The U.S. government is a large purchaser, one that countless organizations court to grow their own business. In 2015 the U.S. Federal budget was nearly $4T dollars, of that over $600B went towards military spending. That $600B number comes with baggage in the form of additional rules and requirements, one of which can be broadly called export control. The two mandates that establish the majority of the rules are International Traffic in Arms Regulation (ITAR) and Export Administration Regulation (EAR). Together these control the export and sale of defense-related items, but they also regulate dual-use items, those that can be for commercial and/or defense use.
Export control is a complex issue with a host of challenges; this complexity drives cost. Once you successfully classify, either internally or with external assistance, if and how your product/solution is regulated, the ongoing challenge of enforcement begins. In order to help security and compliance teams understand and meet the requirements of export control regulations, we have published a new whitepaper, Digital Guardian for Data Protection and Export Control Compliance. This whitepaper:
- Explains how a context-aware data protection solution is capable of addressing a wide range of real-world use cases for export controlled products and services.
- Summarizes conceptually and technically how an enterprise deployment of a context-aware data protection solution facilitates security while maintaining productivity throughout highly complex workflows and collaborative ecosystems.
- Defines the elements of risk and cost associated with export control compliance and demonstrates how Digital Guardian’s unique design and technology support both compliance and productivity.
Digital Guardian for Data Protection and Export Control Compliance
Read this whitepaper to learn how to meet compliance requirements for ITAR and EAR with data protection solutions.
Related ArticlesAfter Panama Papers: Firms Should Add Pen Testing to Due Diligence Process
An analysis by Wired shows that the Panama firm Mossack and Fonseca did a poor job managing its public facing systems, all the while promising clients security.How to Secure Personally Identifiable Information against Loss or Compromise
Securing PII is a critical component of many data privacy regulations as well as a valuable way to gain customer trust – here are 10 steps to help keep PII protected within your organization.Friday Five: 4/12 Edition
A once defunct hacking forum returns, the New York Times on privacy, and spyware apps - catch up on the week's infosec news with this roundup!