The U.S. government is a large purchaser, one that countless organizations court to grow their own business. In 2015 the U.S. Federal budget was nearly $4T dollars, of that over $600B went towards military spending. That $600B number comes with baggage in the form of additional rules and requirements, one of which can be broadly called export control. The two mandates that establish the majority of the rules are International Traffic in Arms Regulation (ITAR) and Export Administration Regulation (EAR). Together these control the export and sale of defense-related items, but they also regulate dual-use items, those that can be for commercial and/or defense use.
Export control is a complex issue with a host of challenges; this complexity drives cost. Once you successfully classify, either internally or with external assistance, if and how your product/solution is regulated, the ongoing challenge of enforcement begins. In order to help security and compliance teams understand and meet the requirements of export control regulations, we have published a new whitepaper, Digital Guardian for Data Protection and Export Control Compliance. This whitepaper:
- Explains how a context-aware data protection solution is capable of addressing a wide range of real-world use cases for export controlled products and services.
- Summarizes conceptually and technically how an enterprise deployment of a context-aware data protection solution facilitates security while maintaining productivity throughout highly complex workflows and collaborative ecosystems.
- Defines the elements of risk and cost associated with export control compliance and demonstrates how Digital Guardian’s unique design and technology support both compliance and productivity.
Digital Guardian for Data Protection and Export Control Compliance
Read this whitepaper to learn how to meet compliance requirements for ITAR and EAR with data protection solutions.
Related ArticlesWhat’s The Value of a Stolen Chest X-Ray? More Than You’d Think.
A panel on security in the healthcare field at the South by Southwest Festival reveals the diversity of threats to health data.Left of Boom: The Importance of Protecting Critical Data
Identifying your ‘crown jewels’ is a key step in modern risk management. It’s also much easier said than done.Friday Five: 7/13 Edition
A study on how how few companies knew where their sensitive data is kept, a major cryptocurrency theft, and more - catch up on the week's infosec news with this roundup!