EBSIS Overview (UK Patent Pending) Mark Jones MT&L Consulting Ltd Tel: 0787 680 3690

Slides:



Advertisements
Similar presentations
Tilde Publishing and Distribution ISBN: Import/Export Mapping International Trade for Australian Business Customs.
Advertisements

Export Control Overview John R. Murphy Business Development Manager Sartomer Company October 4, 2004 Boston, MA.
Auditing, Assurance and Governance in Local Government
EXPORT CONTROLS. Export Controls are established to implement treaties and national security laws, generally protect national security and to combat terrorism.
Consultancy Infrastructure Requirements for Fast, Reliable and Secure HL7 V3 Messaging Andrew Hinchley CPL Consulting.
IPC 2-18, 1752 Standard for Materials Declaration
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Operational Information Service Procedural Statement.
Copyright © 2008 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Andrew Stone Common Security.
Carnegie Mellon Export Controls & Universities. Carnegie Mellon Introduction  Federal laws restricting the exports of goods and technology have been.
1-129 Form Deemed Export Attestation UTHSC May 16, 2011.
ISO 9001 Interpretation : Exclusions
 MODERN DATABASE MANAGEMENT SYSTEMS OVERVIEW BY ENGINEER BILAL AHMAD
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Winter Education Conference Contracting March 6, 2008 National Contract Management Association The Cape Canaveral Chapter.
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
Enterprise Asset Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SecureAware Building an Information Security Management System.
Lisa Marie Martinez.  What we are talking about  hierarchy of needs and information in high performing delivery systems  Who needs to know?  consumers.
SEC835 Database and Web application security Information Security Architecture.
Export Controls: General Overview
Export Control Presented by Research and Graduate Studies Elizabeth Peloso.
PAMS Export Control Page UTHSC Campus –Wide Business Managers Meeting May 17, 2012.
1 WARFIGHTER-FOCUSED, GLOBALLY RESPONSIVE, FISCALLY RESPONSIBLE SUPPLY CHAIN LEADERSHIP DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY.
Health Infrastructure Renewal Fund HIRF Program LHIN and Hospital Teleconference October 25, 2013.
ITAR/EAR The Short Overview The Security Summit Bob Ketts 22 March 2011.
CS 425/625 Software Engineering Legacy Systems
Arpil 19-22, 2004Export Compliance Training1 Export Compliance Management December 10, 2013.
Managing Government and Contractor Owned Assets at an OCONUS Location Ron C. Lobo, CPPM CF.
Massachusetts Open Standards Policy Claudia Boldman Director of Policy and Architecture Information Technology Division, MA.
ENVIRONMENTAL PERMITTING 1 Environmental Law. Environmental Permitting 2 Environmental Permitting (England and Wales) Regulations 2007 introduced a new.
Transition Planning Under Export Control Reform Cindy Peeters Trade Compliance Officer.
 U.S. laws and their implemented regulations that prohibit the unauthorized “export” of certain controlled ITEMS, INFORMATION OR SOFTWARE to foreign.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
12/26/2015 IPK, NTNU 1 RFID case 1: RFID and VCV (Value Chain Visibility) in Airbus Business Prof. Kesheng Wang Knowledge Discovery Laboratory (KDL) Department.
© 2002 Six Sigma Academy and Helix Systems1 Interface Overview Version 1.0.
Ensuring your data is in the right place at the right time John Chapman Senior Architect: Information Management Diplomas: Learning the lessons of.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Project management Topic 8 Configuration Management.
Cipfa.org What’s new on the technical accounting scene? Alan Bermingham Principal Consultant, CIPFA.
IMPROVED ASSET UTILIZATION Lack of visibility of assets and devices results in low equipment utilization rates, excess equipment purchasing and sometimes.
Trade Compliance Considerations April 13, © 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network.
Dynamicpartnerconnections.com Customizing CRM for Packaged Solutions Host: Joe Carroll Program Director Dynamic Partner Connections “Dynamics CRM Consulting.
THE DEVELOPMENT OF THE EU CODE OF CONDUCT ON ARMS EXPORTS: PRACTICAL IMPLEMENTATION IN THE UK Graham Glover Arms Trade Unit FCO, London.
University of Pennsylvania 1 1 Complying with U.S. Export Control Regulations: a University Perspective Elizabeth Peloso Associate Vice Provost/ Associate.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
1 Database Design Sections 6 & 7 First Normal Form (1NF), Second Normal Form (2NF), Unique Identifiers (UID), Third Normal Form (3NF), Arcs, Hierarchies.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Civil Assets, Stations & Facilities Project - ESTEEM (WLC) (Engineering Strategy for Economic & Efficient Management) April 2010.
Classification of Items on the Commerce Control List
EXPORT CONTROLS.
Data Protection Officer’s Overview of the GDPR
Pattison, Sampson, Ginsberg & Griffin, P.C.
Military End-Use Control
Chris Chew Export Control Organisation
Chapter Three Objectives
COMP3357 Managing Cyber Risk
Decision Tree for Application of Export Control Regulations
Export Controls Update
General Data Protection Regulation
GDPR Overview Gydeline – October 2017
Business Drivers and Requirements
GDPR Overview Gydeline – October 2017
Lynn Titus Jr (Tye) Export Controls Administrator
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

EBSIS Overview (UK Patent Pending) Mark Jones MT&L Consulting Ltd Tel:

THE EXPORT CONTROL ISSUE: ITAR requires the through life management and tracking of all US Munitions List Defence Articles and associated Technical Information. ITAR has a 100% see through rule from discrete ITAR controlled “CHILD” articles, requiring the elevation of management, End Use Restrictions and authorised Consignees and Intermediate Consignees to a “PARENT” asset when transacting at the higher level. Depending on the End Use and ECCN categorisation, EAR also requires through life management and tracking of specific US EAR Listed Dual Use articles. There are also other, non-Export Control reasons as to why a customer may want to identify and actively track particular articles such as cost, safety or security etc.

THE PROBLEM STATEMENT: How do I know what assets are ITAR and what are EAR? How does this result in contaminated “PARENT” articles and how can I identify them? How do I know what the specific US Export Authorisations are for each article to enable me to prevent an ITAR Violation? How do I know where to focus my resources on what is important to my business?

THE SOLUTION - EBSIS (UK Patent Pending) An Equipment Breakdown Structure Information System, proven solution, accurate and used across multiple live Defence Platforms by OEM organisations.

All Products and Platforms have an Equipment Breakdown structure.

However, some “PARENT” Articles will contain Export Comtrolled “CHILD” articles resulting in an ITAR asset management requirement of the discrete ITAR Article. Export Controlled Article

This also results, due to the 100% see through rule, the requirement to identify and manage contaminated “PARENT” articles to the same authorizations as the discrete ITAR Article CONTAMINATED Export Controlled Article

This approach and system of work can be used to identify: Assets required to be tracked and controlled by ITAR regulations including 100% see through rule CONTAMINATED Articles; Assets that have been moved from the US ML to the US CCL under the “Series 600” category which still require the 100% see through rule to be applied; Assets that are listed on the US CCL and must be managed under the US EAR regulations and are subject to the 25% or 10% De-Minimus rule, a more detailed assessment of the EBS is required to fully understand the implications of the regulations implementation requirements; Assets that are listed on the US CCL with a DEMIL code “Q” therefore requiring US Commerce Department Licencing controls to be applied; Assets that are not listed on the US CCL but have a DEMIL Code “A” and therefore the Consignor MUST reference the US CONSOLIDATED SCREENING LIST; NOTE: The INTEGRATION of a US CCL listed article onto a Military Parent asset is deemed a DEFENCE SERVICE and therefore MUST be managed under ITAR regulatory conditions.

THE APPROACH: Step 1 – The EBSIS process starts by obtaining the Master Parts List (MPL) of the platform being assessed. Step 2 – Identify the discrete Parts that require tracking due to regulations i.e. ITAR articles listed within the MPL, EAR articles listed on the US CCL, asset required to be tracked for engineering reasons etc; Step 3 – Assess the MPL LCN (Logistic Control Number) into it’s component layers to define the “PARENT – CHILD” relationships embodied within the Product’s or Platform’s structure; Step 4 – Apply algorithms to the data set to allow the identification of not only the discrete ITAR articles but also identifies the contaminated “PARENT” articles.

Step 1 – The process starts by obtaining the Master Parts List (MPL) of the platform being assessed. RDNAMENSNDEMILUIDITARCONTAMINATEDATL / BTLHAZMATSECURITYVALUEOTHERLCN0LCN1LCN2LCN3LCN4 1A5POWER SUPPLY ASSEMBLY A5A2PANEL,POWER SUPPLY A5A2MP3PANEL A5A3BRACKET,MOUNTING A5A3MP1BRACKET,MOUNTING A5A3MP4NUT,SELF-LOCKING,PL A5A4PLATE,BASE A5A5PLATE,REAR A5A6GUSSET,SIDE A5DS1SWITCH,PUSH A5DS1EP1BASIC UNIT A5DS1MP1FILTER,INDICATOR LIGHT A5DS1MP2LENS,LIGHT

Step 2 – Identify the discrete Parts that require tracking due to regulations i.e. ITAR articles listed within the MPL, EAR articles listed on the US CCL, asset required to be tracked for engineering reasons etc; RDNAMENSNDEMILUIDITARCONTAMINATEDATL / BTLHAZMATSECURITYVALUEOTHERLCN0LCN1LCN2LCN3LCN4 1A5POWER SUPPLY ASSEMBLY A A5A2PANEL,POWER SUPPLY A5A2MP3PANEL A5A3BRACKET,MOUNTING A A5A3MP1BRACKET,MOUNTING A5A3MP4NUT,SELF-LOCKING,PL A A5A4PLATE,BASE A5A5PLATE,REAR A5A6GUSSET,SIDE A5DS1SWITCH,PUSH A A5DS1EP1BASIC UNIT B A5DS1MP1FILTER,INDICATOR LIGHT A A5DS1MP2LENS,LIGHT A

Step 3 – Assess the MPL LCN (Logistic Control Number) into it’s component layers to define the “PARENT – CHILD” relationships embodied within the Product’s or Platform’s structure; RDNAMENSNDEMILUIDITARCONTAMINATEDATL / BTLHAZMATSECURITYVALUEOTHERLCN0LCN1LCN2LCN3LCN4 1A5POWER SUPPLY ASSEMBLY A A5 1A5A2PANEL,POWER SUPPLY A5A2 1A5A2MP3PANEL A5A2MP3 1A5A3BRACKET,MOUNTING A A5A3 1A5A3MP1BRACKET,MOUNTING A5A3MP1 1A5A3MP4NUT,SELF-LOCKING,PL A A5A3MP4 1A5A4PLATE,BASE A5A4 1A5A5PLATE,REAR A5A5 1A5A6GUSSET,SIDE A5A6 1A5DS1SWITCH,PUSH A A5DS1 1A5DS1EP1BASIC UNIT B A5DS1EP1 1A5DS1MP1FILTER,INDICATOR LIGHT A A5DS1MP1 1A5DS1MP2LENS,LIGHT A A5DS1MP2

Step 4 – Apply algorithms to the data set to allow the identification of not only the discrete ITAR articles but also identifies the contaminated “PARENT” articles. RDNAMENSNDEMILUIDITARCONTAMINATEDATL / BTLHAZMATSECURITYVALUEOTHERLCN0LCN1LCN2LCN3LCN4 1A5POWER SUPPLY ASSEMBLY A 1 0 TRUE A5 1A5A2PANEL,POWER SUPPLY 0 0 FALSE A5A2 1A5A2MP3PANEL A5A2MP3 1A5A3BRACKET,MOUNTING A 0 0 FALSE A5A3 1A5A3MP1BRACKET,MOUNTING A5A3MP1 1A5A3MP4NUT,SELF-LOCKING,PL A A5A3MP4 1A5A4PLATE,BASE A5A4 1A5A5PLATE,REAR A5A5 1A5A6GUSSET,SIDE A5A6 1A5DS1SWITCH,PUSH A 1 0 TRUE A5DS1 1A5DS1EP1BASIC UNIT B A5DS1EP1 1A5DS1MP1FILTER,INDICATOR LIGHT A A5DS1MP1 1A5DS1MP2LENS,LIGHT A A5DS1MP2

Example: The table below details an set of base data with a discrete ITAR article identified at lcn A

Example: This results in not only this discrete article requiring control, but it also contaminates lcns A and A1612 which results in, even though they are not discretely listed as being ITAR, they MUST be managed in accordance with the authorizations defined for their ITAR listed Child.

As shown in the base data table, other considerations can also be taken into account when identifying what articles require enhanced identification, management and impacts on the EBS structure. These can be: ITAR; EAR; Engineering requirements; Safety; Cost; Security etc All can be accommodated within the EBSIS methodology.

The Final Step – Produce the final output in a format that fits the Customer’s need; Either: Deliver the information back to the customer in an adapted form of the original MPL; Or Migrate Applied data into the EBSIS solution, providing an accurate and searchable “PROTECTED - READ ONLY” breakdown of the entire platform.

EBSIS Example. ID niin_short DEMIL_Code D Licence EBSIS MASTER\EXPORT LICENCES\TEST DSP5 - COMPANY B - NIIN – lcn A AAA UID 1 ITAR 1 CONTAMINATE 0 HAZMAT 0 SECURITY 0 VALUE 0 LCN 0 LCN 1 LCN 2 A AAA LCN 3 LCN 4 LCN 5

THE BENEFITS: Reduced Cost of Expensive Enhanced Asset Management; Reduced Costs of Expensive Disposal; Identify all articles requiring control to enable Export Control Compliance; Demonstrate Effective Export Controlled Article Identification under audit activities; Reduce the risk of Export Control Violations due to improved information availability to inform Export Control Compliance business processes; Inform Business Decisions to focus Asset Management resources on those Articles important to the business output; Inform the possibility of article replacement to reduce Export control liability; Can be adapted and deployed across any Platform or product, anywhere across the Globe.

Mark Jones MT&L Consulting Ltd Tel: