No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Compliance

When National Security, Regulatory Compliance & Information Governance Collide

Access control, device management and information governance crucial for ITAR-covered organizations

by Renato Fazzone and Mike Carter
November 4, 2024
in Compliance
sign in front of state department building

Exposure of sensitive or protected data isn’t merely a violation of data privacy regulations — it could also be a matter of national security, as multiple companies have recently learned. Renato Fazzone and Mike Carter of FTI explore issues related to State Department investigations.

The State Department recently resolved multiple investigations into corporations for hundreds of violations of the International Traffic in Arms Regulations (ITAR) and other export control laws. While these charges were connected to unauthorized exports and transfers of defense articles to multiple countries and violations of regulatory terms, they also underscored fundamental information governance oversights that contributed to serious compliance failures.

Several important governance lessons can be gleaned from the recent State Department investigations, across access control, device management, information governance policy and the role of self-reporting in compliance programs. Many organizations may primarily consider these areas of information governance and compliance in the context of data-specific regulations, privacy requirements and other legal risks. However, these cases highlight that information management policy and process breakdowns can carry severe implications, ranging from isolated sanctions violations to national security threats and hundreds of millions of dollars in penalties.

Data-transfer violations

One of the State Department’s recent cases, which was included as part of a $200 million settlement, involved unauthorized access to company information from an employee’s device while the employee was traveling in an ITAR-restricted destination. As described in a company disclosure to the State Department, the employee took a company-issued laptop that contained ITAR-controlled technical data and was capable of accessing the company’s U.S. network, on two personal trips to a prohibited country.

Though the employee had submitted a formal request to bring the laptop on the first trip, the country was not listed as a destination. A later update to the request indicated that the employee had been rerouted to the destination, but this was overlooked in review and not escalated. On a second trip, the employee similarly did not include the destination on the request to travel with company-issued devices. A later annotation to the request included the country name, but this was again overlooked and not investigated.

When these violations were later discovered during a compliance review and subsequently investigated by the government, it was determined that the incident exposed technical data with adverse impact to U.S. national security and Department of Defense programs.  

Charges against a separate company revealed similar data access control breakdowns, resulting in exports and retransfers of sensitive technical data to unauthorized contractors, employees and countries. In numerous incidents, ITAR-controlled data was illegitimately downloaded and/or shared from an internal company document repository. Upon investigation, the company deemed that in some instances, the data had been misclassified, leaving it exposed to unauthorized access. Alongside other violations, these incidents resulted in more than $50 million in fines to the company.

pitfall video game
Data Privacy

How Leaders Can Avoid Modern Data Pitfalls

by Bobby Balachandran
September 30, 2024

Mitigating risks of data is critical to getting the most out of new technology

Read moreDetails

Protecting vulnerable data assets

Given the increasing sensitivity, dispersion, volume, complexity, value and vulnerability of data across sectors, organizations operating as government vendors or subject to regulations like ITAR must recognize information governance as a business imperative. Preventing exposure of sensitive or protected data may very well be a matter of national security. Fundamentals companies need to evaluate and strengthen in their programs include:

  • Data protection policies that address uniquely sensitive data, including technical data that may be governed by ITAR or other similar laws.
  • Rigorous data classification and labeling, supported by clear authorization processes that must be followed for accessing and sharing each class of data.
  • Access controls based on employee status, role, nationality and geographic location.
  • Device management that automatically restricts access to company networks from unauthorized locations and notifies compliance teams of suspicious device access or activity.
  • Governance and compliance officers — supported by advanced technology — to monitor for and investigate activity that violates regulatory requirements and/or company policies.
  • Internal procedures for quickly flagging and escalating potential compliance violations, so they may be quickly understood and mitigated.
  • Routine data access and protection testing conducted by skilled, independent third parties or internal audit.
  • A defensible data archiving and deletion process for sensitive data that falls outside prescribed recordkeeping requirements to limit excessive exposure to data leakage.
  • Strategy for how issues are handled once known, including the parameters, processes and personnel needed for determining when and how to voluntarily disclose violations to regulatory agencies.

These recent ITAR violations illustrate the importance of appropriately classifying data, implementing safeguards against wrongful transfer and maintaining strong access controls. Additionally, they make a case for the need to have strong data protection and compliance policies and processes in place — because even while strong controls may not prevent every incidence of data exposure, they make it easier for companies to detect issues faster. This in turn improves internal investigation processes and can support timely reporting when cooperation with regulatory authorities is needed.


Tags: Data Governance
Previous Post

The Liar’s Dividend & What Corporate Leaders Can Learn From GenAI’s Impact on Election Day

Next Post

CFPB’s Complaint System Is Being Manipulated; Are AI Tools the Answer?

Renato Fazzone and Mike Carter

Renato Fazzone and Mike Carter

Renato Fazzone is a senior managing director at FTI Consulting and is a member of the technology practice, based in the Düsseldorf office, which he founded in 2020. He has worked exclusively in the technology field since the early 2000s and he has amassed considerable experience in both the technical and strategic application of technology regarding regulatory requirements, as well as those of the clients he represents.
Mike Carter is a senior managing director at FTI Consulting. He has extensive experience providing advisory and investigative services for financial crime matters globally, including leading complex engagements for financial institutions, digital asset service providers, construction firms, manufacturing and distribution companies and utilities services to address risk and compliance concerns.

Related Posts

doj building sign with flags

‘Reasonable Steps’: What the DOJ Expects From Your Bulk Data Transfer Compliance Program

by Alexandra P. Moylan, Alisa L. Chestler and Michael J. Halaiko
May 5, 2025

Sample provisions offer blueprint for compliant data brokerage with foreign entities

data security program concept cameras

Your Sensitive Data Is Now a National Security Matter: The DOJ’s New Data Security Program

by Randall Cook, Vince Mekles and Rachel Woloszynski
April 29, 2025

90-day implementation window closing on regulations affecting companies with genomic, biometric, health and other personal information

Electronic Evidence Collection for eDiscovery and Compliance

Electronic Evidence Collection for eDiscovery and Compliance

by Corporate Compliance Insights
March 30, 2025

Are you prepared to manage modern data sources in your compliance program? Whitepaper Electronic Evidence Collection for eDiscovery and Compliance...

examining data on laptop screen

Privacy Rights Surge Forces Rethink of Data Management

by Gal Ringel
March 14, 2025

As global privacy regulations multiply, organizations face mounting pressure to efficiently respond to data subject requests amid complex data environments

Next Post
consumer financial protection bureau building sign

CFPB’s Complaint System Is Being Manipulated; Are AI Tools the Answer?

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights