Export Controls and Cloud Computing: Complying with ITAR, EAR and Sanctions Laws



Similar documents
Export Controls and Cloud Computing: Legal Risks

Second Annual Impact of Export Controls on Higher Education & Scientific Institutions

Harvard Export Control Compliance Policy Statement

Export Control Laws Training Presentation FLORIDA INSTITUTE OF TECHNOLOGY

Introduction To Commerce Department. Export Controls U.S. DEPARTMENT OF COMMERCE BUREAU OF INDUSTRY AND SECURITY OFFICE OF EXPORTER SERVICES

GOODMAN GLOBAL GROUP, INC. EXPORT CONTROL AND SANCTIONS COMPLIANCE POLICY

EXPORT CONTROLS COMPLIANCE

Negotiating EHR Agreements: Complying with HIPAA, Stark and AKS, Overcoming Privacy and Security Risks

COMPUTER & INTERNET. Westlaw Journal. Expert Analysis Software Development and U.S. Export Controls

Overcoming Ethical Challenges for Multi-Firm Lawyers and Their Firms: Fiduciary Duty, Conflict, Fee-Splitting and More

Export Control Management System

United States Export Controls on Internet Software Transactions. John F. McKenzie Partner, Baker & McKenzie LLP

Regulatory Compliance and Trade

Using Technology Control Plans in Export Compliance. Mary Beran, Georgia Tech David Brady, Virginia Tech

Settling Wage/Hour Claims: Weighing Settlement Options, Negotiating Damages, and Ensuring Court Approval

Builder's Risk Insurance for Construction Projects: Legal Issues

Export Control Training

Louisiana State University A&M Campus Export Control Compliance Manual October 2013

CLOUD COMPUTING, EXPORT CONTROLS AND SANCTIONS. By Richard Tauwhare, Dechert LLP i

ERISA Retirement Plans: Fiduciary Compliance and Risk Management for Investment Fund Selection and Fee Disclosures

Insights and Commentary from Dentons

Policy and Procedures Date:

Privacy and Data Security Update for Defense Contractors

CYBERSECURITY RISK MANAGEMENT

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

EXPORT CONTROLS AND RESEARCH AT WPI TRAINING PRESENTATION

Ensuring HIPAA Compliance When Transmitting PHI via Patient Portals, and Texting

AML and OFAC: Lessons from Recent Aggressive Enforcement Against Financial Institutions

[SUBPART CLOUD COMPUTING (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services.

Top 10 Questions to Ask Before Exporting Software Containing Encryption

Export Controls: What are they? Why do we care?

University of Maryland Export Compliance Program

HIPAA Compliance During Litigation and Discovery

Payment and Performance Surety Bonds in Construction Projects: Perspectives of Owners, Contractors and Sureties

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Introduction to Braumiller Schulz LLP Why Trade Compliance? Establishing an Internal Compliance Program (ICP) Contracting Services to Outside Experts

Best Practices in Export Compliance: Five Key Issues in Canadian Trade Control Compliance and Enforcement

Structuring Equity Compensation for Partnerships and LLCs

CHAPTER IV: SECTION 7 COMPLIANCE WITH U.S. SANCTIONS

What The OMB Cybersecurity Proposal Does And Doesn't Do

U.S. Economic Sanctions Laws and How They Affect Insurance Brokers

Receivable and Inventory Strategies for Lenders and Borrowers Crafting Commercial Loan and Security Agreements

Policy on Export of Physical and Intellectual Property Export Controls

OFAC Sanctions on Iran, Syria, Yemen, and Burma: Compliance Strategies

NIST Cybersecurity Framework What It Means for Energy Companies

New FAR/DFARS Compliance Challenges for Small Businesses in Frank S. Murray

Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features: Dean C. Berry, Partner, Cadwalader Wickersham & Taft, New York

LATEST ON THE DODD-FRANK ACT AND INTERNATIONAL COMPLIANCE RISKS

SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360

1. Not Subject to the EAR and Defense Article. (1) Reserved. (2) Reserved

i. The enclosed software and knowledge base together are defined as the "Software".

Attachment II FLOW-DOWN CLAUSES APPLICABLE TO PURCHASE ORDERS INVOLVING FUNDS FROM A FEDERAL GOVERNMENT CONTRACT OR GRANT

Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals

Structuring Rooftop Lease Agreements: Legal and Business Considerations

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

White Paper on Financial Institution Vendor Management

OFAC Compliance Overview and Recent Trends

What You May Not Know About Sanctions (And How It Can Hurt You) by: Rajika Bhasin Counsel, Global Markets AIG

Billing Code: 3510-EA

EXPORT CONTROL GUIDELINES FOR STAFF

Export Controls Compliance

for Landlords and Tenants Negotiating Insurance, Indemnity and Mutual Waiver of Subrogation Provisions

Export Control Compliance Procedure Guide June 8, 2012

United States Sanctions: General Considerations for Minority Investment

Protecting the Value of Your Transaction y

Cybersecurity Enhancement Account. FY 2017 President s Budget

Mastering Global Trade Compliance for Growth Through Export. Track 1 Session 3

Cloud Computing Contract Clauses

Structuring Covenants in Leveraged Loans and High Yield Bonds for Borrowers and Lenders

Title: Data Security Policy Code: Date: rev Approved: WPL INTRODUCTION


Legislative Language

Impact of Legal and Regulatory Compliance on Higher Education Information Security Management. Dan Han Virginia Commonwealth University

Table of Contents SCOPE RECORDS TO BE RETAINED

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

M&A Purchase Price Adjustment Clauses

Cloud Security Trust Cisco to Protect Your Data

Transcription:

Presenting a live 90-minute webinar with interactive Q&A Export Controls and Cloud Computing: Complying with ITAR, EAR and Sanctions Laws WEDNESDAY, APRIL 23, 2014 1pm Eastern 12pm Central 11am Mountain 10am Pacific Today s faculty features: Hilary L. Hageman, Vice President & Deputy General Counsel, CACI International, Arlington, Va. Thaddeus R. McBride, Partner, Sheppard Mullin Richter & Hampton, Washington, D.C. Laura Tomarchio, Director, Trade Compliance, Symantec, Mountain View, Calif. Martina de la Torre, Sr. Manager, Global Trade Compliance, Symantec, Mountain View, Calif. The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 10.

Tips for Optimal Quality FOR LIVE EVENT ONLY Sound Quality If you are listening via your computer speakers, please note that the quality of your sound will vary depending on the speed and quality of your internet connection. If the sound quality is not satisfactory, you may listen via the phone: dial 1-888-601-3873 and enter your PIN when prompted. Otherwise, please send us a chat or e-mail sound@straffordpub.com immediately so we can address the problem. If you dialed in and have any difficulties during the call, press *0 for assistance. Viewing Quality To maximize your screen, press the F11 key on your keyboard. To exit full screen, press the F11 key again.

Continuing Education Credits FOR LIVE EVENT ONLY For CLE purposes, please let us know how many people are listening at your location by completing each of the following steps: In the chat box, type (1) your company name and (2) the number of attendees at your location Click the word balloon button to send

Cloud Computing and Cybersecurity: Export Compliance Considerations Strafford Publications Webinar April 23, 2014

5 Agenda Introduction Cloud Computing and Export Controls Cybersecurity Developments and Cloud Export Compliance Compliance Challenges / Best Practices

Overview Cloud Computing and Export Controls 6

7 What is Cloud Computing? 4 basic types Public: Provided by service provider to general public Community: Shared by organizations from a specific community Private: Provided for a single organization, hosted / managed internally or externally Hybrid: Combined deployment of one or more types

8 Increasing Cloud Usage U.S. government budget cutting and cost reduction initiatives U.S. government Cloud First policy Cost-savings and efficiencies driven by market

9 Export Controls Export controls apply to the export, sharing or transfer of software and/or technology (technical information) for the development, production or use of export controlled items Intangible transfers of controlled software and technology via electronic means may require an export authorization

10 Types of Technology Development Technology Related to all phases prior to serial production e.g., design, assembly and testing of prototypes, pilot production schemes, process of transforming design data into a product Production Technology Related to all production phases e.g., construction, production engineering, manufacture, integration, assembly (mounting), inspection, testing, quality assurance Use technology Operation, installation (including on-site installation), maintenance (checking), repair, overhaul, and refurbishing

11 Examples of Exports Storing controlled technology / data on cloud servers located in China Encrypted email containing ITAR-controlled data routed through server in Calcutta U.S. project hosted by defense contractor on cloud allowing access by non-u.s. employees Hosting and using clouds without observing requisite IT security standard of care

12 Regulatory Guidance Department of Commerce has published two Advisory Opinions Focus on responsibilities for cloud service providers The Opinions do not specifically address responsibilities of cloud service users

13 Commerce Guidance (cont.) Guidance Key Points Advisory Opinion of 13 Jan 2009 Cloud provider not considered exporter when user exports data on the cloud Provision of computational capacity not subject to EAR, but software provided to enable use may be subject to the EAR Cloud providers remain subject to restrictions on knowingly supporting WMD / missile-related activities Prohibition on access to computers / software under License Exception APP by nationals of Cuba, Iran, North Korea, Sudan and Syria does not apply if individual system access cannot be distinguished in the cloud Cloud providers not required to inquire about nationality of users

14 Commerce Guidance (cont.) Guidance Key Point Advisory Opinion of 11 January 2011 Cloud providers not required to obtain deemed export licenses for non-u.s. IT administrators servicing / maintaining cloud computing systems

15 Perilous ITAR Landscape Cloud not specifically addressed in law and regulations No official guidance from DDTC No distinction between users and providers Strict liability Adherence to traditional rules Rapidly evolving IT security standard[s] of care enhance ambiguities

16 DTAG White Paper May 2013 White Paper from Defense Trade Advisory Group (DTAG) Addresses issues posed by / possible solutions to issue of exporting data to a number of different servers for storage purposes Proposed solution: encryption of materials stored in a cloud through a cipher text Per DTAG, this is not an export unless the encrypted text and encryption key allowing text to be viewed in legible format were sent outside United States

17 DTAG Paper (cont d) Very practical guidance but no indication DDTC intends to accept these suggestions

18 Economic Sanctions Approximately 25 different U.S. sanctions regulations Regulator: U.S. Treasury Department, Office of Foreign Assets Control (OFAC) Jurisdiction over all U.S. persons Includes all persons in United States In case of Cuba and Iran, includes non- U.S. entities owned / controlled by a U.S. person

19 Sanctions - Types Comprehensive Cuba, Iran, [North Korea], Sudan, Syria Selective Belarus, Russia, Myanmar (Burma), Zimbabwe Programmatic Narcotics Traffickers, Terrorists, Weapons Proliferators

20 Export of Services Prohibition on direct and indirect provision of services to sanctions targets Providing service anywhere may be prohibited if benefit of service is received by sanctioned party or in sanctioned country For example: providing cloud computing services to a Syrian national SDN resident in London repairing a private cloud server used by the national government of Belarus

21 Facilitation U.S. persons are prohibited from facilitating action that would be prohibited if performed by a U.S. person Broadly defined covers virtually any assistance of a prohibited transaction Example: Cannot facilitate technology transfers for a non-u.s. company related to its business in Iran

22 Liability IMPORTANT POINT: There can be liability for any person, regardless of nationality, who causes a violation

23 Recent Cybersecurity Developments and Cloud Export Compliance

24 Recent U.S. Cybersecurity Efforts DoD / GSA Joint Working Group on Improving Cybersecurity and Resilience through Acquisition Defense Federal Acquisition Regulation Supplement: Safeguarding Unclassified Controlled Technical Information (DFARS Case 2011 D039) NIST Framework for Improving Critical Infrastructure Cybersecurity

25 DoD & GSA Working Group Final Report of the Joint Working Group on Improving Cybersecurity and Resilience through Acquisition Released January 23, 2014 by GSA and DoD Specific acquisition strategy recommendations

26 DFARS Unclassified Controlled Technical Information and Cyber Incident Reporting Wide-ranging changes to DoD Contracts & Subcontracts Requires government contractors to provide adequate security for technology systems that may have unclassified controlled technical information [UCTI] resident on or transiting through... (48 C.F.R. 252.204-7012(b)(1)) Likely applicable to a contractor s entire network

27 Controlled Technical Information Controlled technical information means technical information with military or space application that is subject to controls on the access, use, reproduction, modification, performance, display, release, disclosure, or dissemination. (48 C.F.R. 252.204-7301)

28 DFARS (cont d) Contractors required to report cyber incidents promptly to DoD Including the possible exfiltration, manipulation, or other loss or compromise of any unclassified controlled technical information resident on or transiting through Contractor s, or its subcontractors, unclassified information systems. (48 C.F.R. 252.204-70) Requirements should be identified in specific clause in every DoD solicitation and/or contract Includes commercial items Clause will be required to be passed down to subcontractors

29 NIST Framework Framework For Improving Critical Infrastructure, Version 1.0 Issued on February 12, 2014 Developed in accordance with Executive Order 13636, Improving Critical Infrastructure Cybersecurity" EO Directed NIST to collaborate with industry to develop a voluntary, risk-based cybersecurity framework Needs to be prioritized, flexible, repeatable, performance-based and cost-effective.

30 NIST Framework (cont d) Applicable to critical infrastructure or systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination thereof. For example: Power and utilities Financial services Telecommunications Chemicals Food and agriculture Healthcare

31 NIST Framework (cont d) Main elements Framework core: Includes suggestions on how to identify, protect, detect, and respond to cyber attacks Tiers: the levels of rigor for which organizations implement cybersecurity measures to identify where they fit in the four-tier structure; assesses moving to a more rigorous model (e.g., from localized to company-wide policies) Profiles: Identify what programs a company has implemented ( Current Profile ) and what is needed to meet additional risk management goals ( Target Profile ) Adoption is voluntary but encouraged

32 NIST Potential Benefits Flexible tools it does not prescribe what to do or what tools to buy Federal programs may encourage participation: cybersecurity insurance grants process preference liability limitations rate recovery for price regulated industries influence on government sponsored cybersecurity research

33 NIST Benefits (cont d) Over 3,000 individuals and organizations contributed to framework Comprehensive approach may mean: adoption may affect business relations with customers, contractors, and subcontractors may become de facto standard for private sector cybersecurity in data breach litigation could form basis for future legislation

34 Compliance Challenges and Best Practices

35 Challenges Seamless, real time, data exchange (and computing collaboration) May have countless contributors and recipients Special challenges: Where is the data, really? Data Privacy / Safe Harbor considerations Who has access? Restricted / Denied Party Screening End Users located in embargoed countries What is the end use?

36 Data Exchange Challenges (cont d) Rapid adoption & changing faces Grids, team rooms, databases, connection spaces, SaaS, SaaP, Storage, etc. Company may be both a provider and user which creates internal users & external users Ingestion and extraction of data What is the data? Physical export or import of customer data

37 Export Authorization Challenges Export authorization for and product classification of the customer-facing cloud service and server-side code Special challenge: What is actually delivered to the customer? Segregate code delivered to customer from server-side code Classify the Cloud Service only Classify the Cloud Service + client-side downloads

38 Export Challenges (cont d) What code resides on the servers managed by the cloud service provider, and where? Classify the code that resides on the cloud servers Determine if servers sit only in the US or outside the US Obtain authorizations for development on server-side code

39 Challenges Other Jurisdictions Export and Import Authorizations for other countries Special challenges: Canada EU France Israel China Russia Japan Other

40 Compliance Strategies Two basic approaches 1. Control access If ITAR-controlled, limit to U.S. persons Require servers and admin support to be in the U.S. Ensure screening for denied parties If EAR controlled, limit to company employees Leasing space / company

41 Compliance Approaches (cont d) 2. Control data Limit to data in the public domain (or potentially NLR) Do not provide software for download

42 Strategies (cont d) Traditional compliance measures, including: Clear classification of data in cloud zones EAR ECCN as needed ITAR simple ITAR designation likely enough Incorporate cloud into policies and training Examples: Provisioning, APIs, usage policies

43 Traditional Compliance (cont d) Ensure agreements for cloud use address risks Server locations U.S. person administrators if data is restricted Type of content / data Ensure appropriately scoped licenses or other authorizations are in place Terms and conditions to terminate services if export violation identified Training!

44 Strategies (cont d) Non-traditional measures, including: Continually review evolving IT security legal and regulatory requirements for defense contractors Ensure ongoing monitoring of IT security technology threats/incidents adapt accordingly Understand whether cybersecurity risks, incidents, and reporting have export control implications

45 Compliance Best Practices Risk Assessment Policies and Procedures Transaction / Business Activity Monitoring, Screening, Surveillance

46 Best Practices (cont d) Robust contract terms Use to implement the compliance approach (access controls or limits on controlled technology) End-use / end-user restrictions Prohibited content such as pornography Delineate responsibilities of each party Include responsibilities of provisioning partners and end-user responsibilities

47 Best Practices (cont d) Training Advice and Counsel Program Change Management Independent Testing / Audit Keep Good Records

Questions? 48

Laura Tomarchio Symantec Laura_Tomarchio@symantec.com Thad McBride Sheppard Mullin tmcbride@smrh.com Hilary Hageman CACI hhageman@caci.com Martina de la Torre Symantec Martina_delatorre@symantec.com THANK YOU!