SlideShare une entreprise Scribd logo
1  sur  15
NCURA Conference Export Controls and Embargoes,  What You Never Wanted to Know November, 2002 Jamie Lewis Keith, Senior Counsel Massachusetts Institute of Technology
A.  How Does An Academic Research Institution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2 B.  Not An Easily Answered Question ,[object Object]
C.  Five Key Elements To Successful Compliance Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3
D.  How To Keep It Simple 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E.  When Export Controls (EAR, ITAR, Embargoes) Do Not Apply Public Domain/Publicly Available ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],5
6 E.  When Export Controls (EAR, ITAR, Embargoes) Do Not Apply Public Domain/Publicly Available ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],E.  When Export Controls (EAR, ITAR, Embargoes) Do Not Apply Public Domain/Publicly Available 7
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],E.   When Export Controls (EAR, ITAR, Embargoes) Do Not Apply US University Fundamental Research 8
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9 E.   When Export Controls (EAR, ITAR, Embargoes) Do Not Apply US University Fundamental Research
10 ,[object Object],[object Object],[object Object],E.   When Export Controls (EAR, ITAR, Embargoes) Do Not Apply US University Fundamental Research
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],F.   When Export Controls Do or May Apply Helpful Thresholds – License Required? 11
12 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],F.   When Export Controls Do or May Apply Helpful Thresholds – License Required?
13 ,[object Object],[object Object],[object Object],4. If Exclusions Do Not Apply,  And  Equipment, Software, Information Is On USML, License Is Required  Before  Any Exposure to Foreigners In US, Even On Campus (deemed export) or Transfer or Travel Abroad ,[object Object],[object Object],[object Object],[object Object],[object Object],F.   When Export Controls Do or May Apply Helpful Thresholds – License Required?
14 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],G.   Major Truths

Contenu connexe

Similaire à OctoberEmbargoConference51

August Presentation On Special Export Controls With References
August Presentation On Special Export Controls With ReferencesAugust Presentation On Special Export Controls With References
August Presentation On Special Export Controls With References
Export Experts, LLC
 
Export control training presentation
Export control training presentationExport control training presentation
Export control training presentation
Richard Cirulli
 
Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3
Robert Corona
 
UCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and CostsUCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
Stanford University
 

Similaire à OctoberEmbargoConference51 (20)

August Presentation On Special Export Controls With References
August Presentation On Special Export Controls With ReferencesAugust Presentation On Special Export Controls With References
August Presentation On Special Export Controls With References
 
Export Control Laws Training
Export Control Laws TrainingExport Control Laws Training
Export Control Laws Training
 
Demystifying US Export Control Regulations for Dual-Use Technologies
Demystifying US Export Control Regulations for Dual-Use TechnologiesDemystifying US Export Control Regulations for Dual-Use Technologies
Demystifying US Export Control Regulations for Dual-Use Technologies
 
Export control training presentation
Export control training presentationExport control training presentation
Export control training presentation
 
Export-Control-and-Postgraduate-Research-Students.pdf
Export-Control-and-Postgraduate-Research-Students.pdfExport-Control-and-Postgraduate-Research-Students.pdf
Export-Control-and-Postgraduate-Research-Students.pdf
 
Working with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled TechnologyWorking with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled Technology
 
2007-04-13_export_control_basics_rom_7-16-08.ppt
2007-04-13_export_control_basics_rom_7-16-08.ppt2007-04-13_export_control_basics_rom_7-16-08.ppt
2007-04-13_export_control_basics_rom_7-16-08.ppt
 
Working with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled TechnologyWorking with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled Technology
 
Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2
 
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
 
Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3
 
Medical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMedical Device Advertising Law & Regulation
Medical Device Advertising Law & Regulation
 
Medical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMedical Device Advertising Law & Regulation
Medical Device Advertising Law & Regulation
 
ITAR Compliance and Interactions with Customers, Suppliers and Visitors
ITAR Compliance and Interactions with Customers, Suppliers and VisitorsITAR Compliance and Interactions with Customers, Suppliers and Visitors
ITAR Compliance and Interactions with Customers, Suppliers and Visitors
 
UCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and CostsUCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
 
ITAR Boot Camp
ITAR Boot CampITAR Boot Camp
ITAR Boot Camp
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
 
The SIU Group Brief PPP
The SIU Group Brief PPPThe SIU Group Brief PPP
The SIU Group Brief PPP
 
Export Control Overview
Export Control OverviewExport Control Overview
Export Control Overview
 
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clini...
FDA 2013 Clinical Investigator Training Course:  Ensuring the Safety of Clini...FDA 2013 Clinical Investigator Training Course:  Ensuring the Safety of Clini...
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clini...
 

Plus de guest66dc5f

Os Timed Original
Os Timed OriginalOs Timed Original
Os Timed Original
guest66dc5f
 
Control your entire house with your iPhone
Control your entire house with your iPhoneControl your entire house with your iPhone
Control your entire house with your iPhone
guest66dc5f
 
Awesome car collection
Awesome car collectionAwesome car collection
Awesome car collection
guest66dc5f
 
Sunil-Hacking_firefox
Sunil-Hacking_firefoxSunil-Hacking_firefox
Sunil-Hacking_firefox
guest66dc5f
 
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
guest66dc5f
 
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_WindowsChetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
guest66dc5f
 
WHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_LawWHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_Law
guest66dc5f
 
Rohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_lawsRohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_laws
guest66dc5f
 
Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2
guest66dc5f
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toaster
guest66dc5f
 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniques
guest66dc5f
 
Varun-Subtle_Security_flaws
Varun-Subtle_Security_flawsVarun-Subtle_Security_flaws
Varun-Subtle_Security_flaws
guest66dc5f
 
longisland_golf_07
longisland_golf_07longisland_golf_07
longisland_golf_07
guest66dc5f
 
GolfLakeCity_002
GolfLakeCity_002GolfLakeCity_002
GolfLakeCity_002
guest66dc5f
 

Plus de guest66dc5f (20)

Os Timed Original
Os Timed OriginalOs Timed Original
Os Timed Original
 
Control your entire house with your iPhone
Control your entire house with your iPhoneControl your entire house with your iPhone
Control your entire house with your iPhone
 
Awesome car collection
Awesome car collectionAwesome car collection
Awesome car collection
 
Freaky car number plates
Freaky car number platesFreaky car number plates
Freaky car number plates
 
David-FPGA
David-FPGADavid-FPGA
David-FPGA
 
Sunil-Hacking_firefox
Sunil-Hacking_firefoxSunil-Hacking_firefox
Sunil-Hacking_firefox
 
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
 
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_WindowsChetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
 
WHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_LawWHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_Law
 
Rohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_lawsRohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_laws
 
David-FPGA
David-FPGADavid-FPGA
David-FPGA
 
Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toaster
 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniques
 
Varun-Subtle_Security_flaws
Varun-Subtle_Security_flawsVarun-Subtle_Security_flaws
Varun-Subtle_Security_flaws
 
CostofWarinIraq
CostofWarinIraqCostofWarinIraq
CostofWarinIraq
 
NR-golf-sept07
NR-golf-sept07NR-golf-sept07
NR-golf-sept07
 
golf
golfgolf
golf
 
longisland_golf_07
longisland_golf_07longisland_golf_07
longisland_golf_07
 
GolfLakeCity_002
GolfLakeCity_002GolfLakeCity_002
GolfLakeCity_002
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

OctoberEmbargoConference51

  • 1. NCURA Conference Export Controls and Embargoes, What You Never Wanted to Know November, 2002 Jamie Lewis Keith, Senior Counsel Massachusetts Institute of Technology
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.