METHOD FOR MEETING U.S. GOVERNMENT SECURITY CONTROLS UNDER EXPORT CONTROL REGIMES
First Claim
1. A method for allowing a United States entity to commercially exploit highly restricted mobile technologies in order to allow a foreign entity to perform task objectives while complying with statutory and regulatory requirements of the United States, said requirements including the necessity to obtain permission from a U.S. authority authorized grant such permission before such exploitation, comprising the steps of:
- filing an application to the appropriate government agency or department for a license to exploit the technology in cooperation with a foreign entity;
preparing a service lease agreement said agreement between the U.S. entity and the foreign entity, said service lease maintaining title to the technology in the U.S. entity at all times;
establishing a compliance policy instituting procedures for handling the technology in accordance with U.S. law and regulations;
training personnel employed by the U.S. entity as to the procedures;
obtaining a body of pre-approved technical information for disclosure to the foreign entity in order to allow the foreign entity to intelligently discuss what technology and service is being provided, without disclosing sensitive information;
preparing a task agreement between the U.S. entity and the foreign entity whereby the foreign entity controls selected non-security related portions of the technology commensurate with the task objectives to be performed;
preparing an operating agreement between the U.S. entity and the foreign entity whereby the U.S. entity controls selected security related operations of the technology and components thereof including provisions governing navigation, aiming, range and recovery accessability out side of the United States.
0 Assignments
0 Petitions
Accused Products
Abstract
A business method which enables full conformance and probable approval within the U.S. International Export Controls, such as the Export Administration Regulation (EAR); the International Traffic in Arms Regulation (ITAR); and the international Missile Technology Control Regime (MTCR) even though the item may normally be precluded from export. The method includes filing an application for a license to exploit the technology; and including in the application commitments by the participants to comply with and follow certain security related procedures, including a service lease, security compliance training; pre-approval of technical disclosures; and operations and task compartmentalization among the parties.
20 Citations
5 Claims
-
1. A method for allowing a United States entity to commercially exploit highly restricted mobile technologies in order to allow a foreign entity to perform task objectives while complying with statutory and regulatory requirements of the United States, said requirements including the necessity to obtain permission from a U.S. authority authorized grant such permission before such exploitation, comprising the steps of:
-
filing an application to the appropriate government agency or department for a license to exploit the technology in cooperation with a foreign entity; preparing a service lease agreement said agreement between the U.S. entity and the foreign entity, said service lease maintaining title to the technology in the U.S. entity at all times; establishing a compliance policy instituting procedures for handling the technology in accordance with U.S. law and regulations; training personnel employed by the U.S. entity as to the procedures; obtaining a body of pre-approved technical information for disclosure to the foreign entity in order to allow the foreign entity to intelligently discuss what technology and service is being provided, without disclosing sensitive information; preparing a task agreement between the U.S. entity and the foreign entity whereby the foreign entity controls selected non-security related portions of the technology commensurate with the task objectives to be performed; preparing an operating agreement between the U.S. entity and the foreign entity whereby the U.S. entity controls selected security related operations of the technology and components thereof including provisions governing navigation, aiming, range and recovery accessability out side of the United States. - View Dependent Claims (2, 3)
-
-
4. A method for allowing a United States entity to commercially exploit a vehicle classified as dual use technology in order to allow a foreign entity to utilize the technology to perform task objectives while complying with statutory and regulatory requirements of the United States, said requirements including the necessity to obtain permission from a U.S. authority authorized grant such permission before such exploitation can legally occur, comprising the steps of:
-
filing an application for a license to exploit the technology; preparing a service lease agreement whereby title to the vehicle remains in the U.S. entity at all times; establishing a compliance policy for handling the technology in accordance with U.S. law and regulations; training personnel employed by the U.S. entity as to the policy; obtaining a body of pre-approved technical information for disclosure to the foreign entity; preparing a task agreement for allowing the foreign entity to perform certain functions commensurate with the task objectives to be performed; preparing an operating agreement between the U.S. entity and the foreign entity whereby the U.S. entity controls selected security related operations including navigation, aiming, range and recovery accessability without the United States.
-
-
5. A business method which enables full conformance and probable approval for the exploitation of a restricted technology, by participants including U.S. and non-U.S. entities, even though technology may normally be precluded from export within the U.S. International Export Controls, such as the Export Administration Regulation (EAR);
- the International Traffic in Arms Regulation (ITAR); and
the international Missile Technology Control Regime (MTCR), the method comprising the steps of;filing an application for a license to exploit the technology; incorporating in the application commitments by the participants to comply with and follow certain security related procedures, including an agreement by the non U.S. participant to a service lease where title to the technology remains in a U.S. entity, an agreement to perform security compliance training for personnel;
obtaining pre-approval of technical disclosures to the non-U.S. entity; and
compartmentalization of operations and task functions between the U.S. and non U.S. participants.
- the International Traffic in Arms Regulation (ITAR); and
Specification