICY AND PROCEDURE

slide-24
SLIDE 24

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

UNDERSTAND YOUR RESPONSIBILITIES!

slide-25
SLIDE 25

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

UNDERSTAND YOUR RESPONSIBILITIES!

Minor Violations MAY Include:

Verbal Counseling

Written Counseling

Suspension/T ermination Major Violations MAY Include:

Same as minor violations

Arrest

Imprisonment or fines

slide-26
SLIDE 26

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

YOU MUST REPORT…

Loss, compromise, (or suspected loss or compromise) of ITAR Sensitive or proprietary information

IF YOU SEE SOMETHING SAY SOMETHING TO YOUR MANAGER

slide-27
SLIDE 27

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

YOU MUST REPORT…

All suspicious contacts with known or suspected intelligence officers from any country, or any contact which suggests the employee may be the target of an attempted exploitation by the intelligence services of another country

REPORT TO YOUR MANAGER

slide-28
SLIDE 28

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

YOU MUST REPORT…

If at any time you are UNSURE about what you can or can’t do

ASK YOUR MANAGER

How can I help?

slide-29
SLIDE 29

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

SUMMARY

Ensure that you are suitably trained to administer the requirements of the ITAR or EAR Protecting ITAR or EAR Information to Protect the War Fighter

slide-30
SLIDE 30

Company Overview – March 12, 2015 ITAR, EAR Controlled Technology and Security Briefing

PROTECTION OF ITAR & EAR INFORMATION:

STOP THINK ASK

slide-31
SLIDE 31

ITAR & EAR Compliance Questions?

» Joe Bagliere

(805) 383-8490 joe.bagliere@molex.com Office: Email: Compliance & Contract Manager

THANK YOU!

Contact ISI to engage on your next project:

» Bob Garon

(630) 707-0991 bob.garon@molex.com Cell: Email: Midwest USA

» Brian Witzen

(919) 633-0798 brian.witzen@molex.com Cell: Email: Eastern USA (714) 993-9618 (714) 261-3733 dave.gagnon@molex.com Office: Cell: Email: Western USA

» Dave Gagnon

741 Flynn Road / Camarillo, California 93012 (805) 482-2870 www.ISIPKG.com Address: Phone: Website: