427x Filetype PPTX File size 0.95 MB Source: jsac-dfw.org
Technology Control Plans: Topics For
Discussion
I. What is a Technology Control Plan?
II. Security (NISPOM) and Export Control Requirements
(ITAR/EAR)
II.a Export Control Requirements (ITAR/EAR)
II.b NISPOM Requirements
III. The Intersection between Security and Export Control
Requirements
IV. Other Functional Areas: Communication, Cooperation and
Engagement is Key
V. Technology Control Plans: Underlying Processes in Place?
VI. Elements of a Robust Technology Control Plan: It’s Not
Just a Piece of Paper!
VII. TCPs: Sample
VIII. Now What?
2
I. What are Technology Control Plans?
• Purpose:
• Control the access and dissemination of
export controlled information,
materials, technology, data, etc. in
accordance with federal export
regulations.
• Ensures that personnel understand their
obligations under the NISPOM and
export control laws and regulations,
e.g., the International Traffic in Arms
Regulations.
II. Security (NISPOM) and Export Control
Requirements (ITAR/EAR)
• The National Industrial Security Program Operating Manual
(NISPOM) 10-509 specifies: “A Technology Control Plan is required
to control access by foreign nationals assigned to, or employed
by, cleared contractor facilities unless the CSA [Cognizant Security
Agency] determines that procedures already in place at the
contractor’s facility are adequate. The TCP shall contain
procedures to control access for all export-controlled
• information.” (Emphasis Added)
International Traffic in Arms Regulations (ITAR) 22CFR §126.13
(c) also recommends the use of a Technology Control Plan (TCP):
“In cases when foreign nationals are employed at or assigned to
security-cleared facilities, provision by the applicant of a
Technology Control Plan (available from the Defense
Investigative Service) will facilitate [export licensing
processing].”
II.a Export Control Requirements (ITAR/EAR)
• Defense Contractors (Manufacturers/Exporters/Brokers) are
mandated to register under the International Traffic In Arms
Regulations;
• Establishing a robust Export-Import Compliance Program (to
include ITAR and the Export Administration Regulations, for dual-
use/commercial), elements of which include, but are not limited
to:
• Robust Policies, Procedures, to include integration into
such requirements in other affected functions’ processes
• Commodity Jurisdiction and Classification;
• Denied Party Screening;
• Export-Import Licensing and Management;
• Customs-Trade Partnership Against Terrorism
• Anti-Boycott adherence;
• Training;
• Self-Assessments/Audits
• …More processes and procedures tailored to your business and
level of risk
II.b NISPOM Requirements
• The contractor shall establish procedures to ensure that foreign
visitors are not afforded access to classified information and other
export-controlled technical data except as authorized by an
export license, approved visit request, or other exemption to the
licensing requirements. The contractor shall not inform the foreign
visitor of the scope of access authorized or of the limitations
imposed by the government. Foreign visitors shall not be given
custody of classified material except when they are acting as
official couriers of their government and the CSA authorizes the
transfer.
no reviews yet
Please Login to review.