bmad-plus 0.4.4 → 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +54 -0
- package/README.md +5 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +76 -12
- package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
- package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
- package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +31 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,155 @@
|
|
|
1
|
+
# ISO/IEC 42001:2023 — Annex A Controls (All 38)
|
|
2
|
+
|
|
3
|
+
ISO/IEC 42001:2023 Annex A contains **38 controls** organised across **9 control domains** (A.2–A.10). Within each domain, the .1 sub-clause contains the domain objective statement — the numbered controls begin at .2 (or .1.2 / .2.2 for A.6's two sub-objectives). Annex B provides implementation guidance for each control.
|
|
4
|
+
|
|
5
|
+
> **How to use:** Controls are selected based on organisational role (provider, user, or both), AI system impact level, and risk assessment outcomes. Inapplicable controls must be justified in the Statement of Applicability (SoA).
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## A.2 — Policies Related to AI (3 controls)
|
|
10
|
+
|
|
11
|
+
| Control ID | Control Name | Applies To | Description |
|
|
12
|
+
|-----------|-------------|-----------|-------------|
|
|
13
|
+
| A.2.2 | AI policy | Provider + User | A formal AI policy shall be established, documented, and communicated. The policy shall include the organisation's commitment to responsible AI development or use, alignment with organisational values and legal obligations, and a framework for setting AI objectives. Signed by top management. |
|
|
14
|
+
| A.2.3 | Alignment with other organisational policies | Provider + User | AI-specific requirements shall be incorporated into existing organisational policies (e.g. HR, procurement, IT, data governance, information security) where those policies affect or are affected by AI systems. |
|
|
15
|
+
| A.2.4 | Review of the AI policy | Provider + User | The AI policy shall be reviewed at planned intervals and when significant changes occur, to ensure its continuing suitability, adequacy, and effectiveness. |
|
|
16
|
+
|
|
17
|
+
**Common gaps:** AI policy exists but lacks specific responsible AI commitments; other organisational policies not updated to address AI; policy review cycle not defined.
|
|
18
|
+
|
|
19
|
+
---
|
|
20
|
+
|
|
21
|
+
## A.3 — Internal Organisation (2 controls)
|
|
22
|
+
|
|
23
|
+
| Control ID | Control Name | Applies To | Description |
|
|
24
|
+
|-----------|-------------|-----------|-------------|
|
|
25
|
+
| A.3.2 | AI roles and responsibilities | Provider + User | Roles and responsibilities for AI governance shall be defined, assigned, communicated, and documented. This includes accountability for individual AI systems, data governance, and AIMS oversight. A RACI matrix or equivalent is recommended. |
|
|
26
|
+
| A.3.3 | Reporting of concerns | Provider + User | Mechanisms shall be established for personnel to raise concerns about AI systems — including ethical concerns, bias observations, unexpected outputs, or policy non-compliance — without fear of reprisal. |
|
|
27
|
+
|
|
28
|
+
**Common gaps:** AI ownership is informal or split across teams without clear accountability; no channel for staff to report AI concerns.
|
|
29
|
+
|
|
30
|
+
---
|
|
31
|
+
|
|
32
|
+
## A.4 — Resources for AI Systems (5 controls)
|
|
33
|
+
|
|
34
|
+
| Control ID | Control Name | Applies To | Description |
|
|
35
|
+
|-----------|-------------|-----------|-------------|
|
|
36
|
+
| A.4.2 | Resource documentation | Provider + User | The resources required to develop, deploy, operate, and maintain AI systems shall be identified and documented, including compute, data, tooling, and human resources. |
|
|
37
|
+
| A.4.3 | Data resources | Provider | Policies and controls shall govern the acquisition, management, and quality assurance of data resources used in AI systems — covering training, validation, and test data. |
|
|
38
|
+
| A.4.4 | Tooling resources | Provider | Controls shall govern the selection, procurement, and management of AI tooling — including development frameworks, model libraries, and evaluation platforms. |
|
|
39
|
+
| A.4.5 | System and computing resources | Provider | Controls shall govern the compute infrastructure used for AI development and deployment: provisioning, access control, capacity management, and decommissioning. |
|
|
40
|
+
| A.4.6 | Human resources | Provider + User | AI-specific competency requirements shall be documented. Training programmes shall be established for AI developers, operators, and business users. An awareness programme shall be maintained for all staff who interact with or are affected by AI. |
|
|
41
|
+
|
|
42
|
+
**Common gaps:** No AI-specific competency framework; staff AI awareness training absent; third-party AI tools not inventoried; data resource governance undocumented.
|
|
43
|
+
|
|
44
|
+
---
|
|
45
|
+
|
|
46
|
+
## A.5 — Assessing Impacts of AI Systems (4 controls)
|
|
47
|
+
|
|
48
|
+
| Control ID | Control Name | Applies To | Description |
|
|
49
|
+
|-----------|-------------|-----------|-------------|
|
|
50
|
+
| A.5.2 | AI system impact assessment process | Provider + User | A documented process for assessing the impacts of AI systems shall be established and maintained. The process shall define scope, methodology, frequency of assessment, roles, and how assessment results inform control selection and treatment decisions. |
|
|
51
|
+
| A.5.3 | Documentation of AI system impact assessments | Provider + User | Results of AI system impact assessments shall be documented, retained, and updated when significant changes occur to the AI system or its operating context. |
|
|
52
|
+
| A.5.4 | Assessing AI system impact on individuals or groups of individuals | Provider + User | The impact assessment shall evaluate how AI system outputs may affect individual rights, wellbeing, and autonomy. This includes risks of discrimination, profiling, automated decision-making without meaningful human review, and disproportionate impacts on vulnerable individuals or groups. |
|
|
53
|
+
| A.5.5 | Assessing societal impacts of AI systems | Provider + User | The impact assessment shall evaluate broader societal impacts: potential for misinformation generation, labour market effects, environmental impact of AI compute, reinforcement of systemic bias at scale, and erosion of human autonomy. |
|
|
54
|
+
|
|
55
|
+
**Common gaps:** Impact assessment performed once at deployment but never revisited; societal impact dimension skipped; no documented process — assessments done ad hoc.
|
|
56
|
+
|
|
57
|
+
---
|
|
58
|
+
|
|
59
|
+
## A.6 — AI System Life Cycle (9 controls)
|
|
60
|
+
|
|
61
|
+
A.6 is divided into two sub-objectives: **A.6.1 Management guidance** and **A.6.2 AI system life cycle**. The .1 sub-clause in each group contains the objective statement; controls begin at .2.
|
|
62
|
+
|
|
63
|
+
### A.6.1 — Management Guidance (2 controls)
|
|
64
|
+
|
|
65
|
+
| Control ID | Control Name | Applies To | Description |
|
|
66
|
+
|-----------|-------------|-----------|-------------|
|
|
67
|
+
| A.6.1.2 | Objectives for responsible development of AI system | Provider | Specific, measurable objectives for responsible AI development shall be established, documented, and monitored. These shall align with the AI policy and responsible AI principles (fairness, transparency, accountability, safety, reliability). |
|
|
68
|
+
| A.6.1.3 | Processes for responsible AI system design and development | Provider | Formal processes shall govern AI system design and development to embed responsible AI principles: fairness-aware design, documentation of design decisions, explainability requirements proportionate to AI impact level, and human oversight at key development gates. |
|
|
69
|
+
|
|
70
|
+
### A.6.2 — AI System Life Cycle (7 controls)
|
|
71
|
+
|
|
72
|
+
| Control ID | Control Name | Applies To | Description |
|
|
73
|
+
|-----------|-------------|-----------|-------------|
|
|
74
|
+
| A.6.2.2 | AI system requirements and specification | Provider | Requirements for each AI system shall be documented, including intended purpose, performance criteria, operating conditions, input/output specifications, and applicable constraints (legal, ethical, technical). |
|
|
75
|
+
| A.6.2.3 | Documentation of AI system design and development | Provider | Design decisions, architecture choices, model versions, hyperparameters, and development rationale shall be documented to support reproducibility, auditability, and accountability. |
|
|
76
|
+
| A.6.2.4 | AI system verification and validation | Provider | Testing protocols shall be applied before deployment: performance benchmarking, fairness and bias testing across demographic groups, adversarial testing, edge case validation, and go/no-go authorisation criteria. |
|
|
77
|
+
| A.6.2.5 | AI system deployment | Provider | A controlled deployment process shall govern AI system releases: staged rollout, deployment authorisation, risk and impact assessment sign-off, and rollback procedures. |
|
|
78
|
+
| A.6.2.6 | AI system operation and monitoring | Provider + User | Continuous monitoring of AI systems in production shall detect performance drift, output quality degradation, and bias. Alert thresholds and remediation processes shall be defined. |
|
|
79
|
+
| A.6.2.7 | AI system technical documentation | Provider + User | Comprehensive technical documentation per AI system shall be maintained: specifications, intended use, known limitations, performance data, and failure modes. This supports transparency obligations and third-party assessment. |
|
|
80
|
+
| A.6.2.8 | AI system recording of event logs | Provider + User | AI systems shall record event logs sufficient to support incident investigation, audit, performance monitoring, and accountability. Log retention periods and access controls shall be defined. |
|
|
81
|
+
|
|
82
|
+
**Common gaps:** No model versioning or reproducibility controls; bias testing not documented; no production monitoring for model drift; deployment lacks formal authorisation process; event logs not retained or scoped to AI systems.
|
|
83
|
+
|
|
84
|
+
---
|
|
85
|
+
|
|
86
|
+
## A.7 — Data for AI Systems (5 controls)
|
|
87
|
+
|
|
88
|
+
| Control ID | Control Name | Applies To | Description |
|
|
89
|
+
|-----------|-------------|-----------|-------------|
|
|
90
|
+
| A.7.2 | Data for development and enhancement of AI system | Provider | A governance framework shall define how data is managed across the full AI data lifecycle: acquisition, quality assurance, labelling, versioning, bias testing, retention, and secure deletion. |
|
|
91
|
+
| A.7.3 | Acquisition of data | Provider | Controls shall govern how training, validation, and test data is sourced: legal basis for data use, consent requirements where applicable, provenance documentation, and prohibition on use of unlawfully obtained data. |
|
|
92
|
+
| A.7.4 | Quality of data for AI systems | Provider | Data quality criteria shall be defined for training, validation, and test data — covering completeness, accuracy, representativeness, and recency — and tested before data is used in AI development. |
|
|
93
|
+
| A.7.5 | Data provenance | Provider | The origin, chain of custody, and transformation history of data used in AI systems shall be documented and traceable. This supports accountability, bias identification, and regulatory compliance. |
|
|
94
|
+
| A.7.6 | Data preparation | Provider | Processes for data cleaning, transformation, labelling, and annotation shall include quality controls: human review of labelled data, inter-annotator agreement checks, and identification and remediation of bias introduced in preparation steps. |
|
|
95
|
+
|
|
96
|
+
**Common gaps:** Training data sourcing undocumented; no data quality criteria or tests; labelling process not auditable; provenance tracking absent; data preparation bias controls missing.
|
|
97
|
+
|
|
98
|
+
---
|
|
99
|
+
|
|
100
|
+
## A.8 — Information for Interested Parties of AI Systems (4 controls)
|
|
101
|
+
|
|
102
|
+
| Control ID | Control Name | Applies To | Description |
|
|
103
|
+
|-----------|-------------|-----------|-------------|
|
|
104
|
+
| A.8.2 | System documentation and information for users | Provider + User | Documentation and information about AI systems shall be provided to users and other interested parties at a level of detail proportionate to the AI system's impact. This includes intended purpose, known limitations, and how to interpret AI outputs. |
|
|
105
|
+
| A.8.3 | External reporting | Provider + User | The organisation shall define what information about AI systems is reported externally, to whom, how frequently, and through what mechanism — including regulatory disclosures, transparency reports, and public-facing AI disclosures. |
|
|
106
|
+
| A.8.4 | Communication of incidents | Provider + User | AI-specific incident communication processes shall be established: internal escalation, notification to affected individuals where required, regulatory reporting (e.g., under sector-specific AI or data protection laws), and post-incident review and disclosure. |
|
|
107
|
+
| A.8.5 | Information for interested parties | Provider + User | Stakeholders — including customers, employees, regulators, and the public — shall be informed of their rights and what to expect from AI systems. A communication plan shall address what to communicate, when, and through which channel. |
|
|
108
|
+
|
|
109
|
+
**Common gaps:** No disclosure to users that AI is involved in decision-making; incident reporting processes not extended to AI-specific scenarios; no external transparency reporting; stakeholder communication plan absent.
|
|
110
|
+
|
|
111
|
+
---
|
|
112
|
+
|
|
113
|
+
## A.9 — Use of AI Systems (3 controls)
|
|
114
|
+
|
|
115
|
+
| Control ID | Control Name | Applies To | Description |
|
|
116
|
+
|-----------|-------------|-----------|-------------|
|
|
117
|
+
| A.9.2 | Processes for responsible use of AI systems | User (primarily) | Formal processes shall govern how the organisation uses AI systems responsibly, including acceptable use criteria, human oversight of AI outputs, and procedures for escalating or overriding AI decisions. |
|
|
118
|
+
| A.9.3 | Objectives for responsible use of AI system | User (primarily) | Measurable objectives for responsible AI use shall be established and monitored, aligned to the AI policy and responsible AI principles. These objectives drive continual improvement in AI use practices. |
|
|
119
|
+
| A.9.4 | Intended use of the AI system | Provider + User | The intended use of each AI system shall be documented, communicated, and enforced. Use beyond the documented intended purpose shall be identified, assessed, and controlled. |
|
|
120
|
+
|
|
121
|
+
**Common gaps:** No acceptable use policy for AI; staff using AI tools beyond intended scope; no formal objectives for responsible AI use; human oversight procedures not documented.
|
|
122
|
+
|
|
123
|
+
---
|
|
124
|
+
|
|
125
|
+
## A.10 — Third-Party and Customer Relationships (3 controls)
|
|
126
|
+
|
|
127
|
+
| Control ID | Control Name | Applies To | Description |
|
|
128
|
+
|-----------|-------------|-----------|-------------|
|
|
129
|
+
| A.10.2 | Allocating responsibilities | Provider + User | Where AI systems involve multiple parties (providers, users, customers, partners), responsibilities for responsible AI governance shall be clearly allocated and documented — including who is responsible for impact assessment, monitoring, and incident response. |
|
|
130
|
+
| A.10.3 | Suppliers | Provider + User | AI supply chain risk management shall govern third-party AI providers: tiering by risk, due diligence questionnaires, contractual AI-specific clauses (including data handling, bias controls, and right to audit), and ongoing supplier performance monitoring. |
|
|
131
|
+
| A.10.4 | Customers | Provider | Where AI systems are deployed to customers, the organisation shall define what information customers receive about AI system capabilities and limitations, what obligations customers have in responsible use, and how customer feedback and incidents are managed. |
|
|
132
|
+
|
|
133
|
+
**Common gaps:** No AI-specific supplier due diligence questionnaire; no contractual AI clauses with key AI vendors; responsibilities between provider and user not formally allocated; no customer-facing AI use obligations.
|
|
134
|
+
|
|
135
|
+
---
|
|
136
|
+
|
|
137
|
+
## Summary: Controls by Organisational Role
|
|
138
|
+
|
|
139
|
+
| Domain | # Controls | AI Provider | AI User |
|
|
140
|
+
|--------|-----------|------------|---------|
|
|
141
|
+
| A.2 Policies | 3 | Both | Both |
|
|
142
|
+
| A.3 Internal Organisation | 2 | Both | Both |
|
|
143
|
+
| A.4 Resources | 5 | Primary (all 5) | A.4.2, A.4.6 |
|
|
144
|
+
| A.5 Impact Assessment | 4 | Both | Both |
|
|
145
|
+
| A.6 AI System Life Cycle | 9 | Primary (all 9) | A.6.2.6, A.6.2.7, A.6.2.8 |
|
|
146
|
+
| A.7 Data | 5 | Primary (all 5) | Limited |
|
|
147
|
+
| A.8 Information | 4 | Both | Both |
|
|
148
|
+
| A.9 Use of AI Systems | 3 | A.9.4 | Primary (all 3) |
|
|
149
|
+
| A.10 Third-Party / Customer | 3 | Both | A.10.2, A.10.3 |
|
|
150
|
+
| **Total** | **38** | | |
|
|
151
|
+
|
|
152
|
+
**Controls by ID (complete list):**
|
|
153
|
+
A.2.2, A.2.3, A.2.4, A.3.2, A.3.3, A.4.2, A.4.3, A.4.4, A.4.5, A.4.6, A.5.2, A.5.3, A.5.4, A.5.5, A.6.1.2, A.6.1.3, A.6.2.2, A.6.2.3, A.6.2.4, A.6.2.5, A.6.2.6, A.6.2.7, A.6.2.8, A.7.2, A.7.3, A.7.4, A.7.5, A.7.6, A.8.2, A.8.3, A.8.4, A.8.5, A.9.2, A.9.3, A.9.4, A.10.2, A.10.3, A.10.4
|
|
154
|
+
|
|
155
|
+
> **Note on control ID numbering:** Within each domain, sub-clause .1 contains the domain objective statement (not a control). Controls begin at .2. Domain A.6 has two sub-objectives (A.6.1 Management guidance and A.6.2 AI system life cycle), each with their objective at .1 and controls starting at .2. This is why control IDs in A.6 are formatted as A.6.1.2, A.6.1.3, A.6.2.2 … A.6.2.8.
|
|
@@ -0,0 +1,174 @@
|
|
|
1
|
+
# ITAR Compliance Programme — Penalties, VSD, and TCP
|
|
2
|
+
|
|
3
|
+
## ITAR Compliance Programme Elements
|
|
4
|
+
|
|
5
|
+
An effective ITAR compliance programme (recognised by DDTC as a mitigating factor) includes:
|
|
6
|
+
|
|
7
|
+
### 1. Governance and Leadership
|
|
8
|
+
- Designated **Empowered Official (EO)** (22 CFR § 120.67): A US person with authority to sign licence applications and ensure ITAR compliance; must be in a senior position with ability to override business decisions for compliance reasons
|
|
9
|
+
- Written **ITAR Compliance Policy** signed by senior management
|
|
10
|
+
- Clear escalation path for export control questions
|
|
11
|
+
- Annual management review of compliance programme effectiveness
|
|
12
|
+
|
|
13
|
+
### 2. Training
|
|
14
|
+
- **Initial training** for all employees with ITAR access within 30 days of hire
|
|
15
|
+
- **Annual refresher training** covering recent regulatory changes, enforcement actions, and company-specific procedures
|
|
16
|
+
- **Role-specific training** for: Empowered Officials, shipping/logistics, engineering/R&D, legal, IT
|
|
17
|
+
- Training records retained 5 years
|
|
18
|
+
|
|
19
|
+
### 3. Technology Control Plan (TCP)
|
|
20
|
+
|
|
21
|
+
A TCP controls access to ITAR-controlled technical data, especially by foreign nationals.
|
|
22
|
+
|
|
23
|
+
**TCP Sections:**
|
|
24
|
+
```
|
|
25
|
+
1. Purpose and Scope
|
|
26
|
+
2. ITAR-controlled items and data inventory
|
|
27
|
+
3. Physical access controls (secure areas, visitor escorts, badging)
|
|
28
|
+
4. IT access controls (network segregation, access lists, encryption)
|
|
29
|
+
5. Foreign national screening procedure
|
|
30
|
+
- Collect citizenship information at hire/engagement
|
|
31
|
+
- Screen against denied parties lists
|
|
32
|
+
- Determine if TAA/licence required before granting access
|
|
33
|
+
6. Visitor and contractor procedures
|
|
34
|
+
7. Annual ITAR training programme
|
|
35
|
+
8. Incident identification, reporting, and response
|
|
36
|
+
9. Records management (5-year retention)
|
|
37
|
+
10. TCP review and update cycle (annual minimum)
|
|
38
|
+
```
|
|
39
|
+
|
|
40
|
+
### 4. Screening and Due Diligence
|
|
41
|
+
Screen all parties (customers, suppliers, employees, visitors) against:
|
|
42
|
+
- **DDTC Debarred Parties List** (22 CFR § 127.7)
|
|
43
|
+
- **OFAC Specially Designated Nationals (SDN) List**
|
|
44
|
+
- **BIS Denied Persons List, Entity List, Unverified List**
|
|
45
|
+
- **US State Department Watch Lists**
|
|
46
|
+
|
|
47
|
+
Screening must be documented and re-run at each transaction.
|
|
48
|
+
|
|
49
|
+
### 5. Jurisdiction and Classification Review
|
|
50
|
+
- Formal **product classification process** for every new item, component, and software
|
|
51
|
+
- Document classification decisions (USML citation or EAR ECCN) with rationale
|
|
52
|
+
- Review classifications when product is modified, use-case changes, or regulations change
|
|
53
|
+
- Consider **Commodity Jurisdiction (CJ)** requests for ambiguous items
|
|
54
|
+
|
|
55
|
+
### 6. Licence Management
|
|
56
|
+
- Centralised tracking of all active licences, TAAs, MLAs
|
|
57
|
+
- Pre-shipment licence review checklist
|
|
58
|
+
- Licence condition compliance (quantities, end-users, re-export restrictions)
|
|
59
|
+
- Timely licence renewals (track expiry dates with 90-day advance reminders)
|
|
60
|
+
- Post-shipment filing (Automated Export System / Electronic Export Information)
|
|
61
|
+
|
|
62
|
+
### 7. Audits
|
|
63
|
+
- Annual internal ITAR compliance audit (or third-party audit every 2–3 years)
|
|
64
|
+
- Audit scope: registration currency, licence compliance, TCP effectiveness, training records, screening logs, record retention
|
|
65
|
+
- Findings documented with corrective action plans and owners
|
|
66
|
+
|
|
67
|
+
---
|
|
68
|
+
|
|
69
|
+
## Penalties — 22 CFR Part 127 and 22 USC § 2778
|
|
70
|
+
|
|
71
|
+
### Civil Penalties
|
|
72
|
+
- Up to **$1,369,000 per violation** (amount adjusted annually under the Federal Civil Penalties Inflation Adjustment Act)
|
|
73
|
+
- Each unlicensed export, each unlicensed disclosure of technical data, each brokering violation = separate violation
|
|
74
|
+
- DDTC may impose civil penalties via Consent Agreement without criminal referral
|
|
75
|
+
|
|
76
|
+
### Criminal Penalties
|
|
77
|
+
- Up to **$1,000,000 fine** per violation (22 USC § 2778(c))
|
|
78
|
+
- Up to **20 years imprisonment** per violation
|
|
79
|
+
- Criminal cases referred to Department of Justice; prosecuted by DOJ National Security Division
|
|
80
|
+
|
|
81
|
+
### Debarment
|
|
82
|
+
- DDTC may debar any person from ITAR privileges (22 CFR § 127.7)
|
|
83
|
+
- Duration: typically 3 years; can be permanent for egregious violations
|
|
84
|
+
- Debarment prevents: registration, licensing, TAA/MLA participation, US government contracting
|
|
85
|
+
- Published on the DDTC Debarred Parties List
|
|
86
|
+
|
|
87
|
+
### Other Consequences
|
|
88
|
+
- **Seizure and forfeiture** of articles involved in violations (22 USC § 2778(e))
|
|
89
|
+
- **Suspension of export privileges** pending investigation
|
|
90
|
+
- **Congressional notification** requirements for significant violations involving foreign governments
|
|
91
|
+
- **Reputational harm** — consent agreements are publicly disclosed
|
|
92
|
+
|
|
93
|
+
---
|
|
94
|
+
|
|
95
|
+
## Voluntary Self-Disclosure (VSD) — 22 CFR § 127.12
|
|
96
|
+
|
|
97
|
+
### Why Disclose
|
|
98
|
+
VSD is the strongest available mitigating factor. DDTC's guidelines recognise that companies with effective compliance programmes that self-discover and promptly disclose violations deserve leniency.
|
|
99
|
+
|
|
100
|
+
### VSD Process
|
|
101
|
+
|
|
102
|
+
**Step 1 — Initial Notification** (~30 days from discovery)
|
|
103
|
+
- Submit brief written notification to DDTC Director of Compliance
|
|
104
|
+
- Include: company name, registration number, general description of the potential violation, estimated number of occurrences
|
|
105
|
+
- Request a tolling agreement to preserve statute of limitations while investigation proceeds
|
|
106
|
+
|
|
107
|
+
**Step 2 — Internal Investigation** (30–90 days)
|
|
108
|
+
- Investigate all facts: who knew what, when, what was exported/disclosed, to whom
|
|
109
|
+
- Pull all records (licences, shipping docs, emails, TAA files)
|
|
110
|
+
- Identify root cause (process failure, training gap, deliberate act)
|
|
111
|
+
- Preserve all evidence; place litigation hold if appropriate
|
|
112
|
+
|
|
113
|
+
**Step 3 — Final VSD Report** (within ~60–90 days of initial notification)
|
|
114
|
+
Submit comprehensive written report including:
|
|
115
|
+
- Detailed factual narrative of all violations
|
|
116
|
+
- CFR sections violated for each occurrence
|
|
117
|
+
- Identification of all parties involved
|
|
118
|
+
- Timeline of events
|
|
119
|
+
- Root cause analysis
|
|
120
|
+
- Corrective actions already implemented
|
|
121
|
+
- Proposed additional remediation
|
|
122
|
+
|
|
123
|
+
**Step 4 — DDTC Review and Resolution**
|
|
124
|
+
- DDTC reviews report; may request additional information
|
|
125
|
+
- Outcomes: no action, warning letter, civil penalty (usually reduced), or referral for criminal review
|
|
126
|
+
- Most cooperative VSDs resolved within 6–18 months
|
|
127
|
+
|
|
128
|
+
### Mitigating Factors
|
|
129
|
+
- Voluntary self-disclosure
|
|
130
|
+
- Cooperation with DDTC investigation
|
|
131
|
+
- Effective pre-existing compliance programme
|
|
132
|
+
- Prompt remediation
|
|
133
|
+
- No prior ITAR violations
|
|
134
|
+
- Low national security harm
|
|
135
|
+
- Relatively low transaction value
|
|
136
|
+
|
|
137
|
+
### Aggravating Factors
|
|
138
|
+
- Wilful/deliberate violation
|
|
139
|
+
- Senior management involvement or awareness
|
|
140
|
+
- Harm to national security
|
|
141
|
+
- Pattern of violations
|
|
142
|
+
- Obstruction or lack of cooperation
|
|
143
|
+
- High-risk end-users (state sponsors of terrorism, arms embargoes)
|
|
144
|
+
- Prior violations
|
|
145
|
+
|
|
146
|
+
---
|
|
147
|
+
|
|
148
|
+
## DDTC Blue Lantern End-Use Monitoring
|
|
149
|
+
|
|
150
|
+
The **Blue Lantern** programme is DDTC's end-use monitoring initiative. US embassy personnel conduct post-shipment verifications to confirm items reached the stated end-user and are being used as authorised.
|
|
151
|
+
|
|
152
|
+
**Implications for exporters:**
|
|
153
|
+
- Cooperate fully with Blue Lantern checks (failure to cooperate can trigger licence suspension)
|
|
154
|
+
- Maintain accurate shipping records to facilitate verification
|
|
155
|
+
- Include cooperation obligations in contracts with foreign distributors
|
|
156
|
+
- Report if you discover items have been diverted or misused
|
|
157
|
+
|
|
158
|
+
---
|
|
159
|
+
|
|
160
|
+
## Checklist — ITAR Compliance Programme Readiness
|
|
161
|
+
|
|
162
|
+
| Area | ✅ | Key Questions |
|
|
163
|
+
|------|----|--------------|
|
|
164
|
+
| Registration | | Is registration current? Renewal filed on time? |
|
|
165
|
+
| Empowered Official | | Named EO with written authority? |
|
|
166
|
+
| Policy | | IS Policy signed by senior management? |
|
|
167
|
+
| TCP | | Written TCP? Reviewed in last 12 months? |
|
|
168
|
+
| Training | | All ITAR-access employees trained in last 12 months? Records retained? |
|
|
169
|
+
| Classification | | All products/components formally classified? CJ obtained where needed? |
|
|
170
|
+
| Screening | | SDN/debarment screening at every transaction? Documented? |
|
|
171
|
+
| Licence tracking | | All licences logged? Expiry alerts set? Conditions tracked? |
|
|
172
|
+
| Record retention | | 5-year retention in place? Accessible for audit? |
|
|
173
|
+
| Internal audit | | Annual ITAR audit completed? Findings tracked? |
|
|
174
|
+
| Incident response | | VSD procedure documented and communicated? |
|
|
@@ -0,0 +1,146 @@
|
|
|
1
|
+
# ITAR Licensing Guide — 22 CFR Parts 123–125
|
|
2
|
+
|
|
3
|
+
## License Types at a Glance
|
|
4
|
+
|
|
5
|
+
| License / Agreement | CFR Reference | Purpose | Typical Use |
|
|
6
|
+
|--------------------|---------------|---------|-------------|
|
|
7
|
+
| DSP-5 | 22 CFR § 123.1 | Permanent export of defense articles | Hardware sale/transfer to foreign end-user |
|
|
8
|
+
| DSP-73 | 22 CFR § 123.5 | Temporary export | Trade shows, testing, repair abroad |
|
|
9
|
+
| DSP-94 | 22 CFR § 123.6 | Temporary import | Foreign defense article entering US temporarily |
|
|
10
|
+
| DSP-61 | 22 CFR § 123.9 | Import license | Permanent import from certain countries |
|
|
11
|
+
| Technical Assistance Agreement (TAA) | 22 CFR § 124.1 | Export of technical data / defense services | Engineering support, training, design assistance |
|
|
12
|
+
| Manufacturing License Agreement (MLA) | 22 CFR § 124.2 | Licensed foreign manufacture | Overseas production of US defense articles |
|
|
13
|
+
| Warehouse/Distribution Agreement | 22 CFR § 124.14 | Stocking items abroad for resale | Distributor model |
|
|
14
|
+
|
|
15
|
+
---
|
|
16
|
+
|
|
17
|
+
## DSP-5 (Permanent Export License)
|
|
18
|
+
|
|
19
|
+
### When Required
|
|
20
|
+
Any export of USML hardware not covered by an exemption.
|
|
21
|
+
|
|
22
|
+
### Application Requirements
|
|
23
|
+
Submit via DDTC's D-Trade portal:
|
|
24
|
+
- **Block 1**: Applicant (DDTC registration number)
|
|
25
|
+
- **Block 2**: Country of ultimate destination
|
|
26
|
+
- **Block 3**: Foreign end-user name and address
|
|
27
|
+
- **Block 4**: Description of articles (USML category, quantity, value)
|
|
28
|
+
- **Block 5**: End-use statement (intended use, no re-export without US government approval)
|
|
29
|
+
- **Supporting docs**: Purchase order, end-user certificate, import certificate if required by destination country
|
|
30
|
+
|
|
31
|
+
### Processing Times
|
|
32
|
+
- Standard: 30–60 days
|
|
33
|
+
- Significant Military Equipment (SME): may require Congressional notification (22 USC § 2776) for sales ≥$14M
|
|
34
|
+
|
|
35
|
+
### License Conditions (common)
|
|
36
|
+
- Items may not be re-exported without prior DDTC authorisation
|
|
37
|
+
- End-user restrictions apply
|
|
38
|
+
- US government access rights for audits
|
|
39
|
+
- 4-year validity; extendable
|
|
40
|
+
|
|
41
|
+
---
|
|
42
|
+
|
|
43
|
+
## DSP-73 (Temporary Export)
|
|
44
|
+
|
|
45
|
+
### When Required
|
|
46
|
+
Hardware leaving the US temporarily (not for resale/transfer to foreign ownership).
|
|
47
|
+
|
|
48
|
+
### Key Requirements
|
|
49
|
+
- Describe items precisely; document serial numbers
|
|
50
|
+
- State duration and purpose (e.g., "air show display," "field test," "repair and return")
|
|
51
|
+
- Items must return to the US by the license expiry date
|
|
52
|
+
- License conditions prohibit use in combat, operational deployment
|
|
53
|
+
|
|
54
|
+
---
|
|
55
|
+
|
|
56
|
+
## Technical Assistance Agreement (TAA)
|
|
57
|
+
|
|
58
|
+
### Purpose
|
|
59
|
+
Authorises the export of **technical data** and/or **defense services** to specific foreign persons/entities. Required even for oral disclosure of ITAR-controlled technical data to a foreign national.
|
|
60
|
+
|
|
61
|
+
### Required TAA Clauses (22 CFR § 124.9)
|
|
62
|
+
1. **Scope of agreement**: Precise description of technical data / defense services
|
|
63
|
+
2. **Parties**: US licensor + all foreign licensees, authorised sub-licensees
|
|
64
|
+
3. **Retransfer prohibition**: No further disclosure/transfer without prior written DDTC approval
|
|
65
|
+
4. **US government rights**: US government may review all records; terminate agreement
|
|
66
|
+
5. **Record-keeping**: 5-year retention
|
|
67
|
+
6. **Audit rights**: US licensor right to audit foreign licensee compliance
|
|
68
|
+
7. **Term**: Normally 5 years; must renew before expiry
|
|
69
|
+
8. **Security classification handling** (if applicable)
|
|
70
|
+
|
|
71
|
+
### Amendment Requirements
|
|
72
|
+
Any change to scope, parties, or authorised countries requires a formal amendment approved by DDTC.
|
|
73
|
+
|
|
74
|
+
### Common TAA Uses
|
|
75
|
+
- Sharing engineering drawings with foreign manufacturer
|
|
76
|
+
- Providing maintenance training to foreign military
|
|
77
|
+
- Technical support under FMS (Foreign Military Sales) cases
|
|
78
|
+
- Joint development programmes with foreign partners
|
|
79
|
+
|
|
80
|
+
---
|
|
81
|
+
|
|
82
|
+
## Manufacturing License Agreement (MLA)
|
|
83
|
+
|
|
84
|
+
### Purpose
|
|
85
|
+
Allows a foreign person to manufacture a defense article under US licence — typically for local production under an FMS programme or commercial arrangement.
|
|
86
|
+
|
|
87
|
+
### Key Differences from TAA
|
|
88
|
+
| Feature | TAA | MLA |
|
|
89
|
+
|---------|-----|-----|
|
|
90
|
+
| What is transferred | Technical data / services | Manufacturing rights + technical data |
|
|
91
|
+
| Foreign party produces? | No | Yes |
|
|
92
|
+
| Sub-licensing allowed? | Conditional | Usually yes, with restrictions |
|
|
93
|
+
| Offset programs | Not typical | Common |
|
|
94
|
+
|
|
95
|
+
### Required MLA Clauses
|
|
96
|
+
- Licence to manufacture (specific quantities, articles, versions)
|
|
97
|
+
- Quality assurance provisions
|
|
98
|
+
- US government rights (inspection, audit, terminate)
|
|
99
|
+
- Retransfer and re-export controls
|
|
100
|
+
- Royalty / fee structure
|
|
101
|
+
- End-of-programme disposition of tooling and data
|
|
102
|
+
|
|
103
|
+
---
|
|
104
|
+
|
|
105
|
+
## ITAR Exemptions (Selected)
|
|
106
|
+
|
|
107
|
+
Certain transfers do not require a licence if all conditions are met. **Exemptions are NOT blanket authorisations — verify conditions every time.**
|
|
108
|
+
|
|
109
|
+
### Key Exemptions (22 CFR Part 123–126)
|
|
110
|
+
|
|
111
|
+
| Exemption | CFR Reference | Conditions |
|
|
112
|
+
|-----------|--------------|-----------|
|
|
113
|
+
| US government | § 126.4 | Export by/for US Dept of Defense, State, etc. with government orders |
|
|
114
|
+
| Canada exemption | § 126.5 | Certain unclassified hardware to Canada only; does not apply to all categories |
|
|
115
|
+
| Australian/UK exemption | § 126.7 | Limited scope for certain Gov-to-Gov and industry-to-industry transfers; requires eligibility verification |
|
|
116
|
+
| Intra-company | § 125.4(b)(9) | Technical data to wholly owned US subsidiary abroad; limited scope |
|
|
117
|
+
| Beta test software | § 125.4(b)(10) | Unclassified software for beta testing by foreign person; narrow conditions |
|
|
118
|
+
| Beta hardware | § 123.16 | Temporary export of unclassified hardware for demonstration; strict limits |
|
|
119
|
+
|
|
120
|
+
**Australia, UK, Canada Defence Trade Cooperation Treaties**: Provide streamlined licensing for covered defence articles between treaty partners; not a blanket exemption.
|
|
121
|
+
|
|
122
|
+
---
|
|
123
|
+
|
|
124
|
+
## Foreign Military Sales (FMS) vs Direct Commercial Sales (DCS)
|
|
125
|
+
|
|
126
|
+
| Aspect | FMS | DCS |
|
|
127
|
+
|--------|-----|-----|
|
|
128
|
+
| Contract party | US Government (DSCA) | US company directly |
|
|
129
|
+
| ITAR licence | Not required (US Gov exemption) | DSP-5 / TAA required |
|
|
130
|
+
| End-use assurance | US Government provides | US company responsible |
|
|
131
|
+
| Price | Government + administrative fees | Market rate |
|
|
132
|
+
| Delivery risk | US Government manages | US company manages |
|
|
133
|
+
|
|
134
|
+
---
|
|
135
|
+
|
|
136
|
+
## Record-Keeping Requirements (22 CFR § 122.5)
|
|
137
|
+
|
|
138
|
+
All ITAR registrants must maintain for **5 years**:
|
|
139
|
+
- All export/import licences and shipping documents
|
|
140
|
+
- All TAA/MLA agreements and associated records
|
|
141
|
+
- End-user certificates and purchase orders
|
|
142
|
+
- Records of all disclosures of technical data
|
|
143
|
+
- Commodity Jurisdiction requests and determinations
|
|
144
|
+
- Voluntary disclosure records
|
|
145
|
+
|
|
146
|
+
Records must be available for inspection by DDTC, US Customs, DoD, or other US government agencies.
|
|
@@ -0,0 +1,93 @@
|
|
|
1
|
+
# USML Categories — United States Munitions List (22 CFR § 121.1)
|
|
2
|
+
|
|
3
|
+
The USML consists of 21 categories. Items **specifically enumerated** here are ITAR-controlled as defense articles.
|
|
4
|
+
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
## Category I — Firearms, Close Assault Weapons and Combat Shotguns
|
|
8
|
+
Firearms with calibre ≤ 20mm; rifles, carbines, pistols, revolvers, shotguns intended for military use; suppressors; bayonets.
|
|
9
|
+
|
|
10
|
+
## Category II — Guns and Armament
|
|
11
|
+
Guns, howitzers, cannons >20mm; mortars; recoilless rifles; flamethrowers (military); launch tubes.
|
|
12
|
+
|
|
13
|
+
## Category III — Ammunition/Ordnance
|
|
14
|
+
Ammunition for items in Cat I/II; military explosives and propellants; military pyrotechnics; guided projectiles.
|
|
15
|
+
|
|
16
|
+
## Category IV — Launch Vehicles, Guided Missiles, Ballistic Missiles, Rockets, Torpedoes, Bombs and Mines
|
|
17
|
+
All military rockets, missiles, bombs, torpedoes, depth charges, land mines; space launch vehicles used for military purposes; re-entry vehicles.
|
|
18
|
+
|
|
19
|
+
## Category V — Explosives and Energetic Materials, Propellants, Incendiary Agents and their Precursors
|
|
20
|
+
Military explosives and fuels (e.g., PETN, RDX, HMX, TATB); incendiary agents; smoke/obscurant materials specifically designed for military use.
|
|
21
|
+
|
|
22
|
+
## Category VI — Vessels of War and Special Naval Equipment
|
|
23
|
+
Warships (surface and submarine); armed vessels; military SCUBA and underwater breathing devices; naval nuclear reactors.
|
|
24
|
+
|
|
25
|
+
## Category VII — Tanks and Military Vehicles
|
|
26
|
+
Tanks; armoured combat vehicles; military tactical vehicles; mine-clearing vehicles; military bridges.
|
|
27
|
+
|
|
28
|
+
## Category VIII — Aircraft and Associated Equipment
|
|
29
|
+
Military aircraft (manned and unmanned) — fighters, bombers, attack, patrol, transport; military aero-engines; related airframes; certain civil aircraft modified for military use; military life support systems.
|
|
30
|
+
|
|
31
|
+
## Category IX — Military Training Equipment
|
|
32
|
+
Flight simulators; parachutes (military); military survival equipment; training aircraft simulators.
|
|
33
|
+
|
|
34
|
+
## Category X — Protective Personnel Equipment and Shelters
|
|
35
|
+
Body armour (beyond NIJ Level III+); combat helmets; NBC protective suits; military nuclear/biological/chemical detection equipment.
|
|
36
|
+
|
|
37
|
+
## Category XI — Military Electronics
|
|
38
|
+
Military electronic systems: radar (military); jamming equipment; IFF (Identification Friend or Foe); military navigation; electronic warfare (EW); targeting systems; military cryptographic equipment (see also Cat XIII).
|
|
39
|
+
|
|
40
|
+
## Category XII — Fire Control, Range Finder, Optical and Guidance and Control Equipment
|
|
41
|
+
Military targeting optics; laser rangefinders (military); infrared imaging (military); night-vision devices (NVDs); military gyroscopes; fire control computers.
|
|
42
|
+
|
|
43
|
+
## Category XIII — Auxiliary Military Equipment
|
|
44
|
+
Chemical/biological agents (listed); military nuclear materials; depleted uranium; military explosives detection; military training devices; TEMPEST/emissions security equipment; cryptographic items not in Cat XI.
|
|
45
|
+
|
|
46
|
+
## Category XIV — Toxicological Agents, Including Chemical Agents, Biological Agents, and Associated Equipment
|
|
47
|
+
Schedule 1, 2, 3 chemical weapons agents and precursors (CWC Schedules applied to USML); biological agents suitable for weaponisation; medical countermeasures (military).
|
|
48
|
+
|
|
49
|
+
## Category XV — Spacecraft Systems and Associated Equipment
|
|
50
|
+
Military satellites; spacecraft systems for intelligence, surveillance, reconnaissance (ISR); directed energy weapons in space; associated ground control equipment.
|
|
51
|
+
|
|
52
|
+
## Category XVI — Nuclear Weapons, Design and Testing Related Items
|
|
53
|
+
Nuclear weapons; nuclear weapon design and testing software; all items primarily useful for nuclear weapons development.
|
|
54
|
+
|
|
55
|
+
## Category XVII — Classified Articles, Technical Data and Defense Services Not Otherwise Enumerated
|
|
56
|
+
Catch-all for classified items. No exports without prior DDTC authorisation.
|
|
57
|
+
|
|
58
|
+
## Category XVIII — Directed Energy Weapons
|
|
59
|
+
High-energy lasers (military); particle beam weapons; high-power radio frequency (HPM) weapons.
|
|
60
|
+
|
|
61
|
+
## Category XIX — Gas Turbine Engines and Associated Equipment
|
|
62
|
+
Military gas turbine engines for aircraft/vessels/vehicles; hot section components; military engine test equipment.
|
|
63
|
+
|
|
64
|
+
## Category XX — Submersible Vessels, Oceanographic and Associated Equipment
|
|
65
|
+
Military submarines; autonomous underwater vehicles (military); deep-submergence rescue vehicles; military sonar.
|
|
66
|
+
|
|
67
|
+
## Category XXI — Articles, Technical Data and Defense Services Not Otherwise Enumerated
|
|
68
|
+
Catch-all for items not covered by Cat I–XX that are determined to provide critical military/intelligence advantage. Used sparingly via CJ determination.
|
|
69
|
+
|
|
70
|
+
---
|
|
71
|
+
|
|
72
|
+
## Key Definitions
|
|
73
|
+
|
|
74
|
+
**Defense article** (22 CFR § 120.31): Any item or technical data designated on the USML.
|
|
75
|
+
|
|
76
|
+
**Defense service** (22 CFR § 120.32): Furnishing assistance (training, technical data, engineering) to a foreign person for the design, manufacture, production, operation, maintenance, or modification of defense articles.
|
|
77
|
+
|
|
78
|
+
**Technical data** (22 CFR § 120.33): Information directly related to defense articles in any tangible form — blueprints, drawings, specifications, software source code, test reports.
|
|
79
|
+
|
|
80
|
+
**Specially designed** (22 CFR § 120.41): The primary test for whether a component or part falls under ITAR. An item is specially designed if it was developed, configured, or adapted to provide a critical performance parameter enabling the military capability of a USML end-item.
|
|
81
|
+
|
|
82
|
+
---
|
|
83
|
+
|
|
84
|
+
## USML vs CCL Jurisdiction Tips
|
|
85
|
+
|
|
86
|
+
| Scenario | Likely Jurisdiction |
|
|
87
|
+
|----------|-------------------|
|
|
88
|
+
| Item specifically listed in USML (Cat I–XXI) | ITAR |
|
|
89
|
+
| Item removed from USML via Export Control Reform | EAR (often ECCN 0Yxxx) |
|
|
90
|
+
| Commercial item with no military application | EAR / EAR99 |
|
|
91
|
+
| Ambiguous — file a Commodity Jurisdiction (CJ) request | DDTC determines |
|
|
92
|
+
|
|
93
|
+
A **Commodity Jurisdiction (CJ)** determination (22 CFR § 120.4) is the official process to obtain DDTC's ruling on whether an item is on the USML. Submit via DDTC's online portal with item description, specifications, and intended use.
|