The U.S. government is a large purchaser, one that countless organizations court to grow their own business. In 2015 the U.S. Federal budget was nearly $4T dollars, of that over $600B went towards military spending. That $600B number comes with baggage in the form of additional rules and requirements, one of which can be broadly called export control. The two mandates that establish the majority of the rules are International Traffic in Arms Regulation (ITAR) and Export Administration Regulation (EAR). Together these control the export and sale of defense-related items, but they also regulate dual-use items, those that can be for commercial and/or defense use.
Export control is a complex issue with a host of challenges; this complexity drives cost. Once you successfully classify, either internally or with external assistance, if and how your product/solution is regulated, the ongoing challenge of enforcement begins. In order to help security and compliance teams understand and meet the requirements of export control regulations, we have published a new whitepaper, Digital Guardian for Data Protection and Export Control Compliance. This whitepaper:
- Explains how a context-aware data protection solution is capable of addressing a wide range of real-world use cases for export controlled products and services.
- Summarizes conceptually and technically how an enterprise deployment of a context-aware data protection solution facilitates security while maintaining productivity throughout highly complex workflows and collaborative ecosystems.
- Defines the elements of risk and cost associated with export control compliance and demonstrates how Digital Guardian’s unique design and technology support both compliance and productivity.
Digital Guardian for Data Protection and Export Control Compliance
Read this whitepaper to learn how to meet compliance requirements for ITAR and EAR with data protection solutions.
Related ArticlesGadgets That Eavesdrop
This holiday season you might be receiving a voice-controlled gadget – a voice controlled TV, a phone, or even an Amazon Echo. The convenience of this is obvious. But what about the downside? In order for the device to respond to your command – even its wake up command – it must, by definition, be listening. And it could be listening – and recording – a business-related conversation.Why Data Classification Should Drive your Security Strategy: A Q&A with Tony Themelis
Tony Themelis answers 6 questions about how data classification can bolster your security strategy.FTC Investigating How DNA Testing Firms Protect User Data
It appears the FTC has obliged U.S. officials and begun investigating the data security practices of DNA testing companies like 23andMe and Ancestry.com.