A practical, shop-floor-ready guide to identifying export controlled technical data and implementing access controls, secure transfers, visitor rules, and documented workflows that stand up to defense and aerospace audits.
If you manufacture, machine, or supply materials for U.S. defense and aerospace programs, you handle export-controlled data—whether you realize it or not. ITAR (International Traffic in Arms Regulations) and EAR (Export Administration Regulations) impose strict requirements on how technical data, drawings, specifications, and certain types of manufacturing information are stored, transmitted, accessed, and displayed. Violations carry severe penalties including fines, debarment, and criminal prosecution.
This article covers practical steps that suppliers—especially small and mid-size manufacturers—should take to handle export-controlled data properly, including website content, digital systems, physical facility controls, and employee access management.
Under ITAR, technical data includes any information required for the design, development, production, manufacture, assembly, operation, repair, testing, maintenance, or modification of defense articles. This is broader than most suppliers initially assume. It includes:
Engineering drawings and 3D models with tolerances, materials, and process callouts. Manufacturing process parameters (laser power, scan strategies, heat treatment cycles, HIP parameters). Test results, inspection data, and qualification reports. Material specifications and powder characterization data for titanium, tungsten, and other controlled materials. Build files for additive manufacturing. Tooling and fixture designs. Software directly related to defense articles.
Under EAR, controlled technical data relates to items on the Commerce Control List (CCL). The key distinction is that ITAR covers defense articles (USML), while EAR covers dual-use items. Many suppliers handle both categories and must comply with both regulatory frameworks.
Your website is the most visible—and often most overlooked—area of export control risk. Key rules:
Do not publish controlled technical data on your website. This sounds obvious, but it happens regularly. Suppliers post detailed process parameters, material test data, qualification results, or AM build specifications to demonstrate capability—without realizing this constitutes a deemed export to any foreign person who accesses the site.
Marketing content is generally fine. You can describe your capabilities, certifications, material types, equipment, and general process categories. What you cannot do is provide enough technical detail that a foreign person could use the information to replicate a defense-related manufacturing process.
Brochures, white papers, and case studies should be reviewed for controlled content before publication. A case study that describes specific process parameters, test results, or performance data for a defense program likely contains controlled technical data.
Contact forms and RFQ portals should not require or accept upload of controlled technical data without access controls. If your website allows customers to upload drawings or specifications, you need to ensure that the upload mechanism uses encrypted transmission, that storage is access-controlled, and that foreign persons do not have access to the uploaded files.
Controlled technical data must be stored in systems that prevent unauthorized access—especially access by non-U.S. persons. Practical requirements include:
Access control — all systems containing controlled data must have role-based access limited to authorized U.S. persons. This includes file servers, ERP systems, CAD/PLM systems, email servers, and cloud storage. Generic shared logins are not acceptable.
Encryption — data at rest and in transit should be encrypted. For CUI (Controlled Unclassified Information), NIST SP 800-171 specifies encryption requirements. For ITAR data, encryption is not a safe harbor for export control purposes—encryption alone does not exempt data from ITAR controls—but it is a necessary layer of protection.
Cloud services — if you use cloud storage or cloud-based applications, verify that the provider's infrastructure is entirely within the United States, that data is not replicated to foreign data centers, and that foreign nationals employed by the cloud provider do not have access to your data. Major cloud providers offer ITAR-compliant enclaves (AWS GovCloud, Azure Government), but standard commercial tiers typically do not meet ITAR requirements.
Email — controlled technical data should not be transmitted via unencrypted email. If you must send controlled data electronically, use encrypted file transfer, SFTP, or an ITAR-compliant collaboration platform. Never send ITAR data to personal email accounts or via consumer messaging services.
Backups — backup systems must meet the same access control and encryption requirements as primary storage. Backup tapes or drives stored offsite must be at a facility that meets physical security requirements.
ITAR requires that defense articles and technical data be physically secured against unauthorized access:
Facility access — the manufacturing facility should have controlled entry with visitor logging. Areas where controlled data is accessed or where defense articles are manufactured should be restricted to authorized personnel.
Visitor management — all visitors must be logged, escorted in controlled areas, and verified as U.S. persons before being granted unescorted access to areas containing ITAR data or defense articles. Foreign national visitors require special handling and may need a license or exemption.
Document control — paper copies of controlled drawings, specifications, and reports must be tracked, stored securely, and destroyed when no longer needed. Shredding or pulping is required—not simply recycling.
Manufacturing floor — machine controllers, workstations, and displays showing controlled data or programs must not be visible to unauthorized persons. Consider screen positioning, privacy filters, and physical barriers where necessary.
The human element is the most common source of export control violations. Key controls include:
U.S. person verification — before granting any employee access to ITAR-controlled data, verify their status as a U.S. person (U.S. citizen, lawful permanent resident, or protected individual). Document this verification and retain records.
Need-to-know access — not every U.S. person employee needs access to all controlled data. Implement role-based access so employees only see the data relevant to their function.
Training — all employees with access to controlled data must receive export control training at onboarding and at regular intervals (typically annually). Training should cover what ITAR and EAR are, what controlled data looks like in your specific operations, prohibited behaviors (forwarding drawings to personal email, discussing technical details with foreign visitors, posting process data online), and how to report suspected violations.
Offboarding — when employees leave, immediately revoke all access to controlled data systems. Retrieve any physical documents, devices, or access tokens. Document the offboarding process.
Based on DDTC enforcement actions and industry experience, the most common supplier mistakes include:
Sending ITAR-controlled drawings or data to foreign subcontractors or partners without a license. Allowing foreign national employees or interns to access controlled data without a technology transfer license. Posting detailed process parameters or test data on public websites. Using non-compliant cloud services that replicate data to foreign servers. Failing to maintain access logs or visitor records. Treating all technical data as uncontrolled unless someone specifically flags it as ITAR—the default should be the opposite.
The cost of getting export controls wrong is severe: civil penalties up to $500,000 per violation under ITAR, criminal penalties including imprisonment, and debarment from future defense contracts. Beyond penalties, a violation investigation disrupts operations, damages customer relationships, and can permanently exclude a supplier from the defense industrial base.
For suppliers building or improving their export control program:
1) Classify your data. Audit what technical data you hold, determine its classification (ITAR/USML, EAR/CCL, or uncontrolled), and label it accordingly. When in doubt, consult with an export control attorney or compliance specialist.
2) Audit your systems. Map every system that touches technical data—file servers, email, cloud, ERP, CAD, shop floor terminals—and verify access controls, encryption, and geographic boundaries.
3) Review your website. Have someone with export control knowledge review every page, download, and public-facing document for controlled content. Remove or restrict anything that crosses the line.
4) Implement access controls. Role-based access for digital systems, physical access controls for the facility, and documented U.S. person verification for all personnel with access to controlled data.
5) Train your people. Initial and annual training for all relevant employees, with documented completion records.
6) Document everything. Maintain records of access authorizations, training, visitor logs, data transfers, and any incidents or near-misses. Documentation is your defense in an audit or investigation.
Export control compliance is not optional for defense and aerospace suppliers. The requirements are clear, the penalties are real, and the enforcement environment is active. Suppliers who build compliance into their operations from the start—rather than treating it as an afterthought—protect their business and position themselves as trustworthy partners for programs that require controlled data handling.
Learn more about how Metal Powder Supply supports aerospace and defense manufacturing:
Need a quote or have questions about your project? Request a quote or contact our team to discuss your requirements.
Define a controlled-data object in PLM/ERP/MES with mandatory metadata (program, export classification/markings, distribution statement, revision, owner, and retention). Enforce role-based access at the record level (project-based permissions, U.S.-person-only where required), MFA for privileged roles, and immutable audit logs for view/download/export events. Use formal change control so build files, NC programs, inspection plans, and certification pack contents are linked to the released revision and cannot be used from uncontrolled local copies. Periodically review access lists and close out projects by revoking access and archiving records per contract/AS9100 retention rules.
Allow remote access only through managed devices and an approved secure method (VPN/zero-trust gateway) with MFA and no split tunneling where applicable. Prohibit local storage of controlled files unless the endpoint is centrally managed and full-disk encrypted; prefer virtual desktops or remote application access that keeps data in the controlled environment. Use access-controlled portals or expiring links for sharing large datasets, with download logging and time-bounded permissions. Establish rules for screen sharing (authorized attendees only, recording disabled unless approved) and ensure derived artifacts created remotely are saved back into the controlled project workspace.
Treat it as an incident with immediate containment: stop further distribution, revoke link access, recover or destroy uncontrolled prints, and preserve logs/evidence. Notify internal compliance (Empowered Official/export compliance lead), IT/security, and program leadership per the documented escalation path; coordinate customer notification as required by contract. Perform a root-cause and corrective action through the quality system (e.g., AS9100 corrective action), addressing process gaps such as intake classification, permissioning, training, or transfer method. Document the event, impacted data, individuals involved, containment actions, and preventive measures, and update procedures and training to prevent recurrence.
Our team of experts is ready to help you find the right materials and manufacturing solutions for your project.