Trade Compliance Overview for U.S. Information Technology Professionals
Cost per seat
Number of seats
Course Summary
“Who are you doing business with?” “What is the subject of your transaction?” “How is your transaction being conducted?” CE’s awareness-level Trade Compliance Overview for U.S. Information Technology course introduces individuals in the information technology, information systems, or computer departments subject to U.S. trade controls to these common themes of the trade process. The course is presented in clear, easy-to-understand microlearning elements that highlight key compliance concepts relevant to international trade and offers engaging scenarios that illustrate how these concepts can impact day-to-day situations.
Users will receive a certificate of completion from George Mason University upon successful completion of this course.
Learning Objectives
Enable learners to recognize situations that could give rise to the risk of a trade compliance violation and know how to respond in accordance with applicable laws and company policies.
Target Audience
Any employee in the information technology, information systems, or computer departments subject to U.S. trade controls and responsible for carrying out routine compliance-related tasks within their organization
Course Duration: 44 minutes
Certificate of Completion: George Mason University
Course Outline
Introduction to Trade Compliance for Information Technology
Who Is Involved in Your Transaction?
- Introduction to ''Who'' Key Concepts and Scenarios for Information Technology
- U.S. Exports
- Export of U.S. Technical Information
- Exporting Software
- U.S. Screening
- Scenarios
- Exporting Technical Information: Using Websites to Share Information with Partners
- Exporting U.S. Technical Information: Obtaining Information System Services from Third Parties
- Exporting Software: Segmenting Data Management Systems
- Exporting Software: My Colleague Requests Access to a Collaboration Environment
- End-User Restrictions: My Sales Partner Is Under Investigation for Violating Trade Laws
Resources Available
What Is the Subject of Your Transaction?
- Introduction to “What” Key Concepts and Scenarios for Information Technology
- Control Lists
- U.S. Control Lists
- Authorizations
- U.S. Export Authorizations
- U.S. Penalties for Export Control Violations
- Scenarios
- Authorizations Under the EAR: Engaging Consulting Firms
Resources Available
How Is Your Transaction Being Conducted?
- Introduction to “How” Key Concepts and Scenarios for Information Technology
- The Foreign Corrupt Practices Act
- Diversion
- Reporting
- Scenarios
- Reporting: Accurate Reporting to Hierarchy and Authorities
Resources Available
Training Summary