What is ITAR Compliance? ITAR Definition

What is ITAR Compliance?

ITAR stands for The International Traffic in Arms Regulations (“ITAR,” 22 CFR 120-130) which implements the “AECA”  Arms Export Control Act.  The Department of State is responsible for the export and temporary import of defense articles and services governed by 22 U.S.C. 2778 of the Arms Export Control Act[1]

What specific sensitive information must organizations safeguard under ITAR/OFAC?

  • Export control regulations affect technical data (information related to defense articles and defense services), not including information in the public domain. Also affected is a range of data that consists of, supports, describes, or accompanies the actual exported good or service, including:
  • Items that appear on, or are closely related to, the U.S. Munitions List Information covered by an invention secrecy order

How GTB Technologies can help demonstrate compliance while keeping sensitive data safe?

The GTB Data Security that Workstm platform is a suite of solutions that has the ability to protect an organization’s sensitive data and intellectual property stored, in use, and at the endpoint.

An organization discovers and classifies sensitive information stored on laptops,  servers, or desktops across its enterprise either within the network or off-premise (including the cloud), monitors this data, and prevents it from leaving the network by accurately blocking unauthorized transmission.

The organization can also demonstrate compliance with U.S. export controls of sensitive intellectual property, including ITAR or OFAC, and protect confidential employee and customer data to help demonstrate compliance with other regulations such as FISMA, HIPAA, the EU data directive, GDPR, etc.

Register for your free ITAR Assessment

    Interested in:

    Keep me updated with Data Protection Technologies:

    [1] https://www.pmddtc.state.gov/regulations_laws/itar.html
    Want to see something cool in less than 30 seconds?

    Want Easy Access to
    Data Security that Works?

    Secure your Sensitive Data, including from  Remote Users

    Try it for Free

    Take the Next Step to Stop Data Breaches