“Who are you doing business with?” “What is the subject of your transaction?” “How is your transaction being conducted?” CE’s awareness-level Trade Compliance Overview for U.S. Information Technology: Defense Controls course introduces individuals in the information technology, information systems, or computer departments subject to U.S. defense controls to these common themes of the trade process. The course is presented in clear, easy-to-understand microlearning elements that highlight key compliance concepts relevant to international trade and offers engaging scenarios that illustrate how these concepts can impact day-to-day situations.
Users will receive a certificate of completion from George Mason University upon successful completion of this course.
Learning Objectives
Enable learners to recognize situations that could give rise to the risk of a trade compliance violation and know how to respond in accordance with applicable laws and company policies.
Target Audience
Any employee in the information technology, information systems, or computer departments subject to U.S. defense controls and responsible for carrying out routine compliance-related tasks within their organization
Course Duration: 46 minutes
Certificate of Completion: George Mason University
Course Outline
Introduction to Trade Compliance for Information Technology
Who Is Involved in Your Transaction?
Introduction to ''Who'' Key Concepts and Scenarios for Information Technology
U.S. Exports
Export of U.S. Technical Information
Exporting Software
U.S. Screening
Scenarios
Exporting U.S. Technical Information: Sharing Data Using Websites
Exporting U.S. Technical Information: Outsourcing Information Technology
Exporting U.S. Technical Information: Using Websites to Share Technical Data with Suppliers
Exporting U.S. Technical Information: Setting Up External Websites with Controlled Data
Exporting Software: Segmenting Data Management Systems
Exporting Software: My Colleague Requests Access to a Collaboration Environment
Resources Available
What Is the Subject of Your Transaction?
Introduction to “What” Key Concepts and Scenarios for Information Technology
Control Lists
U.S. Control Lists
Authorizations
U.S. Export Authorizations
U.S. Penalties for Export Control Violations
Scenarios
Authorizations Under the EAR: Working with Third-Party Labor Providers
Authorizations Under the EAR: Emailing Data to Suppliers
Resources Available
How Is Your Transaction Being Conducted?
Introduction to “How” Key Concepts and Scenarios for Information Technology
The Foreign Corrupt Practices Act
Diversion
Reporting
Scenarios
Reporting: Accurate Reporting to Hierarchy and Authorities
Resources Available
Training Summary
Additional Courses to Consider
Sold out
Sold out
Sold out
Sold out
Use left/right arrows to navigate the slideshow or swipe left/right if using a mobile device
choosing a selection results in a full page refresh
press the space key then arrow keys to make a selection