DRAFT Office of Research Administration TECHNOLOGY

advertisement
Office of Research Administration
TECHNOLOGY CONTROL PLAN
This project/activity involves the use of export-controlled information. As a result, the
project/activity comes under the purview of either the State Department’s International
Traffic in Arms Regulations (ITAR) at Title 22, C.F.R., Parts 120-130 or the Department of
Commerce’s Export Administration Regulations (EAR) at Title 22, C.F.R. Parts 730-774.
In accordance with Export Control Regulations (EAR and ITAR), a Technology
Control Plan (TCP) is required in order to prevent unauthorized exportation of
protected items / products, information, or technology deemed to be sensitive to
national security or economic interests.
Date:
Title of Sponsored Project/Activity (Project):
Technical Description of Item, Technology, Equipment, Software to Be
Transferred:
Principal Investigator (PI):
Phone:
Email:
This plan has been approved and adopted by the Colorado School of Mines
__________________________________________________________
John M. Poate, Ph.D., Empowered Official
Vice President for Research and Technology Transfer
Office of Research Administration
1. Scope
All CSM employees having access to ITAR or EAR information owned by or
entrusted to CSM are within the scope of these requirements. Compliance with the
requirements set forth in the following TCP is mandatory.
2. Information Subject to Control
The Project has been identified to fall under ITAR. The definition of what articles
and services are subject to the ITAR is defined in the ITAR in section 120.3, and is
reproduced below:
An article or service may be designated or determined in the future to be a defense
article (see § 120.6) or defense service (see § 120.9) if it:
(a) Is specifically designed, developed, configured, adapted, or modified for a
military application, and
(i) Does not have predominant civil applications, and
(ii) Does not have performance equivalent (defined by form, fit and
function) to those of an article or service used for civil applications; or
(b) Is specifically designed, developed, configured, adapted, or modified for a
military application, and has significant military or intelligence applicability such
that control under this subchapter is necessary.
The intended use of the article or service after its export (i.e., for a military or
civilian purpose) is not relevant in determining whether the article or service is
subject to the controls of this subchapter. Any item covered by the U.S. Munitions
List must be within the categories of the U.S. Munitions List. The scope of the U.S.
Munitions List shall be changed only by amendments made pursuant to section 38
of the Arms Export Control Act (22 U.S.C.2778).
Specifically, the Project is controlled by ITAR Category XII – Fire Control, Range
Finder, Optical and Guidance and Control Equipment.
Physical Security Plan:
Project data, materials (Controlled Information) and equipment (Controlled
Technology) will be physically shielded from observation by unauthorized
individuals by operating in secured laboratory spaces, or during secure time blocks
when observation by unauthorized persons is prevented.
Office of Research Administration
a. Location: (describe the physical location of each sensitive technology /
item to include building and room numbers. Attachment of a diagram of
the location is highly recommended)
b. Physical Security: (provide a detailed description of your physical
security plan designed to protect your item/technology form unauthorized
access, ie., secure doors, limited access, security badges, CCTV, etc.)
c. Perimeter Security: (describe perimeter security features of the location
of the protected technology / item)
3. Information/Technology Security Plan
a. Communications
Conversations. Discussions about the Project are limited to the Project
Personnel identified below and held only in areas where unauthorized
personnel are not present. Discussions with third party sub-contractors
will only be conducted under signed confidentiality agreements subject to
U.S. export control regulations.
Voicemail. Voicemail shall not be used to share Controlled Information.
Voicemail may be used for non-technical messages associated with the
Project (e.g., announcement of project meetings).
Instant Messaging. Instant messaging shall not be used to transmit
Controlled Information.
Telephone. Controlled Information may be transmitted by telephone or
through conference calls if previously authorized by both parties and U.S.
citizenship is confirm prior to release of Controlled Information.
Email. All emails containing Controlled Information shall contain a
contents label as follows and be encrypted at a level consistent with
corporate best practices.
“This email transmission contains information controlled for export purposes
under U.S. International Traffic in Arms Regulations (ITAR) and is intended for the
recipient only. No export, sale, transfer, release or other disposition of this
information is permitted without prior authorization from the U.S. Government.”
Email that contains Controlled Information shall only be sent to recipients that
the send has verified are authorized to receive Controlled Information.
Office of Research Administration
b. Controlled Information Identification
The technology will be clearly marked as export controlled. Electronic
files of Controlled Information will be marked in the header or footer as
export controlled. Raw data files will be stored on an external hard drive
physically marked as containing export controlled data. Physical marking
shall include the following disclosure:
“This __________ contains information controlled for export purposes under U.S.
International Traffic in Arms Regulations (ITAR). No export, sale, transfer, release
or other disposition of this information is permitted without prior authorization
from the U.S. Government.”
Or
“Export Controlled Information – ITAR”
c. IT Systems and Computer Security
Controlled Information will be processed on the PI’s laptop. Per CSM
standard procedures, the laptop has been installed with encryption
software that complies with current commercial standards. Controlled
Information will not be stored on any of the CSM servers but on external
hard drives under control of the PI. Each hard drive will also be
encrypted using CSM encryption software.
Email security. Project Personnel will work with CSM’s Campus
Computing, Communications and Information Technologies (CCIT)
Department to obtain email certificates which will guarantee sender and
receiver identities and encrypt the emails sent between certificate
holders.
d. Disposal
All Controlled Information will be removed from the external hard dive
upon completion of the project. Any hard copy of Controlled Information
will be shredded. Controlled Technology will be disassembled until each
component is no longer be classified as “controlled” under ITAR.
4. Project Personnel
a. Authorized Individuals: The following individuals are authorized to
work on the Project:
Office of Research Administration
No foreign national, as defined by 8 U.S.C. 1101(a)(20)1 or who is not a
protected individual as defined by 8 U.S.C. 1324b(a)(3)2, will perform
any work on the Project or have access to the Controlled Information and
Technology.
b. Personnel Screening Procedures: All personnel on the project are
screened against the U.S. Federal Governments Restricted and Denied
Party List and undergo criminal background checks and screening using
the U.S. Citizen and Immigration Services’ E-Verify System. In the event
that there is any concern regarding the citizenship of project personnel,
hard copy proof in the form of a U.S. birth certificate or passport will be
required.
c. Training: The PI shall ensure that all persons working on the Project are
aware of the content of ITAR rules and regulations and the contents of the
plan. Should any questions arise during the course of the Project or oneon-one trainings, they will be director to the Office of Research
Administration’s Research Compliance Officer.
5. Self-Evaluation Program
Project personnel shall report non-compliance with this TCP to the PI, who shall
work with the Office of Research Administration’s Research Compliance Officer to
determine what, if any, disciplinary or corrective action is required. Violations or
suspected violations of the ITAR shall be assessed and the Research Compliance
Officer, in connection with CSM upper management, shall determine the appropriate
action based on ITAR. A violation of the ITAR is the unauthorized release of ITAR
Controlled Information or Technology to foreign national(s).
All corrective actions will be handled in accordance to CSM policies and procedures,
including the CSM Faculty Handbook.
The Research Compliance Officer shall review the compliance status of the Project
semi-annually with the PI. The discussion will cover all items stated in this TCP and
how they were addressed by the Project and a review of any disciplinary or
corrective actions taken. The Research Compliance Officer will provide a written
summary of the discussion and an opinion of the compliance status of the Project to
the PI and also keep a copy of that summary on file.
Office of Research Administration
TECHNOLOGY CONTROL PLAN BREIFING
This is to acknowledge that I have read the Colorado School of Mines Technology
Control Plan relating to PROJECT TITLE. Accordingly, I understand the procedures as
contained in this TCP and agree to comply with all Colorado School of Mines and U.S.
government regulations as those regulations pertain to export controlled information. I
agree to update this plan as required and as additional personnel are added to this
project.
1
2
3
4
Signature
Printed
Name
Title
Signature
Printed
Name
Title
Signature
Printed
Name
Title
Signature
Printed
Name
Title
Date
Date
Date
Date
Office of Research Administration
TECHNOLOGY CONTROL PLAN AND NON DISCLOSURE STATEMENT
I acknowledge and understand that any technical data related to defense articles on the U.S.
Munitions List, or dual use goods on the Commerce Control List to which I have access or
which may be disclosed to me in the course of my employment at Colorado School of Mines,
is subject to export controls under the International Traffic in Arms Regulations (Title 22,
CFR, Parts 120-130), or the Export Administration Regulations (EAR) Parts 730-774. I
hereby certify that such data or technology will not be further disclosed, exported or
transferred in any manner to any foreign national or any foreign country without prior
written approval of the Office of Defense Trade Controls, U.S. Department of State or the
Bureau of Industry and Security, U.S. Department of Commerce.
I have read the Colorado School of Mines Technology Control Plan relating to PROJECT TITLE
and executed the Technology Control Plan Breifing.
Project Personnel:
Signature
Printed
Name
Signature
Printed
Name
Signature
Printed
Name
Date
Dept
Date
Dept
Date
Dept
Download