What is ITAR Compliance? ITAR Definition

What is ITAR Compliance?

ITAR stands for The International Traffic in Arms Regulations (“ITAR,” 22 CFR 120-130) which implements the “AECA”  Arms Export Control Act.  The Department of State is responsible for the export and temporary import of defense articles and services governed by 22 U.S.C. 2778 of the Arms Export Control Act[1]


What specific sensitive information must organizations safeguard under ITAR/OFAC?

  • Export control regulations affect technical data (information related to defense articles and defense services), not including information in the public domain. Also affected is a range of data that consists of, supports, describes, or accompanies the actual exported good or service, including:
  • Items that appear on, or are closely related to, the U.S. Munitions List
    Information covered by an invention secrecy order


How GTB Technologies  can help demonstrate compliance while keeping sensitive data safe?

The GTB DLP that Works platform is a suite of solutions which has the ability to protect an organizations sensitive data and intellectual property stored, in use and at the endpoint.

An organization discover and classify sensitive information stored on laptops,  servers or desktops across its enterprise either within the network or off premise (including the cloud), monitor this data and prevent it from leaving the network by accurately blocking unauthorized transmission.

The organization can also demonstrate compliance with U.S. export controls of sensitive intellectual property, including ITAR or OFAC, and protect confidential employee and customer data to help demonstrate compliance with other regulations such as FISMA, HIPAA, the EU data directive, GDPR, etc.

GTB DLP that WorksRegister for your free ITAR Assessment

    Interested in:

    Keep me updated with Data Protection Technologies:


    [1] https://www.pmddtc.state.gov/regulations_laws/itar.html

    Want Easy Access to
    Data Security that Works?

    Secure your Sensitive Data, including from  Remote Users

    Try it for Free

    Take the Next Step to Stop Data Breaches