Export Control Compliance Sharing Sensitive Technologies Between International Affiliates General Concepts and Transfer Patterns

Similar documents
Export Controls: What s the Difference?

U.S. Export Regulations

ITAR and the Supply Chain: Getting Stuck in the Middle

EXPORT CONTROLS and EMBARGOES: SOME BASICS FOR ALL

SUBJECT: Effective Date: Policy Number: Export Control 3/22/ Supersedes: Page Of

Export Control Regulations Business Services

Introduction to Export Control Compliance: Awareness and Education

Export Management System DRAFT

Understanding ITAR and the Future of Export Controls on Advanced Textiles

University Compliance & Integrity U.S. EXPORT CONTROLS IMPACT ON RESEARCH AND RELATED UNIVERSITY OPERATIONS

Export Control Information

Deemed Exports. May 22, 2006 Notice in Federal Register on (DEAC)

EXPORT CONTROL. Policy Statement. Reason for Policy. Who is Governed by this Policy

DOES ITAR REGULATE MY BUSINESS?

Export Control Review Information for Hiring/Hosting Departments and Supervisors

International Traffic in Arms Regulations/ Export Administration Regulations. Nadcap ITAR/EAR Information - 1 -

THE UNIVERSITY OF TEXAS RIO GRANDE VALLEY EXPORT COMPLIANCE PROGRAM MANUAL

International Traffic in Arms Regulations Government and Corporate Perspectives

Export Controls and Sanctions Compliance

Kris West Associate VP for Research Director, Office of Research Compliance. 8/18/2011 Office of Research Compliance 1

2010 Joint Armaments Conference, Exhibition & Firing Demonstration Update to ITAR Export Controls

EXPORT CONTROL MANAGEMENT PROGRAM

UH Office of Export Controls (OEC) Jennifer Halaszyn Export Control Officer

EXPORT REVIEW PROCEDURES GUIDE

Export Control Reform Initiative 17 May George Mason University ITRN

Export Control Reform Spacecraft/Satellites

ITAR Deal With It Before It Deals With You

Export Control Regulations

September Texas A&M University-Kingsville Export Controls Compliance Program Manual Page 1 of 64

Export Controls What are they, and how do they affect me?

Export Controls: Limits of the. Exclusion 1/17/2013. Overview. Key Terms

Complying with the ITAR: A Case Study (WS933)

ITAR FOR DEFENSE INDUSTRY EXECUTIVES. June 12, Thomas McVey Williams Mullen Washington, DC (202)

Many of these activities are conducted through formal and informal cooperation with both foreign and domestic institutions.

The first question to ask when doing an export control jurisdictional analysis is What is the it at issue?

Where Biosecurity, Biosafety, and Export Controls Regulations Meet Traliance LLC

ITAR FOR DEFENSE EXECUTIVES

Getting you started What we will cover

DDTC Issues Overly Expansive Interpretation of the ITAR for Defense Services (and Presumably Technical Data)

Princeton University Export Control Management Plan

SI Checklist for Export Control For Sponsored Projects and International Activities

9/11/2015. Navigation in the Meeting Room. Counter-Proliferation Investigations & National Security

Export Controls. Internal Audit Report. Report No. SC June James Dougherty Principal Auditor

SOUTH DAKOTA STATE UNIVERSITY

Essentials of University Export Controls and Restricted Research

UNIVERSITY OF CENTRAL FLORIDA EXPORT CONTROLS MANAGEMENT PROGRAM

Government Contracts University. ITAR & EAR Awareness GOVCON U. Milt Johns Partner, Senior Government Contracts Counsel

Sponsored Program Services POST AWARD

Document Downloaded: Tuesday July 28, COGR Brochure - Export Controls and Universities - Information and Case Studies.

Colorado State University Export Compliance Questionnaire I-I29 Petition for a Non-Immigrant Worker

You Too Must Be ITAR-Compliant

U.S. Export Controls: Implications for Universities

Department of Commerce

Budget Preparation and Development. Basic Budget Construction. Export Control

Export Controls & International Travel Update RGA 070: Research Administrators Forum May 23, 2017 Kimmel Center, Room 914

Department of Defense INSTRUCTION. International Transfers of Technology, Articles, and Services

Export Controls Where Research and National Security Collide

Initial Export Control Reform AES Changes. ACE Software Developers Session May 21, 2013

POLICY and STATEMENT OF COMPLIANCE WITH U.S. EXPORT AND SANCTION LAWS FOR THE UNIVERSITY OF NEBRASKA-LINCOLN

Department of Defense INSTRUCTION

GLAST ITAR Briefing. Rachel Claus, University Counsel for SLAC 21 April 2003

Student Guide: Controlled Unclassified Information

PUBLIC BEACH & COASTAL WATERFRONT ACCESS PROGRAM. NC Department of Environmental Quality Division of Coastal Management

CHAPTER 2 TYPES OF INTERNATIONAL PROGRAMS A. INTRODUCTION. International Programs Security Handbook 2-1

Northwest Export Controls Conference Seattle WA July 26-27, 2017

Foreign Travel Export Awareness Briefing

UPDATE 2009 Commodity Jurisdiction

Wayne State University. Student Handbooks linear feet. 5 manuscript boxes.

Document Downloaded: Tuesday July 28, Presentation on Deemed Export Controls. Author: Robert Hardy. Published Date: 11/10/2004

Bureau of Industry and Security U.S. Department of Commerce

V Valor: Courage and bravery; Strength of mind and spirit that enables one to encounter danger with firmness

Export-Controlled Technology at Contractor, University, and Federally Funded Research and Development Center Facilities (D )

Computer Science Club Constitution

UNIVERSITY PHYSICIANS OF BROOKLYN POLICY AND PROCEDURE

Office of Research Compliance

EARLY-CAREER RESEARCH FELLOWSHIP GRANT AGREEMENT

PLEASE READ INSTRUCTIONS AND REMOVE BEFORE TYPING INSTRUCTIONS FOR DSP-94

International Traffic in Arms Regulations (ITAR)

2017 AMSAT Space Symposium and Annual Meeting

Importance of Export Control & Japan s Export Control

5.3 Report of the Committee on Tourism and Competitiveness (CTC)

Executive Summary 56,173 Purpose and Coverage of the Rule 56,173 Summary of the Major Provisions of the Rule 56,173 Costs and Benefits 56,175

The telecommuting option is not an employee benefit it is a management option that provides an alternative means to fulfill work requirements.

SUNY DOWNSTATE MEDICAL CENTER POLICY AND PROCEDURE

FIREARMS AND AMMUNITION

CDBG Owner-Occupied Housing Rehabilitation Administration Plan Requirements

J-1 EXCHANGE VISITOR DS-2019 REQUEST PACKET

APPLICATION GUIDELINES FOR PIONEER STATUS INCENTIVE

NACC Member Value Survey November 15, Discoveries

FIRE AND DISASTER MANAGEMENT ORGANIZATION ACT

(2) All Missile Technology Control Regime (MTCR) Annex Items.

University of Auckland Doctoral Scholarships

Enrolled Copy S.B. 58 REPEAL OF NURSING FACILITIES ASSESSMENT. Sponsor: Peter C. Knudson

Table of Contents INTERPRETATIONS OF TOPIC 840, ACCOUNTING FOR LEASES. Paragraph : General...Subtopic

ATTACHMENTS A & B GRANT AGREEMENT TERMS AND CONDITIONS DEPARTMENT OF EDUCATION

NAS Grant Number: 20000xxxx GRANT AGREEMENT

General Administration Office Structure Effective Date: Supersedes: References: P&P-O-100; CRS, P&P L-100

12007 Research Boulevard Austin, Texas PH: FAX:

EARLY-CAREER RESEARCH FELLOWSHIP GRANT AGREEMENT [SAMPLE Public Institutions]

GAO EXPORT CONTROLS. Improvements to Commerce s Dual-Use System Needed to Ensure Protection of U.S. Interests in the Post-9/11 Environment

Transcription:

Export Control Compliance Sharing Sensitive Technologies Between International Affiliates General Concepts and Transfer Patterns September 19, 2013 In the normal course of operations between U.S. and foreign affiliates, inter-company communications and data conveyances are frequent and occur both intentionally and inadvertently. The U.S.-foreign affiliation can be in the form of a parent company, on one end, and a wholly-owned subsidiary, joint venture, minority interest or other intercompany affiliation, on the other end. When sensitive technologies are involved in these intercompany exchanges, U.S. export control laws likely apply to the controlled technology transfer and export control law violations can occur. U.S. export control laws include U.S. International Traffic in Arms Regulations (ITAR), U.S. Export Administration Regulations (EAR), and those U.S. Executive Orders, U.S. statutes, and U.S. Treasury Regulations comprising the country, person, and entity sanctions that are administered and enforced by the U.S. Office of Foreign Asset Control (OFAC). While the ITAR applies predominately (but not exclusively) to companies in the defense and aerospace industries, U.S. export control laws under EAR and OFAC apply to companies in the software, IT, telecommunications, and automotive industries and potentially to any transfer (export) of a sensitive technology from the U.S. In other words, U.S. export control laws are not limited in scope to the defense industry. The intent of this article is to explain how U.S. export control issues affect the sharing of technologies between U.S. and foreign affiliates. HOW TO IDENTIFY SENSITIVE TECHNOLOGY TRANSFERS THAT WILL BE TRACKED AND CONTROLLED BY THE U.S. GOVERNMENT The first step is to identify whether a technology is a controlled technology, and thus subject to U.S. export laws upon transfer (export) from the U.S. to a foreign affiliate. Under ITAR, a controlled technology is one that is listed as one of the 20 general item categories of the ITAR U.S. Munitions List (USML).[i] Specifically, ITAR-controlled technology would appear under paragraphs (g), (h), or (i) of each general item category of the USML. ITAR-controlled technologies are identified as either: Technical Data, which includes drawings, plans, instructions, documentation for the design, development, production, operation/use, repair, and maintenance of an item listed as a Defense Article under a USML category;[ii] and Defense Services, which includes assistance for design, development, production, operation/use, repair, and maintenance of an item listed as a Defense Article under a USML category.[iii]

Under EAR, a controlled technology is one that is listed as one of the 10 general item categories of the EAR Commerce Control List (CCL).[iv] Within the 10 general CCL categories, specifically controlled items are further classified in five groups lettered A through E.[v] Of these five groups, EAR-controlled technologies are identified as either: Software, under product group D, whereby the software may correspond to product groups A (Equipment, Assemblies and Components), B (Related Test, Inspection and Production Equipment), or C (Materials) of a given general item category under the CCL;[vi] and Technology, under product group E, which includes specific information necessary for the development, production, or use of a controlled item listed under related product groups A, B, or C; and Technology can be furnished in the form of technical data or technical assistance.[vii] The transfer of any of the above ITAR Technical Data or Defense Services or EAR Software or Technology to a foreign affiliate would constitute a Controlled Technology transfer under ITAR or EAR. MAKING LICENSED/AUTHORIZED TRANSFERS OF CONTROLLED TECHNOLOGY UNDER ITAR AND EAR The following export control compliance rules are useful for lawfully transferring Controlled Technologies to foreign affiliates. They may be applied to most of the common technology transfer scenarios arising between international affiliates. A Good General Rule for Transfers of ITAR-Controlled Technology. Absent an available exemption under ITAR, a U.S. export control license or other explicit authorization is required to transfer an ITAR-Controlled Technology to a foreign affiliate.[viii] ITAR-Licensed Transfers. For an ITAR-Controlled Technology constituting Technical Data, a simple transfer to a foreign affiliate (without technical assistance) is permitted via a DSP-5 License for unclassified Technical Data and a DSP-85 License for classified Technical Data.[ix] ITAR-Authorized Transfers under Collaborative Agreements. For ITAR-Controlled Technology furnished as Defense Services, such a transfer to a foreign affiliate is permitted via one of the stipulated collaborative service agreements under the ITAR, which are (i) Technical Assistance Agreements (TAAs) for the performance of Defense Services and disclosure of Technical Data and (ii) Manufacturing License Agreements (MLAs) for a grant of a license to a foreign affiliate to enable the foreign affiliate to manufacture an item that is a Defense Article under the USML.[x] TAAs and MLAs between U.S. and foreign affiliates must be approved by the U.S. Directorate of Defense Trade Controls (DDTC), which is the U.S. State Department Agency charged with administering and enforcing ITAR export controls.[xi] ITAR license exemptions under ITAR Sections 124.3(a) and (b) permit the transfer (export) of corresponding Unclassified and Classified Technical Data in furtherance of the TAA or MLA.[xii]

A Good General Rule to Use for Transfers of EAR-Controlled Technology. A U.S. export control license or (if available) an EAR license exception will be required to transfer (export) an EAR-Controlled Technology to a foreign affiliate.[xiii] EAR-Licensed Transfers.For an EAR-Controlled Technology constituting Software or general Technology under EAR, a transfer to a foreign affiliate (with or without technical assistance) is permitted via an EAR export license, unless a license is not required for the foreign affiliate s country or an EAR License Exception applies.[xiv] EAR-Authorized Transfers under License Exceptions. In lieu of obtaining an EAR export control license, U.S. affiliates may be authorized to transfer EAR-Controlled Technology to a foreign affiliate via an EAR license exception, provided that the transfer qualifies for the license exception and proper reliance upon the exception is documented. While not exhaustive, the following EAR license exceptions are some common exceptions that may be used to facilitate transfer of EAR-Controlled Technology to a foreign affiliate without an export control license: EAR License Exception TSR (Technology and Software Restricted). This exception authorizes unlicensed transfers of EAR-Controlled software and technology to a foreign affiliate if: (a) only national security (NS) controls imposed by EAR are present; (b) the destination country is listed in Country Group B of the EAR; and (c) a written assurance on a limited scope of use is obtained from the end-user.[xv] EAR License Exception TSU (Technology and Software Unrestricted). This exception authorizes unlicensed transfers of EAR-Controlled software and technology to a foreign affiliate[xvi] if the controlled items are comprised of sales and operations software and technology, other mass market software, or encryption source code that is publically available [xvii] (e.g., open source) and its corresponding object code.[xviii] EAR License Exception STA (Strategic Trade Authorization). This exception authorizes unlicensed transfers of EARControlled software and technology to a foreign affiliate if: (a) only national security (NS) controls, chemical and biological (CB) controls, nuclear non-proliferation (NP) controls, regional stability (RS) controls, crime controls (CC), or significant item (SI) controls imposed by EAR are present; (b) the destination is one of 36 listed destination countries in this exception; (c) the end-user is notified of the ECCN(s) designation(s), the items shipped, and use of the STA exception prior to transfer; and (d) a Consignee Statement is procured from the end-user.[xix] If the EAR-Controlled software and technology is controlled only for national security (NS) reasons, then transfer to an additional 8 destination countries is permitted.[xx] A more detailed eligibility analysis can be performed using the Strategic Trade Authorization (STA) Interactive Compliance Tool located at: http://www.bis.doc.gov/seminarsandtraining/stacompliancetool.html. EAR License Exception CIV (Civil End-Users and EndUsers). This exception authorizes unlicensed transfers of EAR- Controlled software and technology to a foreign affiliate if: (a) only national security (NS) controls imposed by EAR are present and the exception is designated as available for the controlled item; (b) the destination country is listed in Country Group D:1 of the EAR, which includes China and Russia; (c) the controlled item is destined for civilian-only end-users and end-uses ; and (d) semiannual reports of the transfers under this EAR License Exception are submitted to the U.S. Bureau of Industry and Security (BIS), which is the U.S. Commerce Department Agency charged with administering and enforcing EAR export controls.[xxi]

EAR License Exception BAG (Baggage). This exception authorizes unlicensed transfers of EAR-Controlled software and technology to a foreign affiliate if: (a) the transfer is in the context of a U.S. affiliate s employees traveling to the foreign affiliate; and (b) with a laptop or other tool, instrument, or equipment and technology used in their employment.[xxii] EAR License Exception ENC (Encryption). This exception authorizes unlicensed transfers of EAR-Controlled software and technology to a foreign affiliate[xxiii] if: (a) the controlled items are encryption items classified under ECCN 5D002 or 5E002; (b) the foreign affiliate is a U.S. Subsidiary as defined in the EAR; and (c) the foreign affiliate uses the software and technology for its internal use.[xxiv] The above export control compliance rules for lawfully transferring Controlled Technologies to foreign affiliates may be used in the context of the following transfer scenarios: (a) U.S. and foreign affiliates engaging in remote sharing and collaboration that may cause the intentional or inadvertent transfer of Controlled Technology; (b) Controlled Technology that may be transferred for IT computing and storage purposes to a foreign affiliate s server located abroad; (c) Controlled Technology that may be intentionally or inadvertently transferred via laptops and other electronic devices by U.S. affiliate employees who travel to and work at foreign affiliate locations; and (d) Controlled Technology that may be transferred under the doctrine of deemed export to foreign affiliate employees visiting or working at U.S. affiliate locations. About the Author Joseph D. Gustavus is a Senior Principal at Miller Canfield who represents multinational clients and those in the automotive, defense, aerospace, software and information technology sectors. He has served as an attorney in Europe and speaks fluent German and is also a Certified Public Accountant. He is a member and leader of Miller Canfield s Export Controls Group. He represents clients on complex domestic and international acquisitions and commercial transactions and on ITAR and other export control compliance issues. In relation to export controls, he assists clients with controlled asset identification and classification, commodity jurisdiction requests, implementation of export control compliance programs, export license applications, drafting of government-approved Technical Assistance Agreements, Manufacturing License Agreements, other export control-compliant collaboration agreements, performing export control audits and rendering benchmark reports, performing export control due diligence on acquisitions targets, drafting Export Control Manuals and Technology Control Plans, drafting voluntary disclosures on export control violations, and employment of foreign nationals subject to export controls. This article was originally published in The Michigan International Lawyer, a State Bar of Michigan International Law Section publication. Copyright 2013 Miller, Canfield, Paddock and Stone, PLC

[i] 22 C.F.R 121.1 (2012). [ii] 22 C.F.R. 120.10; Technical Data includes software as defined in 22 C.F.R. 121.8(f). [iii] 22 C.F.R. 120.6; see also 22 C.F.R. 121.1(which states that Defense Services includes furnishing Technical Data.) [iv] See 15 C.F.R. 738, Supp. 1 (2012). [v] 15 C.F.R. 738.2(b). [vi] 15 C.F.R. 738.2(b); see definition of Software under 15 C.F.R. 772.1; see also 15 C.F.R. 774, Supp. 2. [vii] 15 C.F.R. 738.2(b); see definition of Technology under 15 C.F.R. 772; see also 15 C.F.R. 774, Supp. 2. [viii] 22 C.F.R. 123.1(a). [ix] 22 C.F.R. 123.1(a)(1) and (4). [x] 22 C.F.R. 124.1(a). [xi] Id. [xii] 22 C.F.R. 124.3(a) and (b). [xiii] 15 C.F.R. 730.7. [xiv] 15 C.F.R. 730.7. [xv] 15 C.F.R. 740.6. [xvi] The destination must not be a country listed in Country Group E:1 of the EAR (i.e., Cuba, Iran, North Korea, Sudan, Syria). [xvii] This may also apply to software that may contain some encryption function but is written for a purpose other than encryption. [xviii] 15 C.F.R. 740.13. [xix] See 15 C.F.R. 740.20 generally; see also 15 C.F.R. 740.20(c)(1). [xx] 15 C.F.R. 740.20(c)(2). [xxi] 15 C.F.R. 740.5; see also 15 C.F.R. 743.1. [xxii] 15 C.F.R. 740.14. [xxiii] 15 C.F.R. 740.17(a)(2). [xxiv] 15 C.F.R. 740.17(a)(2).