bmad-plus 0.4.4 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +31 -0
  2. package/README.md +3 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +21 -8
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,280 @@
1
+ # EAR Export Compliance Programme, Enforcement, and Special Rules
2
+
3
+ ## Export Compliance Programme (ECP) — BIS Seven Elements
4
+
5
+ BIS has identified seven elements of an effective Export Compliance Programme. Companies with strong ECPs receive significant penalty mitigation in enforcement actions.
6
+
7
+ ### Element 1 — Management Commitment
8
+
9
+ - Senior leadership (CEO/CISO/CCO level) must visibly champion export compliance
10
+ - Written, board-approved export compliance policy signed by senior officer
11
+ - Compliance resources: dedicated ECP staff, compliance counsel, budget
12
+ - Export Control Officer (ECO) or Export Compliance Manager designated in writing
13
+ - Annual certification to the board that the ECP is operating effectively
14
+
15
+ **Best practice:** Quarterly compliance reporting to senior leadership; annual ECP review with documented findings
16
+
17
+ ### Element 2 — Risk Assessment
18
+
19
+ - Identify all products, software, and technology subject to EAR
20
+ - Classify each item: ECCN or EAR99 (document the classification rationale)
21
+ - Identify all business units, geographies, and transaction types
22
+ - Assess risks: customers in D/E country groups, distributors with high-risk channels, end-use certificates accuracy
23
+ - Maintain a classification database tied to product lifecycle (new products re-classified before launch)
24
+
25
+ **ECCN classification log fields:** Item description, part number, technical parameters reviewed, ECCN assigned, RFC codes, date of classification, classifier name, review date
26
+
27
+ ### Element 3 — Written Policies and Procedures
28
+
29
+ - Written, procedure-level guidance for each process that touches exports:
30
+ - Customer onboarding and restricted party screening
31
+ - Order acceptance and fulfilment (sales, finance, logistics)
32
+ - ECCN classification and update trigger
33
+ - Licence application and management
34
+ - Employee travel with controlled items/technology
35
+ - Hiring of foreign nationals (deemed export screening)
36
+ - Distributor/reseller programme requirements
37
+ - Procedures must address digital transactions (cloud, SaaS, APIs) and source code repositories
38
+
39
+ ### Element 4 — Training and Awareness
40
+
41
+ - Mandatory training for all employees who may touch controlled transactions: sales, engineering, operations, HR (foreign national hiring), finance, legal
42
+ - Role-based training depth: frontline sales (awareness); ECO/lawyers (deep dive)
43
+ - Annual refresher training with sign-off acknowledgement
44
+ - Training records retained for 5 years
45
+ - Training content must cover: EAR basics, ECCN/EAR99, restricted parties, red flag recognition, deemed exports, reporting obligations
46
+
47
+ **Topics for engineers and developers:**
48
+ - Deemed exports: sharing controlled source code with foreign national colleagues
49
+ - Cloud platforms and access controls for controlled technology
50
+ - Open-source publication — fundamental research exemption vs. EAR controls on software
51
+
52
+ ### Element 5 — Restricted Party Screening
53
+
54
+ - Screen **all parties** to every transaction: buyer, end-user, intermediate consignee, freight forwarder, bank, broker
55
+ - Minimum lists to screen against:
56
+ - BIS Denied Persons List
57
+ - BIS Entity List
58
+ - BIS Unverified List
59
+ - BIS Military End-User (MEU) List
60
+ - State Department Debarred List (DDTC)
61
+ - OFAC SDN List
62
+ - OFAC Consolidated Sanctions List
63
+ - **Consolidated Screening List (CSL):** trade.gov/consolidated-screening-list — single search covers BIS + State + Treasury
64
+ - Screen at time of: quote/order acceptance, before each shipment, and when parties change
65
+
66
+ **Screening cadence for ongoing relationships:**
67
+ - Re-screen existing distributors and customers at minimum **monthly** (list updates are continuous)
68
+ - Automate screening via ERP integration (SAP GTS, Oracle AGIS, Visual Compliance, Restricted Party Screening tools)
69
+
70
+ **Handling a match:**
71
+ 1. Do not ship or service the order
72
+ 2. Escalate to ECO/legal immediately
73
+ 3. Determine if the match is a true hit or false positive (similar name, different entity)
74
+ 4. If true hit: refuse the transaction; do not tip off the customer (no "tipping off" problem under EAR as severe as OFAC, but standard practice)
75
+ 5. Document the match, review, and outcome
76
+
77
+ ### Element 6 — Due Diligence (Know Your Customer)
78
+
79
+ - Know-Your-Customer (KYC) process for new distributors, resellers, and high-risk end-users
80
+ - For high-risk transactions, obtain:
81
+ - **End-User Statement (EUS):** Certified statement of intended end-use, end-user identity, and location of end-use
82
+ - **Importer Safety Zone (ISZ) Statement** for certain dual-use items
83
+ - **Distributor Management: assurances that downstream sales comply with EAR**
84
+ - Red flag investigation: BIS publishes 15 "red flags" in Supplement 3 to Part 732; document your review and conclusions
85
+ - **Distributors in high-risk territories (D:1 countries):** Site visits, supply chain audits, enhanced due diligence on sub-distributors
86
+
87
+ ### Element 7 — Recordkeeping and Audits
88
+
89
+ - Retain all export-related records for **5 years** from the date of export (§ 762.6)
90
+ - Records include: orders, invoices, bills of lading, Shipper's Export Declarations, EEI filings, classification records, screening records, licence applications and approvals, end-user statements, licence exception documentation
91
+ - Records accessible to BIS within a **reasonable time** (generally within 5 business days of OEE request)
92
+ - Annual internal ECP audit or review
93
+ - Periodic third-party ECP assessment recommended for high-volume or high-risk exporters
94
+
95
+ ---
96
+
97
+ ## Enforcement Regime
98
+
99
+ ### Office of Export Enforcement (OEE)
100
+
101
+ BIS's enforcement arm investigates violations through:
102
+ - **Special Agents** conducting criminal investigations
103
+ - **End-Use Checks (EUC):** Pre-licence checks (PLC) and post-shipment verifications (PSV) conducted by US Commercial Service officers and BIS agents overseas
104
+ - **Administrative investigations** by the Office of Chief Counsel (OCC)
105
+
106
+ ### Civil Penalties (§ 764.3, Part 766)
107
+
108
+ | Violation Type | Maximum Penalty |
109
+ |---------------|----------------|
110
+ | Per civil violation | Greater of $374,474 per violation (adjusted annually for inflation) OR **2× the value of the transaction** |
111
+ | Egregious violations | Higher penalties; may approach statutory maximum |
112
+ | Denial of export privileges | Temporary or permanent denial of all export privileges |
113
+
114
+ **Penalty determination factors (Part 766, Supplement 1):**
115
+ - Willfulness (did the violator know it was a violation?)
116
+ - Nature of the item (weapons-relevant, dual-use, EAR99)
117
+ - Harm to US national security or foreign policy interests
118
+ - Compliance programme quality (strong ECP = significant mitigation)
119
+ - Remedial action taken
120
+ - Cooperation with OEE
121
+
122
+ **Base penalty matrix** (post-September 2024 rule change):
123
+ - BIS removed caps that previously limited penalties below statutory maximums
124
+ - Penalties now more directly reflect transaction value, particularly for egregious cases
125
+ - Multiple violations per shipment (wrong ECCN, wrong destination, wrong exception = 3 violations from 1 shipment)
126
+
127
+ ### Criminal Penalties (§ 764.2)
128
+
129
+ Willful violations of the EAR may be referred to the Department of Justice for criminal prosecution:
130
+ - **Individuals:** Up to **20 years** imprisonment + fines up to $1 million per violation
131
+ - **Corporations:** Fines up to $1 million per violation (per count)
132
+ - Criminal cases are reserved for deliberate, knowing, or willful violations — particularly those involving proliferation, sanctions evasion, or schemes to evade Entity List restrictions
133
+
134
+ ### Export Denial Orders (EDOs)
135
+
136
+ BIS issues Export Denial Orders (EDOs) against individuals and companies found to have violated the EAR:
137
+ - EDOs are published in the Federal Register and placed on the Denied Persons List
138
+ - Third parties are prohibited from participating in any transaction involving a denied person
139
+ - Scope: US persons everywhere in the world; any person regarding items subject to EAR
140
+
141
+ ---
142
+
143
+ ## Voluntary Self-Disclosure (VSD) Process (§ 764.5)
144
+
145
+ ### What is a VSD?
146
+
147
+ A Voluntary Self-Disclosure (VSD) is a self-initiated notification to OEE of an **apparent violation** of the EAR, license conditions, or orders. BIS strongly encourages VSDs.
148
+
149
+ ### When to File
150
+
151
+ File a VSD when you discover:
152
+ - Items shipped without a required licence
153
+ - Items shipped to an Entity List, Denied Persons List, or Unverified List party
154
+ - Incorrect ECCN used that resulted in an unlicensed shipment
155
+ - SNAP-R licence conditions violated
156
+ - Prohibited end-use found post-shipment
157
+
158
+ ### VSD Process
159
+
160
+ 1. **Preliminary Inquiry (PI):** Review the facts; if a likely violation is found, stop any ongoing transactions
161
+ 2. **Initial Notification:** File a brief initial notification to OEE (letter or email) — as soon as a likely violation is discovered; preserves the VSD date
162
+ 3. **Full VSD Submission (within 180 days of initial notification):** Complete written VSD including:
163
+ - Detailed narrative of the facts
164
+ - All transactions identified (shipper, consignee, item, ECCN, value, date, exception claimed)
165
+ - Root cause analysis
166
+ - Remedial actions already taken
167
+ - Proposed corrective actions
168
+ 4. **OEE Review:** May request additional information; may conduct End-Use Checks
169
+ 5. **Resolution:** Warning Letter, No-Action Letter, or administrative penalty with significant reduction for VSD
170
+
171
+ ### VSD Penalty Mitigation
172
+
173
+ - VSD is considered a **strong mitigating factor** under the 2024 revised penalty guidelines
174
+ - Deliberate decision **not to disclose** significant apparent violations is an **aggravating factor**
175
+ - Combined with robust ECP, remediation, and full cooperation → may result in warning letter only for non-egregious cases
176
+
177
+ ---
178
+
179
+ ## Foreign Direct Product Rule (FDPR) — Deep Dive
180
+
181
+ ### General FDPR (§ 736.2(b)(3))
182
+
183
+ Foreign-made items are subject to EAR if they are the **direct product** of US-origin technology or software that is controlled for NS or CB reasons AND the foreign item is to be shipped to a Country Group D:1 or E:1/E:2 country.
184
+
185
+ **Test:** Two-prong test:
186
+ 1. **Technology/software prong:** Was the item produced using US-origin technology or software controlled for NS or CB reasons under the CCL?
187
+ 2. **Destination prong:** Is the item destined for a D:1 or E:1/E:2 country?
188
+
189
+ ### Entity List FDPR (2020 — Huawei Rule)
190
+
191
+ Extended the FDPR to capture foreign-made items when:
192
+ 1. The foreign item is produced using equipment or technology that is the direct product of **specific US technology/software** (tooling, wafer fab equipment under 3B001/3B002)
193
+ 2. AND the item is destined for a party on the Entity List
194
+
195
+ Designed to prevent circumvention of Entity List restrictions through foreign-chip supply chains.
196
+
197
+ ### Advanced Computing FDPR (October 2022 / October 2023)
198
+
199
+ Captures items produced with US wafer fabrication equipment destined for:
200
+ - China or Macau for use in advanced computing applications above threshold
201
+ - Any Entity List party
202
+
203
+ ### Russia/Belarus FDPR (March 2022)
204
+
205
+ Captures virtually all items produced anywhere with **any** US technology, software, or equipment, destined for Russia or Belarus — with extremely limited exceptions.
206
+
207
+ ---
208
+
209
+ ## Deemed Export Rules — Compliance Programme Implications
210
+
211
+ ### What Constitutes a Deemed Export
212
+
213
+ Under § 734.13, the **release** of controlled technology or software to a **foreign national** in the US is a deemed export to their home country. "Release" includes:
214
+ - Visual inspection of controlled hardware
215
+ - Providing access to controlled equipment
216
+ - Oral, written, or electronic transmission of controlled technical data
217
+ - Demonstration of controlled software
218
+
219
+ ### Nationality Rule
220
+
221
+ BIS applies the **"most restrictive" nationality rule** for dual nationals or persons with multiple citizenships:
222
+ - Apply the nationality that requires the most restrictive licensing treatment
223
+ - Example: A Chinese/Canadian dual national in the US is treated as a Chinese national for deemed export licensing purposes
224
+
225
+ ### Practical Compliance Steps
226
+
227
+ 1. **HR Screening:** When hiring foreign nationals for roles touching controlled technology, conduct pre-employment deemed export screening
228
+ 2. **Classification Review:** Determine which technologies the employee will access; classify each
229
+ 3. **Access Controls:** Limit access to controlled technology to employees with appropriate authorizations
230
+ 4. **Deemed Export Licence Applications:** For employees who need access to NS-controlled technology from D:1 countries, apply for a deemed export licence via SNAP-R
231
+ 5. **Source Code Repositories:** Restrict access to controlled source code on GitHub/GitLab/Bitbucket using role-based access; foreign nationals from D:1 countries require deemed export licences or exception applicability review
232
+ 6. **Cloud and SaaS Environments:** Access to controlled technology via cloud platforms can constitute a deemed export; apply IP controls, authentication, and access auditing
233
+
234
+ ---
235
+
236
+ ## SNAP-R — Licensing Portal Guidance
237
+
238
+ **URL:** snap-r.bis.doc.gov (requires free BIS account)
239
+
240
+ **Forms filed through SNAP-R:**
241
+ - BIS-748P: Multipurpose Application Form (export licence, CCATS, Advisory Opinion)
242
+ - BIS-748P-A: Supplement for encryption review notifications (ENC exception)
243
+ - BIS-748P-B: Supplement for end-user statement attachments
244
+ - BIS-711: Statement by Ultimate Consignee and Purchaser
245
+
246
+ **SNAP-R Best Practices:**
247
+ - Submit complete applications — missing technical data is the #1 cause of delay
248
+ - Include end-use statements and supporting technical documentation proactively
249
+ - Track licence expiration dates and re-apply at least 60 days before expiry
250
+ - For time-sensitive transactions: contact the relevant BIS division directly after submission
251
+ - Use the "Licensing at a Glance" tool on bis.gov to estimate processing times by category
252
+
253
+ ---
254
+
255
+ ## EAR Recordkeeping Quick Reference
256
+
257
+ | Document Type | Retention Period | Format |
258
+ |---------------|-----------------|--------|
259
+ | Commercial invoices, purchase orders | 5 years from export date | Any readable format |
260
+ | Bills of lading, air waybills | 5 years | Any |
261
+ | EEI/AES filings | 5 years | Any |
262
+ | Licence applications and approvals | 5 years from expiry/completion | Any |
263
+ | Licence exception documentation | 5 years from export | Any |
264
+ | Restricted party screening records | 5 years | Recommended: dated screenshots |
265
+ | End-user statements and certifications | 5 years | Any |
266
+ | ECCN classification records | 5 years from last export of item | Any |
267
+ | VSD submissions and correspondence | Permanently | Any |
268
+
269
+ ---
270
+
271
+ ## Compliance Programme Maturity Assessment
272
+
273
+ | Level | Characteristics |
274
+ |-------|----------------|
275
+ | **Basic** | Written policy exists; some screening; training ad hoc; no formal audit |
276
+ | **Developing** | Formal ECCN classification; screening tool in place; annual training; no automated integration |
277
+ | **Proficient** | ERP-integrated screening; annual audits; full classification database; documented due diligence |
278
+ | **Advanced** | Real-time automated screening; ECCN lifecycle management; pre-shipment compliance review; regular third-party assessments; VSD process documented |
279
+
280
+ BIS rewards **Advanced** programmes with maximum penalty mitigation; **Basic** programmes may receive minimal credit even for VSDs.
@@ -0,0 +1,207 @@
1
+ # EAR License Exceptions — Complete Reference (15 CFR Part 740)
2
+
3
+ ## How License Exceptions Work
4
+
5
+ A license exception is an authorization in the EAR that allows you to export, reexport, or transfer (in-country) items subject to the EAR **without a license** when the conditions of the exception are met. Using a license exception:
6
+ - Certifies that all terms and conditions of the exception have been met
7
+ - Does **not** apply when: (a) BIS has issued a denial order, (b) the destination is embargoed, (c) a WMD end-use is involved, (d) the party is on the Entity List (unless the exception is expressly permitted)
8
+
9
+ **Global restrictions on all license exceptions (§ 740.2):**
10
+ - Cannot be used to supply weapons of mass destruction programmes
11
+ - Cannot be used by or to Denied Persons List parties
12
+ - Cannot be used for prohibited end-uses under Part 744
13
+ - Cannot override UN Security Council arms embargoes (Part 746)
14
+
15
+ ---
16
+
17
+ ## List-Based License Exceptions
18
+
19
+ These exceptions are only available when the CCL entry for the specific ECCN expressly authorizes them. Check the CCL entry column "License Exceptions" to see which are available.
20
+
21
+ ### LVS — Shipments of Limited Value (§ 740.3)
22
+
23
+ **Scope:** Low-value shipments of eligible commodities and software
24
+ **Condition:** The value of the shipment must not exceed the per-shipment dollar threshold listed in the ECCN entry (typically $500–$5,000 depending on ECCN)
25
+ **Restrictions:**
26
+ - Not available for items requiring review for nuclear, missile, chemical/biological, or crime control reasons
27
+ - Not available for exports to Country Groups D or E
28
+ - Aggregate annual reporting requirement for some items (§ 743.1)
29
+ **Recordkeeping:** Retain documentation of the value and ECCN for 5 years
30
+ **Tip:** The LVS threshold is per-shipment, not per-year. Cannot split shipments to stay under threshold.
31
+
32
+ ---
33
+
34
+ ### GBS — Group B Shipments (§ 740.4)
35
+
36
+ **Scope:** Items controlled **for national security (NS) reasons only** exported to Country Group B countries
37
+ **Key identifier:** The CCL entry must say "GBS—Yes" in the License Exceptions column
38
+ **Conditions:**
39
+ - Destination must be Country Group B (listed in Supplement 1, Part 740)
40
+ - Only applies when NS is the **sole** reason for control — if CB, MT, NP, or other reasons also apply, GBS is unavailable
41
+ - Item cannot be destined for a prohibited end-use or restricted party
42
+ **Common uses:** Dual-use electronics, test equipment, and materials destined for commercial use in allied countries
43
+
44
+ ---
45
+
46
+ ### CIV — Civil End-Users (§ 740.5)
47
+
48
+ **Scope:** NS-only controlled items exported for **civil end-use** to Country Group D:1 countries
49
+ **Key identifier:** CCL entry must say "CIV—Yes"
50
+ **Conditions:**
51
+ - End-use must be strictly civil (not military, intelligence, or security services)
52
+ - Exporter must obtain a **written end-user/end-use statement** from the buyer certifying civil use
53
+ - Enhanced due diligence required — actual knowledge or reason to know of military diversion triggers denial
54
+ **High-risk alert:** China and Russia are Country Group D:1; this exception is narrow and heavily scrutinised by BIS
55
+
56
+ ---
57
+
58
+ ### APP — Adjusted Peak Performance Computers (§ 740.7)
59
+
60
+ **Scope:** Certain computer items (ECCN 4A003) at specified performance levels
61
+ **Conditions:** Performance (APP, measured in TP) must not exceed the thresholds set in the CCL entry for the destination country group
62
+ **Tiered thresholds:** APP thresholds differ for Country Groups A, B, and D destinations
63
+ **Not available for:** Embargoed countries or military end-users
64
+
65
+ ---
66
+
67
+ ### TSR — Technology and Software under Restriction (§ 740.6)
68
+
69
+ **Scope:** Technology and software controlled **for NS reasons only** to Country Group B
70
+ **Key identifier:** CCL entry must say "TSR—Yes"
71
+ **Conditions:**
72
+ - Destination is Country Group B
73
+ - Item is technology or software (Product Group D or E)
74
+ - NS is the sole RFC
75
+ **Common uses:** Exporting software documentation, operating manuals, or technical data to allies/partners in Country Group B
76
+
77
+ ---
78
+
79
+ ## Non-List-Based License Exceptions
80
+
81
+ These exceptions authorize exports **regardless** of whether the CCL entry lists them. They override the CCL for specific categories of transactions.
82
+
83
+ ---
84
+
85
+ ### TMP — Temporary Imports/Exports (§ 740.9)
86
+
87
+ **Scope:** Items exported temporarily from the US and returned without transfer of title or ownership
88
+ **Conditions:**
89
+ - Item must be returned to the US within **12 months** (or the period specified by BIS)
90
+ - No permanent transfer of the item to the foreign consignee
91
+ - Cannot be used for embargoed countries or restricted parties
92
+ - Covers: trade show demonstrations, testing abroad, tools/equipment used on a project
93
+ **Documentation required:** Statement that the item is being exported temporarily and will return; must track item and maintain records
94
+ **Common uses:** R&D equipment for offshore testing, display units at international trade fairs, laptops/equipment carried by travelling employees
95
+
96
+ ---
97
+
98
+ ### RPL — Servicing and Replacement Parts (§ 740.10)
99
+
100
+ **Scope:** Replacement parts, components, and assemblies for items previously legally exported
101
+ **Conditions:**
102
+ - Original export must have been licensed or authorized
103
+ - One-for-one replacement — the old part must be returned or certified as destroyed
104
+ - Cannot be used for embargoed countries or denied parties
105
+ - Not available for items with proliferation controls (CB, MT, NP) without checking CCL
106
+ **Common uses:** Exporting replacement circuit boards or components to repair previously exported equipment
107
+
108
+ ---
109
+
110
+ ### GOV — Governments (§ 740.11)
111
+
112
+ **Scope:** Exports to US government agencies, cooperating governments, and certain international organisations
113
+ **Four paragraphs:**
114
+ - **(a)** Exports for US government agencies (military, intelligence, diplomatic) — broad coverage
115
+ - **(b)** Exports to cooperating governments for legitimate government use — requires government-to-government verification
116
+ - **(c)** Exports for international inspections (Chemical Weapons Convention verification missions)
117
+ - **(d)** Exports for the International Space Station programme
118
+ **Restrictions:** Must verify the end-user is an actual government entity; diversion to commercial entities voids the exception
119
+ **High-value exception:** Frequently used by defence contractors and government-facing technology suppliers
120
+
121
+ ---
122
+
123
+ ### TSU — Technology and Software Unrestricted (§ 740.13)
124
+
125
+ **Scope:** Publicly available technology and software
126
+ **Three paragraphs:**
127
+ - **(a) Mass-market software:** Software available to anyone without restriction (retail/internet)
128
+ - **(b) Publicly available technology:** Information in the public domain — published research, textbooks, technical manuals freely available
129
+ - **(c) Pre-release software:** Beta/evaluation software distributed to developers for feedback
130
+ **Key rule:** The **fundamental research exclusion** (§ 734.8) removes most university research from EAR jurisdiction entirely — TSU covers the remainder
131
+ **Important:** Technology that is NOT publicly available cannot use TSU, even if widely shared within a company
132
+
133
+ ---
134
+
135
+ ### ENC — Encryption Items (§ 740.17)
136
+
137
+ **Scope:** Encryption commodities, software, and technology (primarily ECCN 5E002 and 5D002)
138
+ **Structure:** Three tiers based on encryption strength and market availability:
139
+ - **Tier 1 (§ 740.17(a)):** Mass market encryption (AES-256, standard protocols) — eligible after one-time BIS notification; reexportable to most Country Group B
140
+ - **Tier 2 (§ 740.17(b)(1)):** Source code for mass-market products — one-time BIS notification
141
+ - **Tier 3 (§ 740.17(b)(3)):** Non-standard or proprietary encryption — annual self-classification report
142
+ **Prior notification required:** File Form BIS-748P-A via SNAP-R before first use
143
+ **NOT available for:** Cuba, North Korea, Iran, Syria (E:1 countries) for most encryption items
144
+ **Common uses:** Exporting commercial VPN software, SSL/TLS libraries, encrypted mobile apps, and security products
145
+
146
+ ---
147
+
148
+ ### BAG — Baggage (§ 740.14)
149
+
150
+ **Scope:** Personal items in traveller's baggage or household effects
151
+ **Conditions:**
152
+ - Items must be for personal use, not for resale or transfer
153
+ - Computer performance limitations apply (laptops within APP thresholds)
154
+ - Personal defence items (shotguns, ammunition) have specific limitations
155
+ - Not available for embargoed countries
156
+ **Practical note:** Employees travelling with company laptops containing controlled technical data should confirm the laptop falls within BAG conditions; country-specific controls may still apply
157
+
158
+ ---
159
+
160
+ ### AVS — Aircraft and Vessels (§ 740.15)
161
+
162
+ **Scope:** Items exported on aircraft or vessels of non-US registry for use on that aircraft or vessel
163
+ **Conditions:**
164
+ - Items must be for use aboard the aircraft or vessel (fuel, spare parts, equipment)
165
+ - The vessel/aircraft must be legal and not destined for prohibited parties
166
+ - Specific rules apply for aircraft flying into embargoed country airspace
167
+ **Common uses:** Aviation parts, marine equipment, aircraft repair kits exported on the vessel they will service
168
+
169
+ ---
170
+
171
+ ### ACE — Additional Permissive Reexports (§ 740.16)
172
+
173
+ **Scope:** Reexports of certain controlled items from Country Group A or B countries
174
+ **Conditions:** The original export from the US must have been authorized; subsequent reexports within specified country groups may use ACE
175
+ **Limitation:** Only available for items with NS or AT controls; not for items with proliferation controls
176
+
177
+ ---
178
+
179
+ ### GFT — Gift Parcels (§ 740.12)
180
+
181
+ **Scope:** Gifts sent by individual US citizens/residents to individuals in embargoed countries
182
+ **Conditions:** Strict value and content limits; not for commercial shipments; recipient must be an individual (not an entity)
183
+ **Primarily used for:** Cuba — specific limits on food, medicine, personal items
184
+
185
+ ---
186
+
187
+ ## License Exception Recordkeeping (§ 762.2)
188
+
189
+ When using any license exception, retain:
190
+ 1. The invoice or order showing the ECCN, description, and value
191
+ 2. The license exception symbol used (e.g., "LVS", "ENC")
192
+ 3. Any required end-user statement or certification
193
+ 4. EEI filing (if required under § 758.1)
194
+ 5. Denied party screening records and date of screening
195
+
196
+ Retention period: **5 years** from date of export (§ 762.6)
197
+
198
+ ---
199
+
200
+ ## AES/EEI Filing Requirements (Part 758)
201
+
202
+ Electronic Export Information (EEI) filing via AES (Automated Export System) is required when:
203
+ - The value of the shipment exceeds **$2,500** per Schedule B number and the destination is outside Canada
204
+ - A BIS license is used (always file regardless of value)
205
+ - Certain license exceptions require filing (check § 758.1 and the specific exception)
206
+
207
+ Cite the license exception symbol or license number in the EEI filing under the license code field.