Intangible Technology Transfer (ITT) and UNSCR 1540



Similar documents
INTANGIBLE TRANSFER OF TECHNOLOGY (ITT) : Regulatory Perspective. Presented by Hjh Nuraffiza Ahmad Strategic Trade Division SKMM

This Policy supersedes the Terex Corporation Policy on Transactions in Iran, dated June 7, 2013.

Chinese Nonproliferation Policy and Export Control Practice Taibei August 28, 2013

India s Export Control System: Inter-Agency Cooperation and Coordination

Export Control Laws Training Presentation FLORIDA INSTITUTE OF TECHNOLOGY

BEST PRACTICES PAPER SHARING AMONG DOMESTIC COMPETENT AUTHORITIES INFORMATION RELATED TO THE FINANCING OF PROLIFERATION

The Strategic Trade Act (STA) 2010: Malaysia s Experience in the Implementation of Strategic Trade Management. Yangon, Myanmar 24 June 2015

MEXICO EXPORT CONTROL UPDATE IN

COMMITTEE ON HEMISPHERIC SECURITY (CHS) ORGANIZATION OF AMERICAN STATES (OAS) Washington D.C., 17 February 2011

Economic Drivers for Strategic Trade Management STM. George Tan 24 th ~ 26 th Jun 2015 Myanmar

Search Engine Marketing(SEM)

Joint ICTP-IAEA School of Nuclear Energy Management November Nuclear Security Fundamentals Module 9 topic 2

INTERNAL COMPLIANCE PROGRAM A GUIDE

Transit and Transhipment of Dual-Use Items. India. By Ritesh Kanodia and Aman Bhalla, Economic Laws Practice

Calling All Countries: The VoIP Revolution is Here!

BITEK INTERNATIONAL INC PRESENTS: MANAGING VOIP

Bureau of Industry and Security

Developments in UE export controls. Jasper Helder, Baker & McKenzie Amsterdam 9 November 2012

Professional Diploma in Digital Marketing

Implementing Catch All Controls A Risk Assessment-based Approach Toward Nonproliferation

CLOUD COMPUTING, EXPORT CONTROLS AND SANCTIONS. By Richard Tauwhare, Dechert LLP i

Policy and Procedures Date:

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Seagate Rescue Data Recovery Service Program Terms & Conditions

Who are the Stakeholders in Internet Governance?

The James Martin Center for Nonproliferation Studies. Export Control Outreach Activities in the Asian Region

A guide to the Defence Trade Controls Amendment Bill 2015

SC-A-063 (Ver 10-09/15) Page 3 of 6


The Strategic Importance, Causes and Consequences of Terrorism

CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79

ZIMPERIUM, INC. END USER LICENSE TERMS

The Autonomous Customer 2015: On-hold for Intelligent Customer Service - Global

Export Control Training

V Drops White Paper Mobile Voic Messaging: The Legal, Effective Solution. Mobile Voic Messaging: The Legal, Effective Solution

Next Business Telecom is also subject to other laws relating to the protection of personal information.

OVERVIEW. Export Control: Defined. Philippine Export Control Initiatives. IV. Government-Industry Cooperation. I. Background

U.S. Export Controls E X T R A T E R R I T O R I A L I T Y - T H E L O N G A R M O F U. S. L A W. P e t e r W. K l e s t a d t M a y 8,

Big Data in Telecom value chain. Presented by: Gurjot S Sandhu Director Sales Xalted Information Systems Pvt. Ltd.

Safewhere*Identify 3.4. Release Notes

Patriot Act Impact on Canadian Organizations Using Cloud Services

BITEK INTERNATIONAL INC PRESENTS: VoIP FILTERING

Voice Over Internet Protocol (VOIP)

Japan s Export Control System

Export Control Basics

CHAPTER 13: International Law, Norms, and Human Rights

InnoCaption TM Service Terms of Use

Delaware State University Policy

Export Control Compliance at General Electric. Kevin J. Cuddy Export Controls Manager GE Global Gov t Affairs & Policy

HOD: Electricity Licensing and Compliance National Energy Regulator of South Africa Kulawula House, 526 Vermeulen Street Arcadia, 0083 Pretoria

Export Controls: What are they? Why do we care?

Presentation to 21 st Asian Export Control Seminar The Wassenaar Arrangement and the ATT February Tokyo, Japan

How To Set Up A National Biological Laboratory Safety And Security Monitoring Program

CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

City of Edmonton Social Media Guidelines

Best Free Magento Extensions for Social Network By : M Connect Media

SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014

SURVEILLANCE AND PRIVACY

Disarmament and Non-Proliferation of Weapons of Mass Destruction in a Changing World August 30 September 03, 2010

Seat Matrix for M.Tech [Part-Time & Sponsored] Programmes. Department Programme Qualifying Degree Part Time Sponsored Applied Mechanics Mechanics

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

POLICY. Number: Mass Electronic Communication Responsible Office: Information Technology. I. INTRODUCTION (Purpose and Intent)

DELEGATION AGREEMENT

Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice

Other Review Dates: 15 July 2010, 20 October 2011

ORACLE LINUX AND ORACLE VM SERVICES AGREEMENT

Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data

REAL ESTATE DIGITAL MARKETING SOLUTION. Ver 1.11

CUSTOMER SERVICE MEETS SOCIAL MEDIA: BEST PRACTICES FOR ENGAGEMENT

Introduction To Commerce Department. Export Controls U.S. DEPARTMENT OF COMMERCE BUREAU OF INDUSTRY AND SECURITY OFFICE OF EXPORTER SERVICES

How To Learn Marketing Skills

Qualifying Degree and Seat Matrix for admission to M.Tech. (Part Time and Sponsored)

GENERAL SUBSCRIPTION CONDITIONS

How To Implement International Terrorism Agreements

One Hundred Tenth Congress of the United States of America

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored?

Department of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports

Oracle Technology Network Developer License Terms

PREAMBLE. THE GOVERNMENT OF THE UNITED STATES OF AMERICA and THE GOVERNMENT OF CANADA (hereinafter "the Parties");

COUNCIL OF THE EUROPEAN UNION. Brussels, 12 December /06 PESC 1278 CONOP 74 CODUN 38

Why VoIP Peer to Peer and Social Networking providers cannot ignore Legacy Telecoms! Or why Peer to Peer VoIP needs Voip-Pal IP to succeed!

DATA PROTECTION LAWS OF THE WORLD. India

CODE OF CONDUCT AND ETHICS

How To Understand The Online Advertising Market In Quatar

Transcription:

Intangible Technology Transfer (ITT) and UNSCR 1540 R. Ramachandran Frontline, New Delhi UNSCR 1540 Conference, IDSA February 26, 2014

UNSCR 1540 The Resolution does not explicitly mention Intangible Technology Transfers (ITT). But it is included as one of the 382 fields of control that the Resolution 1540 implies, which constitute the Compliance Matrix devised by the 1540 Committee. ITT controls are presumed to be part of the controls articulated in the Operative Paragraphs 3 (c-d) and 8 of the Resolution.

What are Intangible Technology Transfers? ITT includes Transfer of knowledge and skills by a person (technical assistance, training or instruction, consultation, collaborative research in universities and research institutions, research papers presented in a conference etc.) ** and Transfer of technology -- specific information or technical data necessary for the development, production or use of a product such as blueprints, schematics, diagrams etc. via e-mail, telephone, fax, software or the internet. ** Bilateral research programmes; Iran/DPRK Sanctions

Export controls on ITT By the very fact that ITTs are intangible, they constitute an extremely challenging component of export controls It involves markedly different approach than the usual controls in the supplier-recipient mode of transfer of physical goods It is not included in any control list of products and goods Distinct from catch all provisions and deemed exports Mechanisms for ITT controls include company audits, visa screening, raising awareness within industry, universities, research institutions and academia, and monitoring, surveillance & interception of telecommunication channels Basic research or information in public domain is exempt from export controls on ITT. The distinguishing line could, however, be difficult in practice in some cases (eg., research in nuclear physics, microbiology)

Questions on Compliance of National Legal and Enforcement Frameworks with UNSCR 1540 Q: Does UNSCR 1540 implementation mean compliance with respect to all the 382 fields? Is that the goal? Q: Why should, say, Burkina Faso or Vanuatu, which have no nuclear programmes, comply with fields related to nuclear proliferation? Legal measures are on paper and are more easily done. Implementation and enforcement measures cost money. A State would invest in these depending upon its own assessment of the threat perception with respect to a particular field of control. Q: Can one quantify the risk associated with ITT globally to demand compliance with regard to its control that could entail significant investment by the State.

Compliance and ITT Controls According to the 2011 Comprehensive Report on 1540 implementation, 66 States had measures within their control systems to cover ITT compared to 46 States in the 2008 report. Specifically, Nuclear Weapons: Chemical Weapons: Biological Weapons:

Compliance Assessment Compliance assessment is made on the basis of assertions made by the States in their National Reports and an evaluation of the evidence (available or provided) thereof by the Committee. an X [against a State in the matrix] does not indicate that the measure or measures taken fully implement an obligation under resolution 1540. It only indicates that the 1540 Committee and its experts have found evidence that the State has taken a measure or measures relevant to a particular field. How robust is this system of assessment to get to the goal of universal implementation of UNSCR 1540? Assessment is very likely to be more vague and nebulous in case of implementation of ITT controls. Do States provide actual instances of ITT in their states and corresponding measures taken as evidence?

India: Legal Measures According to the Compliance Matrix for India (2011) Nuclear Weapons: Atomic Energy Act, 1962 WMD Act 2005, Section 13(4) Chemical Weapons: WMD Act, 2005, Section 13 Biological Weapons: WMD Act, 2005, Section 13

Implementation Mechanisms for ITT Controls Telecom Monitoring/Surveillance System: The Central Monitoring System (CMS): A mass electronic surveillance data mining system set up by the Centre for Development of Telematics (C-DOT) and operated by Telecom Enforcement Resource and Monitoring (TERM) Cells. It enables security agencies to centrally access the national telecommunications network and listen in on and record mobile, landline and satellite calls and voice over Internet Protocol (VoIP), and read private emails, SMS and MMS and track the geographical location of individuals, all in real time. Also enables tracking of social media such as Facebook, LinkedIn and Twitter, and users' search histories on Google.

Issues in Surveillance Privacy and Human Rights violations Does the UNSCR Committee expect all States to put in place monitoring/surveillance mechanisms of this kind for compliance? Or, are there best practices elsewhere of a different kind that can be used for ITT controls?

Thank You