Content Enablers ON DEMAND Courses Presents: Trade Compliance for INFORMATION TECHNOLOGY Professionals

Content Enablers ON DEMAND Courses Presents:   
Trade Compliance for INFORMATION TECHNOLOGY Professionals

   You can’t let your INFORMATION TECHNOLOGY team miss this series of ON-DEMAND Awareness-level courses tailored to their duties and responsibilities. These professionals are KEY to your overall compliance efforts.

·        Trade Compliance Overview for U.S. Information Technology Professionals
LEARN MORE  $130 per seat – Course Outline Below

 

·        Defense Controls Overview for U.S. Information Technology Professionals:    
LEARN MORE  $130 per seat – Course Outline Below

 

·        Dual-Use Controls Overview for U.S. Information Technology Professionals:
 LEARN MORE  $130 per seat – Course Outline Below

 

____________________________________________________________________

 

 

Learning Objectives

Enable learners to recognize situations that could give rise to the risk of a trade compliance violation and know how to respond in accordance with applicable laws and company policies.

 

Target Audience

Any employee in the information technology, information systems, or computer departments subject to U.S. dual-use controls and responsible for carrying out routine compliance-related tasks within their organization

 

Course Summaries

 

·        “Who are you doing business with?”

·        “What is the subject of your transaction?”

·        “How is your transaction being conducted?”

 

CE’s awareness-level Trade Compliance Overview for U.S. Information Technology: Overview, Defense Controls, and Dual-Use courses introduce individuals in the information technology, information systems, or computer departments subject to U.S. trade controls to these common themes of the trade process.

 

The courses are presented in clear, easy-to-understand microlearning elements that highlight key compliance concepts relevant to international trade and offers engaging scenarios that illustrate how these concepts can impact day-to-day situations.

 

 

University Endorsed
You’ll receive a Certificate of Completion from the Schar School of Policy and Government at George Mason University for each completed course.

______________________________________________________

Trade Compliance Overview for U.S. Information Technology Professionals
COURSE OUTLINE   REGISTRATION & DETAILS

 

·        Introduction to Trade Compliance for Information Technology

·        Who Is Involved in Your Transaction?

  • Introduction to ”Who” Key Concepts and Scenarios for Information Technology
  • U.S. Exports
    • Export of U.S. Technical Information
    • Exporting Software
  • U.S. Screening
  • Scenarios
    • Exporting Technical Information: Using Websites to Share Information with Partners
    • Exporting U.S. Technical Information: Obtaining Information System Services from Third Parties
    • Exporting Software: Segmenting Data Management Systems
    • Exporting Software: My Colleague Requests Access to a Collaboration Environment
    • End-User Restrictions: My Sales Partner Is Under Investigation for Violating Trade Laws

·        Resources Available

·        What Is the Subject of Your Transaction?

  • Introduction to “What” Key Concepts and Scenarios for Information Technology
  • Control Lists
    • U.S. Control Lists
  • Authorizations
    • U.S. Export Authorizations
    • U.S. Penalties for Export Control Violations
  • Scenarios
    • Authorizations Under the EAR: Engaging Consulting Firms

·        Resources Available

·        How Is Your Transaction Being Conducted?

  • Introduction to “How” Key Concepts and Scenarios for Information Technology
  • The Foreign Corrupt Practices Act
  • Diversion
  • Reporting
  • Scenarios
    • Reporting: Accurate Reporting to Hierarchy and Authorities

·        Resources Available

·        Training Summary

 

______________________________________________________

Trade Compliance Overview for U.S. Information Technology Professionals: Defense Controls
COURSE OUTLINE   REGISTRATION & DETAILS

 

·        Introduction to Trade Compliance for Information Technology

·        Who Is Involved in Your Transaction?

  • Introduction to ”Who” Key Concepts and Scenarios for Information Technology
  • U.S. Exports
    • Export of U.S. Technical Information
    • Exporting Software
  • U.S. Screening
  • Scenarios
    • Exporting U.S. Technical Information: Sharing Data Using Websites
    • Exporting U.S. Technical Information: Outsourcing Information Technology
    • Exporting U.S. Technical Information: Using Websites to Share Technical Data with Suppliers
    • Exporting U.S. Technical Information: Setting Up External Websites with Controlled Data
    • Exporting Software: Segmenting Data Management Systems
    • Exporting Software: My Colleague Requests Access to a Collaboration Environment

·        Resources Available

·        What Is the Subject of Your Transaction?

  • Introduction to “What” Key Concepts and Scenarios for Information Technology
  • Control Lists
    • U.S. Control Lists
  • Authorizations
    • U.S. Export Authorizations
    • U.S. Penalties for Export Control Violations
  • Scenarios
    • Authorizations Under the EAR: Working with Third-Party Labor Providers
    • Authorizations Under the EAR: Emailing Data to Suppliers

·        Resources Available

·        How Is Your Transaction Being Conducted?

  • Introduction to “How” Key Concepts and Scenarios for Information Technology
  • The Foreign Corrupt Practices Act
  • Diversion
  • Reporting
  • Scenarios
    • Reporting: Accurate Reporting to Hierarchy and Authorities

·        Resources Available

·        Training Summary

 

______________________________________________________

Trade Compliance Overview for U.S. Information Technology Professionals: Dual-Use Controls
COURSE OUTLINE   REGISTRATION & DETAILS

 

·        Introduction to Trade Compliance for Information Technology

·        Who Is Involved in Your Transaction?

  • Introduction to ”Who” Key Concepts and Scenarios for Information Technology
  • U.S. Exports
    • Export of U.S. Technical Information
    • Exporting Software
  • U.S. Screening
  • Scenarios
    • Exporting Technical Information: Using Websites to Share Information with Partners
    • Exporting U.S. Technical Information: Setting Up External Websites with Controlled Data
    • Exporting U.S. Technical Information: Obtaining Information System Services from Third Parties
    • Exporting Software: Segmenting Data Management Systems
    • Exporting Software: My Colleague Requests Access to a Collaboration Environment

·        Resources Available

·        What Is the Subject of Your Transaction?

  • Introduction to “What” Key Concepts and Scenarios for Information Technology
  • Control Lists
    • U.S. Control Lists
  • Authorizations
    • U.S. Export Authorizations
    • U.S. Penalties for Export Control Violations
  • Scenarios
    • Authorizations Under the EAR: Working with Third-Party Labor Providers
    • Authorizations Under the EAR: Emailing Data to Suppliers

·        Resources Available

·        How Is Your Transaction Being Conducted?

  • Introduction to “How” Key Concepts and Scenarios for Information Technology
  • The Foreign Corrupt Practices Act
  • Diversion
  • Reporting
  • Scenarios
    • Reporting: Accurate Reporting to Hierarchy and Authorities

·        Resources Available

·        Training Summary

Categories