Cost per seat

Sold out

Number of seats

Course Summary

“Who are you doing business with?” “What is the subject of your transaction?” “How is your transaction being conducted?” CE’s awareness-level Trade Compliance Overview for U.S. Information Technology: Defense Controls course introduces individuals in the information technology, information systems, or computer departments subject to U.S. defense controls to these common themes of the trade process. The course is presented in clear, easy-to-understand microlearning elements that highlight key compliance concepts relevant to international trade and offers engaging scenarios that illustrate how these concepts can impact day-to-day situations.

Users will receive a certificate of completion from George Mason University upon successful completion of this course.  

Learning Objectives

Enable learners to recognize situations that could give rise to the risk of a trade compliance violation and know how to respond in accordance with applicable laws and company policies.

Target Audience

Any employee in the information technology, information systems, or computer departments subject to U.S. defense controls and responsible for carrying out routine compliance-related tasks within their organization

Course Duration: 46 minutes

Certificate of Completion: George Mason University

Course Outline

Introduction to Trade Compliance for Information Technology

Who Is Involved in Your Transaction?

  • Introduction to ''Who'' Key Concepts and Scenarios for Information Technology
  • U.S. Exports
    • Export of U.S. Technical Information
    • Exporting Software
  • U.S. Screening
  • Scenarios
    • Exporting U.S. Technical Information: Sharing Data Using Websites
    • Exporting U.S. Technical Information: Outsourcing Information Technology
    • Exporting U.S. Technical Information: Using Websites to Share Technical Data with Suppliers
    • Exporting U.S. Technical Information: Setting Up External Websites with Controlled Data
    • Exporting Software: Segmenting Data Management Systems
    • Exporting Software: My Colleague Requests Access to a Collaboration Environment

Resources Available

What Is the Subject of Your Transaction?

  • Introduction to “What” Key Concepts and Scenarios for Information Technology
  • Control Lists
    • U.S. Control Lists
  • Authorizations
    • U.S. Export Authorizations
    • U.S. Penalties for Export Control Violations
  • Scenarios
    • Authorizations Under the EAR: Working with Third-Party Labor Providers
    • Authorizations Under the EAR: Emailing Data to Suppliers

Resources Available

How Is Your Transaction Being Conducted?

  • Introduction to “How” Key Concepts and Scenarios for Information Technology
  • The Foreign Corrupt Practices Act
  • Diversion
  • Reporting
  • Scenarios
    • Reporting: Accurate Reporting to Hierarchy and Authorities

Resources Available

Training Summary

Additional Courses to Consider

Sold out
Sold out
Sold out
Sold out