ITAR Compliance

Monday, June 23, 2008

About

Recent cases including the ITT and Northrop Grumman agreements send a clear message that exporters must be vigilant about preventing, detecting and investigating potential ITAR controls violations. Companies that deal with ITAR-controlled items or technical data must ensure that export practices and global supply chains are compliant with U.S. trade law.

Creating an adequate ITAR compliance program is complex and U.S. exporters must be up to date on the latest developments and enforcement initiatives of defense trade controls. This critically acclaimed “3rd National Forum on ITAR Compliance”, from the American Conference Institute has once again brought together an exceptional faculty of top business, legal and government officials. This publication provides updates on civil and criminal ITAR enforcement, state of the art licensing and compliance practices as well as practical advice on how to successfully implement ITAR controls. Learn practical corporate perspectives on how best to comply in a era of increased scrutiny, including:

  • How U.S. persons can engage in ITAR-controlled defense services by simply providing public domain information
  • Hiring and assigning foreign persons in ITAR sensitive areas
  • ITAR contamination: when non-U.S. technology becomes tainted
  • DDTC’s compliance expectations in the acquisitions/merger context
  • Handling mistakes by downstream recipients of U.S. defense articles
  • Factors triggering DDTC requirement of an independent audit
  • Key elements and “best practices” of effective ITAR compliance

Contents & Contributors

About

Recent cases including the ITT and Northrop Grumman agreements send a clear message that exporters must be vigilant about preventing, detecting and investigating potential ITAR controls violations. Companies that deal with ITAR-controlled items or technical data must ensure that export practices and global supply chains are compliant with U.S. trade law.

Creating an adequate ITAR compliance program is complex and U.S. exporters must be up to date on the latest developments and enforcement initiatives of defense trade controls. This critically acclaimed “3rd National Forum on ITAR Compliance”, from the American Conference Institute has once again brought together an exceptional faculty of top business, legal and government officials. This publication provides updates on civil and criminal ITAR enforcement, state of the art licensing and compliance practices as well as practical advice on how to successfully implement ITAR controls. Learn practical corporate perspectives on how best to comply in a era of increased scrutiny, including:

  • How U.S. persons can engage in ITAR-controlled defense services by simply providing public domain information
  • Hiring and assigning foreign persons in ITAR sensitive areas
  • ITAR contamination: when non-U.S. technology becomes tainted
  • DDTC’s compliance expectations in the acquisitions/merger context
  • Handling mistakes by downstream recipients of U.S. defense articles
  • Factors triggering DDTC requirement of an independent audit
  • Key elements and “best practices” of effective ITAR compliance

Contents & Contributors

IDENTITY THEFT: FINAL RULES & THE IMPACT ON FINANCIAL INSTITUTIONS AND CREDITORS (THE RED FLAG RULES)
William H. Henley, Jr., Office of Thrift Supervision

FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES: RED FLAGS CHANGE-OF-ADDRESS AND ADDRESS DISCREPANCY RULES
Andrew Smith, Morrison & Foerster LLP

IMPLEMENTING THE NEW IDENTITY THEFT RED FLAG RULES INTO YOUR COMPLIANCE PROGRAM
Jill A. Smith, Bank of America
Maureen Yap, Relman & Associates

DATA SECURITY BREACHES: PRACTICAL RESPONSES
Joseph T. Lynyak, Venable LLP

DATA BREACHES AND IDENTITY THEFT: PREPARING AND RESPONDING TO LITIGATION CAUSED BY DATA BREACHES
Carl E. Metzger, Goodwin Procter, LLP

DOCUMENT RETENTION AND DESTRUCTION: PRACTICAL STRATEGIES FOR DEVELOPING A COMPLIANT DATA MANAGEMENT PROGRAM
Nikki E. Procopio, Deutsche Bank Americas

PREVENTING THIRD-PARTY BREACHES: SECURING INFORMATION IN HANDS OF VENDORS AND SERVICE PROVIDERS
Orrie Dinstein, GE Commercial Finance
Jeff Jenkins, Vice First American Corporation

ENSURING COMPLIANCE WITH STATE BREACH NOTIFICATION LAWS: NUANCES, MOCK TESTS & INVESTIGATIONS
Vanessa Allen Sutherland, Altria Client Services Inc.

UPDATES ON STATE IDENTITY THEFT LAWS AND PROGRAMS
Enger McCartney-Smith, Wachovia Corporation

ENSURING COMPLIANCE WITH STATE BREACH NOTIFICATION LAWS: A LOOK AT THE PROBLEMS OF INTERPRETATION
Thomas J. Smedinghoff, Wildman Harrold

EFFECTIVELY WORKING WITH LAW ENFORCEMENT AGENCIES FOLLOWING A DATA BREACH
Jonathan Rusch, U.S. Department of Justice

INSURING AGAINST DATA BREACHES: MITIGATING EXPOSURE TO RISK AND LIABILITY
George Allport, Chubb Specialty Insurance
Nicholas C. Economidis, Beazley Group, plc



DOCUMENT TYPES: PRESENTATIONS AVAILABLE: 0