Trade Compliance Overview for U.S. Information Technology Professionals: Dual-Use Controls
Cost per seat
Number of seats
Course Summary
“Who are you doing business with?” “What is the subject of your transaction?” “How is your transaction being conducted?” CE’s awareness-level Trade Compliance Overview for U.S. Information Technology: Dual-Use Controls course introduces individuals in the information technology, information systems, or computer departments subject to U.S. dual-use controls to these common themes of the trade process. The course is presented in clear, easy-to-understand microlearning elements that highlight key compliance concepts relevant to international trade and offers engaging scenarios that illustrate how these concepts can impact day-to-day situations.
Users will receive a certificate of completion from George Mason University upon successful completion of this course.
Learning Objectives
Enable learners to recognize situations that could give rise to the risk of a trade compliance violation and know how to respond in accordance with applicable laws and company policies.
Target Audience
Any employee in the information technology, information systems, or computer departments subject to U.S. dual-use controls and responsible for carrying out routine compliance-related tasks within their organization
Course Duration: 45 minutes
Certificate of Completion: George Mason University
Course Outline
Introduction to Trade Compliance for Information Technology
Who Is Involved in Your Transaction?
- Introduction to ''Who'' Key Concepts and Scenarios for Information Technology
- U.S. Exports
- Export of U.S. Technical Information
- Exporting Software
- U.S. Screening
- Scenarios
- Exporting Technical Information: Using Websites to Share Information with Partners
- Exporting U.S. Technical Information: Setting Up External Websites with Controlled Data
- Exporting U.S. Technical Information: Obtaining Information System Services from Third Parties
- Exporting Software: Segmenting Data Management Systems
- Exporting Software: My Colleague Requests Access to a Collaboration Environment
Resources Available
What Is the Subject of Your Transaction?
- Introduction to “What” Key Concepts and Scenarios for Information Technology
- Control Lists
- U.S. Control Lists
- Authorizations
- U.S. Export Authorizations
- U.S. Penalties for Export Control Violations
- Scenarios
- Authorizations Under the EAR: Working with Third-Party Labor Providers
- Authorizations Under the EAR: Emailing Data to Suppliers
Resources Available
How Is Your Transaction Being Conducted?
- Introduction to “How” Key Concepts and Scenarios for Information Technology
- The Foreign Corrupt Practices Act
- Diversion
- Reporting
- Scenarios
- Reporting: Accurate Reporting to Hierarchy and Authorities
Resources Available
Training Summary