SlideShare une entreprise Scribd logo
1  sur  15
NCURA Conference Export Controls and Embargoes,  What You Never Wanted to Know November, 2002 Jamie Lewis Keith, Senior Counsel Massachusetts Institute of Technology
A.  How Does An Academic Research Institution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2 B.  Not An Easily Answered Question ,[object Object]
C.  Five Key Elements To Successful Compliance Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3
D.  How To Keep It Simple 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E.  When Export Controls (EAR, ITAR, Embargoes) Do Not Apply Public Domain/Publicly Available ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],5
6 E.  When Export Controls (EAR, ITAR, Embargoes) Do Not Apply Public Domain/Publicly Available ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],E.  When Export Controls (EAR, ITAR, Embargoes) Do Not Apply Public Domain/Publicly Available 7
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],E.   When Export Controls (EAR, ITAR, Embargoes) Do Not Apply US University Fundamental Research 8
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9 E.   When Export Controls (EAR, ITAR, Embargoes) Do Not Apply US University Fundamental Research
10 ,[object Object],[object Object],[object Object],E.   When Export Controls (EAR, ITAR, Embargoes) Do Not Apply US University Fundamental Research
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],F.   When Export Controls Do or May Apply Helpful Thresholds – License Required? 11
12 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],F.   When Export Controls Do or May Apply Helpful Thresholds – License Required?
13 ,[object Object],[object Object],[object Object],4. If Exclusions Do Not Apply,  And  Equipment, Software, Information Is On USML, License Is Required  Before  Any Exposure to Foreigners In US, Even On Campus (deemed export) or Transfer or Travel Abroad ,[object Object],[object Object],[object Object],[object Object],[object Object],F.   When Export Controls Do or May Apply Helpful Thresholds – License Required?
14 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],G.   Major Truths

Contenu connexe

Similaire à OctoberEmbargoConference51

August Presentation On Special Export Controls With References
August Presentation On Special Export Controls With ReferencesAugust Presentation On Special Export Controls With References
August Presentation On Special Export Controls With ReferencesExport Experts, LLC
 
Export Control Laws Training
Export Control Laws TrainingExport Control Laws Training
Export Control Laws Trainingkwaters001
 
Demystifying US Export Control Regulations for Dual-Use Technologies
Demystifying US Export Control Regulations for Dual-Use TechnologiesDemystifying US Export Control Regulations for Dual-Use Technologies
Demystifying US Export Control Regulations for Dual-Use TechnologiesKTN
 
Export control training presentation
Export control training presentationExport control training presentation
Export control training presentationRichard Cirulli
 
Export-Control-and-Postgraduate-Research-Students.pdf
Export-Control-and-Postgraduate-Research-Students.pdfExport-Control-and-Postgraduate-Research-Students.pdf
Export-Control-and-Postgraduate-Research-Students.pdfUKCGE
 
2007-04-13_export_control_basics_rom_7-16-08.ppt
2007-04-13_export_control_basics_rom_7-16-08.ppt2007-04-13_export_control_basics_rom_7-16-08.ppt
2007-04-13_export_control_basics_rom_7-16-08.pptSoiabKhan1
 
Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2KMb Unit, York University
 
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...VMware Tanzu
 
Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3Robert Corona
 
Medical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMedical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMichael Swit
 
Medical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMedical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMichael Swit
 
ITAR Compliance and Interactions with Customers, Suppliers and Visitors
ITAR Compliance and Interactions with Customers, Suppliers and VisitorsITAR Compliance and Interactions with Customers, Suppliers and Visitors
ITAR Compliance and Interactions with Customers, Suppliers and VisitorsLinqs
 
UCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and CostsUCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and CostsStanford University
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery ProcessDaegis
 
Export Control Overview
Export Control OverviewExport Control Overview
Export Control OverviewJerry Bishop
 
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clini...
FDA 2013 Clinical Investigator Training Course:  Ensuring the Safety of Clini...FDA 2013 Clinical Investigator Training Course:  Ensuring the Safety of Clini...
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clini...MedicReS
 

Similaire à OctoberEmbargoConference51 (20)

August Presentation On Special Export Controls With References
August Presentation On Special Export Controls With ReferencesAugust Presentation On Special Export Controls With References
August Presentation On Special Export Controls With References
 
Export Control Laws Training
Export Control Laws TrainingExport Control Laws Training
Export Control Laws Training
 
Demystifying US Export Control Regulations for Dual-Use Technologies
Demystifying US Export Control Regulations for Dual-Use TechnologiesDemystifying US Export Control Regulations for Dual-Use Technologies
Demystifying US Export Control Regulations for Dual-Use Technologies
 
Export control training presentation
Export control training presentationExport control training presentation
Export control training presentation
 
Export-Control-and-Postgraduate-Research-Students.pdf
Export-Control-and-Postgraduate-Research-Students.pdfExport-Control-and-Postgraduate-Research-Students.pdf
Export-Control-and-Postgraduate-Research-Students.pdf
 
Working with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled TechnologyWorking with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled Technology
 
2007-04-13_export_control_basics_rom_7-16-08.ppt
2007-04-13_export_control_basics_rom_7-16-08.ppt2007-04-13_export_control_basics_rom_7-16-08.ppt
2007-04-13_export_control_basics_rom_7-16-08.ppt
 
Working with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled TechnologyWorking with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled Technology
 
Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2
 
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
 
Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3
 
Medical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMedical Device Advertising Law & Regulation
Medical Device Advertising Law & Regulation
 
Medical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMedical Device Advertising Law & Regulation
Medical Device Advertising Law & Regulation
 
ITAR Compliance and Interactions with Customers, Suppliers and Visitors
ITAR Compliance and Interactions with Customers, Suppliers and VisitorsITAR Compliance and Interactions with Customers, Suppliers and Visitors
ITAR Compliance and Interactions with Customers, Suppliers and Visitors
 
UCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and CostsUCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
 
ITAR Boot Camp
ITAR Boot CampITAR Boot Camp
ITAR Boot Camp
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
 
The SIU Group Brief PPP
The SIU Group Brief PPPThe SIU Group Brief PPP
The SIU Group Brief PPP
 
Export Control Overview
Export Control OverviewExport Control Overview
Export Control Overview
 
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clini...
FDA 2013 Clinical Investigator Training Course:  Ensuring the Safety of Clini...FDA 2013 Clinical Investigator Training Course:  Ensuring the Safety of Clini...
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clini...
 

Plus de guest66dc5f

Os Timed Original
Os Timed OriginalOs Timed Original
Os Timed Originalguest66dc5f
 
Control your entire house with your iPhone
Control your entire house with your iPhoneControl your entire house with your iPhone
Control your entire house with your iPhoneguest66dc5f
 
Awesome car collection
Awesome car collectionAwesome car collection
Awesome car collectionguest66dc5f
 
Freaky car number plates
Freaky car number platesFreaky car number plates
Freaky car number platesguest66dc5f
 
Sunil-Hacking_firefox
Sunil-Hacking_firefoxSunil-Hacking_firefox
Sunil-Hacking_firefoxguest66dc5f
 
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Codeguest66dc5f
 
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_WindowsChetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_Windowsguest66dc5f
 
WHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_LawWHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_Lawguest66dc5f
 
Rohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_lawsRohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_lawsguest66dc5f
 
Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2guest66dc5f
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toasterguest66dc5f
 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniquesguest66dc5f
 
Varun-Subtle_Security_flaws
Varun-Subtle_Security_flawsVarun-Subtle_Security_flaws
Varun-Subtle_Security_flawsguest66dc5f
 
longisland_golf_07
longisland_golf_07longisland_golf_07
longisland_golf_07guest66dc5f
 
GolfLakeCity_002
GolfLakeCity_002GolfLakeCity_002
GolfLakeCity_002guest66dc5f
 

Plus de guest66dc5f (20)

Os Timed Original
Os Timed OriginalOs Timed Original
Os Timed Original
 
Control your entire house with your iPhone
Control your entire house with your iPhoneControl your entire house with your iPhone
Control your entire house with your iPhone
 
Awesome car collection
Awesome car collectionAwesome car collection
Awesome car collection
 
Freaky car number plates
Freaky car number platesFreaky car number plates
Freaky car number plates
 
David-FPGA
David-FPGADavid-FPGA
David-FPGA
 
Sunil-Hacking_firefox
Sunil-Hacking_firefoxSunil-Hacking_firefox
Sunil-Hacking_firefox
 
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
 
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_WindowsChetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
 
WHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_LawWHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_Law
 
Rohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_lawsRohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_laws
 
David-FPGA
David-FPGADavid-FPGA
David-FPGA
 
Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toaster
 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniques
 
Varun-Subtle_Security_flaws
Varun-Subtle_Security_flawsVarun-Subtle_Security_flaws
Varun-Subtle_Security_flaws
 
CostofWarinIraq
CostofWarinIraqCostofWarinIraq
CostofWarinIraq
 
NR-golf-sept07
NR-golf-sept07NR-golf-sept07
NR-golf-sept07
 
golf
golfgolf
golf
 
longisland_golf_07
longisland_golf_07longisland_golf_07
longisland_golf_07
 
GolfLakeCity_002
GolfLakeCity_002GolfLakeCity_002
GolfLakeCity_002
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

OctoberEmbargoConference51

  • 1. NCURA Conference Export Controls and Embargoes, What You Never Wanted to Know November, 2002 Jamie Lewis Keith, Senior Counsel Massachusetts Institute of Technology
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.