


{"id":38,"date":"2016-05-23T18:07:30","date_gmt":"2016-05-23T18:07:30","guid":{"rendered":"http:\/\/research.unl.edu\/researchcompliance\/?page_id=38"},"modified":"2025-11-25T15:17:12","modified_gmt":"2025-11-25T15:17:12","slug":"activities-subject-to-export-controls","status":"publish","type":"page","link":"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/","title":{"rendered":"Export Control Guidance (A-Z)"},"content":{"rendered":"\n<div class=\"backToTop\"><i class=\"fa fa-chevron-up\"><\/i> back to top<\/div>\n\n\n\n<p>This page is intended to provide guidance regarding activities subject to export controls and typically overseen by the Export Control Compliance Program (ECCP). Topics and definitions are arranged alphabetically from A-Z. If you are unable to find an answer to your questions, please contact the ECCP at <a href=\"mailto:exportcontrol@unl.edu\">exportcontrol@unl.edu<\/a>, or 402-472-6965. <\/p>\n\n\n\n<p>As a reminder, your research or\nactivities may be subject to&nbsp;<a href=\"http:\/\/research.unl.edu\/researchcompliance\/export-control-defined\/\">export controls<\/a>&nbsp;if you:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Are shipping items internationally<\/li>\n\n\n\n<li>Will be traveling outside the U.S.<\/li>\n\n\n\n<li>Plan to have foreign national(s) participate in research or want to collaborate with a researcher or institution from outside the U.S.<\/li>\n\n\n\n<li>Are working on a project that has contractual restrictions regarding proprietary information, foreign national participation, publications restrictions, or that specifically includes export control regulations as a condition of the award, contract, or agreement.<\/li>\n\n\n\n<li>Will be receiving military or space related information, controlled unclassified\/covered defense information, technical data, equipment or software, or will require a DD2345 form.<\/li>\n\n\n\n<li>Will be researching or working on subjects related to nuclear, chemical, biological, weaponry, missiles, or unmanned vehicle technologies.<\/li>\n\n\n\n<li>Working with encryption technology.<\/li>\n\n\n\n<li>Will perform work involving select agents or other pathogens.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"list-of-topics\"><strong>List of Topics<\/strong><\/h2>\n\n\n\n<p><a href=\"#Arms_Embargo\">Arms Embargo<\/a><\/p>\n\n\n\n<p><a href=\"#Atomic_Energy_Act\">Atomic Energy Act (AEA) Data &#8211; Tiers (1-3)<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/research.unl.edu\/researchcompliance\/research-data-security-guidance-topics-a-z\/#CMMC\">Cybersecurity Maturity Model Classification (CMMC)<\/a><\/p>\n\n\n\n<p><a href=\"#CCL\">Commerce Control List (CCL)<\/a><\/p>\n\n\n\n<p><a href=\"#CUI_CDI\">Controlled Unclassified Information (CUI) &amp; Covered Defense Information (CDI)<\/a><\/p>\n\n\n\n<p><a href=\"#C_E_Technology\" data-type=\"internal\" data-id=\"#C_E_Technology\">Critical and Emerging Technology<\/a><\/p>\n\n\n\n<p><a href=\"#DD2345\">DD 2345 Form<\/a><\/p>\n\n\n\n<p><a href=\"#Deemed_Export\">Deemed Export<\/a><\/p>\n\n\n\n<p><a href=\"#Dual_Use\">Dual Use<\/a><\/p>\n\n\n\n<p><a href=\"#DURC\" data-type=\"internal\" data-id=\"#DURC\">Dual-Use Research of Concern (DURC)<\/a><\/p>\n\n\n\n<p><a href=\"#CCL\">EAR 99<\/a><\/p>\n\n\n\n<p><a href=\"#Educational_Info\">Educational Information<\/a><\/p>\n\n\n\n<p><a href=\"#Embargoed_Sanctioned_Countries\">Embargoed or Sanctioned Countries with Special Rules<\/a><\/p>\n\n\n\n<p><a href=\"#Entities_On_Restricted_List\">Entities on the Restricted List<\/a><\/p>\n\n\n\n<p><a href=\"#Export\">Export<\/a><\/p>\n\n\n\n<p><a href=\"#EAR\">Export Administration Regulations (EAR)<\/a><\/p>\n\n\n\n<p><a href=\"#CCL\">Export Control Classification Number (ECCN)<\/a><\/p>\n\n\n\n<p><a href=\"#Export_Controls\">Export Controls<\/a><\/p>\n\n\n\n<p><a href=\"#Biological_Agents_Toxins\">Export Controls &amp; Biological Agents and Toxins<\/a><\/p>\n\n\n\n<p><a href=\"#Export_License\">Export License<\/a><\/p>\n\n\n\n<p><a href=\"#License_Exception\">Export License Exception<\/a><\/p>\n\n\n\n<p><a href=\"#Foreign_National\">Foreign National<\/a><\/p>\n\n\n\n<p><a href=\"#FRE\">Fundamental Research Exclusion (FRE)<\/a><\/p>\n\n\n\n<p><a href=\"#International_Shipping\">International Shipping<\/a><\/p>\n\n\n\n<p><a href=\"#International_Travel\">International Travel<\/a><\/p>\n\n\n\n<p><a href=\"#remote_presentations\">International Conferences and Presentations (Remote)&nbsp;<\/a><\/p>\n\n\n\n<p><a href=\"#ITAR\">International Traffic in Arms Regulations (ITAR)<\/a><\/p>\n\n\n\n<p><a href=\"#letter_of_attestation\">Letter of Attestation<\/a><\/p>\n\n\n\n<p><a href=\"#Military\">Military or Space Related Research<\/a><\/p>\n\n\n\n<p><a href=\"#NASA_Checklist\" data-type=\"internal\" data-id=\"#NASA_Checklist\">NASA Checklist<\/a><\/p>\n\n\n\n<p><a href=\"#OFAC\">The Office of Foreign Assets Control (OFAC)<\/a><\/p>\n\n\n\n<p><a href=\"#Meetings\">Open &amp; Closed Meetings<\/a><\/p>\n\n\n\n<p><a href=\"#online_STEM_courses\">Online STEM courses to Sanctioned and Embargoed Countries<\/a>&nbsp;<\/p>\n\n\n\n<p><a href=\"#Research_FN\">Participation in Research by Foreign Nationals<\/a><\/p>\n\n\n\n<p><a href=\"#Publicly_Available\">Publicly Available, Public Domain, and Open Source<\/a><\/p>\n\n\n\n<p><a href=\"#Purchasing_EC\">Purchasing &amp; Export Controls Guidance<\/a><\/p>\n\n\n\n<p><a href=\"#ReExport\">Re-export<\/a><\/p>\n\n\n\n<p><a href=\"#Pub_Restrictions\">Restrictions on Publication<\/a><\/p>\n\n\n\n<p><a href=\"#Nuclear_UAV_Missiles\">Research Related to Nuclear, Chemical, Biological Weaponry, Missiles, or Unmanned Vehicles<\/a><\/p>\n\n\n\n<p><a href=\"#Pathogens\">Research Involving Select Agents or Other Pathogens<\/a><\/p>\n\n\n\n<p><a href=\"#Encryption\">Research Related to Encryption Technologies<\/a><\/p>\n\n\n\n<p><a href=\"#RPS\">Restricted Party Screening (RPS)<\/a><\/p>\n\n\n\n<p><a href=\"#Safeguarding\">Safeguarding Covered Defense Information, Controlled Unclassified Information &amp; Office 365 US Government<\/a><\/p>\n\n\n\n<p><a href=\"#Student_Theses_Dissertations_EC\">Student Theses\/Dissertations &amp; Export Controls<\/a><\/p>\n\n\n\n<p><a href=\"#Technical_data\">Technical Data<\/a><\/p>\n\n\n\n<p><a href=\"#Technology\" data-type=\"internal\" data-id=\"#Technology\">Technology<\/a><\/p>\n\n\n\n<p><a href=\"#Restrictions_Sanctions_Lists\">United States Restrictions and Sanctions Related Lists (Consolidated Screening List)<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Arms_Embargo\"><strong>Arms Embargo<\/strong><\/h2>\n\n\n\n<p>The International Traffic in Arms Regulations (ITAR) prohibits exports, transfers and import of defense data, services and articles regulated under the ITAR to certain countries under a U.S. arms embargo or sanctions <a href=\"https:\/\/www.ecfr.gov\/cgi-bin\/retrieveECFR?gp=&amp;SID=70e390c181ea17f847fa696c47e3140a&amp;mc=true&amp;r=PART&amp;n=pt22.1.126#se22.1.126_11\" target=\"_blank\" rel=\"noreferrer noopener\">(22 CFR 126.1)<\/a>. It is the policy of the United States to deny licenses and other approvals for exports and imports of defense articles and defense services, destined for or originating in certain countries.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>For defense articles and defense services, the following countries have a policy of denial:<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Belarus<\/li>\n\n\n\n<li>Burma<\/li>\n\n\n\n<li>China<\/li>\n\n\n\n<li>Cuba<\/li>\n\n\n\n<li>Iran<\/li>\n\n\n\n<li>North Korea<\/li>\n\n\n\n<li>Syria<\/li>\n\n\n\n<li>Venezuela<\/li>\n<\/ul>\n\n\n\n<p>2. For defense articles and defense services, a policy of denial applies to the following countries except as specified in the associated paragraphs under <a href=\"https:\/\/www.ecfr.gov\/cgi-bin\/retrieveECFR?gp=&amp;SID=70e390c181ea17f847fa696c47e3140a&amp;mc=true&amp;r=PART&amp;n=pt22.1.126#se22.1.126_11\">126.1<\/a>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Afghanistan<\/li>\n\n\n\n<li>Central African Republic<\/li>\n\n\n\n<li>Cyprus<\/li>\n\n\n\n<li>Democratic Republic of the Congo<\/li>\n\n\n\n<li>Eritrea<\/li>\n\n\n\n<li>Haiti<\/li>\n\n\n\n<li>Iraq<\/li>\n\n\n\n<li>Lebanon<\/li>\n\n\n\n<li>Libya<\/li>\n\n\n\n<li>Somalia<\/li>\n\n\n\n<li>South Sudan<\/li>\n\n\n\n<li>Sudan<\/li>\n\n\n\n<li>Zimbabwe<\/li>\n<\/ul>\n\n\n\n<p>This means that, for UNL employees, shipping, sharing, or importing defense data or services with\/from any of the above countries, including citizens of these countries, may constitute a violation of U.S. export control law. Appropriate approvals, where applicable, must be in place prior to engaging in such activities with these countries. Please be sure and contact the Export Control Compliance Program before you consider involvement in any such activity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Atomic_Energy_Act\">Atomic Energy Act (AEA) Data &#8211; Tiers (1-3)<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__www.energy.gov_sites_prod_files_migrated_nnsa_2017_11_f45_NAP-2D23-2520AC1-2520Final-25202-2D9-2D15.pdf&amp;d=DwMFAg&amp;c=Cu5g146wZdoqVuKpTNsYHeFX_rg6kWhlkLF8Eft-wwo&amp;r=FJlGKl3wwcMuFglo1aCWcZ7bPTImTweCK42P-vwMLAw&amp;m=lZ99xOYNuX3laZjylxI3Uwyf0ty5xXwzF32yIYb8L_Y&amp;s=Atc7yVIiet70U9ZSGCDKCaAovUMA_PxkATE_8xoYMTo&amp;e=\">Atomic Energy Act<\/a> (AEA) was established in 1946 after World War II in order to determine how the United States would control and manage nuclear technology and to assure the proper management of source, special nuclear, and byproduct material. The <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__www.energy.gov_nnsa_national-2Dnuclear-2Dsecurity-2Dadministration&amp;d=DwMFAg&amp;c=Cu5g146wZdoqVuKpTNsYHeFX_rg6kWhlkLF8Eft-wwo&amp;r=FJlGKl3wwcMuFglo1aCWcZ7bPTImTweCK42P-vwMLAw&amp;m=lZ99xOYNuX3laZjylxI3Uwyf0ty5xXwzF32yIYb8L_Y&amp;s=TkNsAF2oiWUB0lhHHAc80qGCvOAoatR8aJNJB7bni-I&amp;e=\" target=\"_blank\" rel=\"noreferrer noopener\">National Nuclear Security Administration<\/a> (NNSA) is the agency within the Department of Energy that is responsible for administering regulations&nbsp; controlling a broad range of atomic energy activities, including assistance to foreign atomic energy activities related to nuclear weapons, and AEA-controlled information, which includes all classified or unclassified policies, practices, information, technical data, items, materials, facilities, equipment, software, technologies or services used to design, assess, detect, develop, fabricate, qualify, maintain, transport, render safe, or dispose of devices implementing a military application of atomic energy. These span the range of Technology Readiness Levels from basic research through Manufacturing Readiness Levels (expanding scientific principles that may have manufacturing implications through production).<\/p>\n\n\n\n<p>Indications of AEA control may include information which is developed utilizing nuclear weapon program funding. Under <a href=\"https:\/\/directives.nnsa.doe.gov\/nnsa-policy-documents\/nap-0476-001-adm-chg1\" target=\"_blank\" rel=\"noreferrer noopener\">NNSA Policy NAP 476.1<\/a>, AEA-controlled information is managed in a graded manner:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>Tier 1:<\/strong><\/strong> Tier 1 contains everything that involves the unique category of Restricted Data (RD) or Formerly Restricted Data (FRD). Restricted Data is all data concerning the design, manufacture or utilization of atomic weapons; production of special nuclear material; or use of special nuclear material. Formerly restricted data is classified information that has been removed from the RD category, which relates to military utilization of atomic weapons and which needs specific safeguarding. Note, the word \u201cformerly restricted\u201d does not mean unclassified; all Restricted Data and Formerly Restricted Data is classified. Because the University of Nebraska is not accredited to handle or store classified materials, UNL personnel cannot engage in research or other work involving Tier 1 data.<\/li>\n\n\n\n<li><strong>Tier 2:<\/strong> Tier 2 applies to non-nuclear parts of atomic weapons or the utilization of facilities whose disclosure would contribute significantly to another nation\u2019s atomic weapon capability. Tier 2 contains data that is not Restricted Data or Formerly Restricted Data, but which reveals a specific nuclear weapon function (e.g. arming or fusing) or reveals special capabilities necessary to design, develop, produce or evaluate nuclear weapons or nuclear weapon tests or any other nuclear explosions. Data controlled under Tier 2 may be classified or unclassified. Some information and items, which if used for other purposes would be identified in the nuclear equipment and material listed in the Commerce control list (<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__www.nrc.gov_reading-2Drm_doc-2Dcollections_cfr_part110_&amp;d=DwMFAg&amp;c=Cu5g146wZdoqVuKpTNsYHeFX_rg6kWhlkLF8Eft-wwo&amp;r=FJlGKl3wwcMuFglo1aCWcZ7bPTImTweCK42P-vwMLAw&amp;m=lZ99xOYNuX3laZjylxI3Uwyf0ty5xXwzF32yIYb8L_Y&amp;s=zVPZWN_oU7hEmw3pXWDCJAIXNJ3FwqlLLy1E8Wt5O9A&amp;e=\">10 CFR 110<\/a>), the U.S. Munitions List (<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__www.federalregister.gov_documents_2018_05_24_2018-2D10366_international-2Dtraffic-2Din-2Darms-2Dregulations-2Dus-2Dmunitions-2Dlist-2Dcategories-2Di-2Dii-2Dand-2Diii&amp;d=DwMFAg&amp;c=Cu5g146wZdoqVuKpTNsYHeFX_rg6kWhlkLF8Eft-wwo&amp;r=FJlGKl3wwcMuFglo1aCWcZ7bPTImTweCK42P-vwMLAw&amp;m=lZ99xOYNuX3laZjylxI3Uwyf0ty5xXwzF32yIYb8L_Y&amp;s=u8_pTZfSWWS9FiUe6CcF3ANq4MufCsgFY6XsLrMfico&amp;e=\">22 CFR 121<\/a>), Unclassified Controlled Nuclear Information (<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__www.directives.doe.gov_directives-2Ddocuments_200-2Dseries_0241.1-2DBOrder-2Db&amp;d=DwMFAg&amp;c=Cu5g146wZdoqVuKpTNsYHeFX_rg6kWhlkLF8Eft-wwo&amp;r=FJlGKl3wwcMuFglo1aCWcZ7bPTImTweCK42P-vwMLAw&amp;m=lZ99xOYNuX3laZjylxI3Uwyf0ty5xXwzF32yIYb8L_Y&amp;s=EwyG4mgWSvvE7qjWBnv3HjEXkMJAjBdl6XldrParPWY&amp;e=\">DOE Order 241.1B<\/a>), or DOE Official Use Only, are considered Tier 2 when incorporated in, modified for, or manufactured for nuclear weapon-related activities. Because the University of Nebraska is not accredited to handle or store classified materials, UNL personnel cannot engage in research or other work involving classified Tier 2 data.<\/li>\n\n\n\n<li><strong>Tier 3:<\/strong> Tier 3 contains all information and items used in nuclear weapon-related activities which are neither Tier 1 nor Tier 2.<\/li>\n<\/ul>\n\n\n\n<p>UNL faculty and staff conducting work regulated under the AEA Tier 2 or Tier 3 must have a Technology Control Plan (TCP) in place before the project starts. Due to the restrictions on this type of work, AEA regulated projects are treated similarly to work falling under the International Traffic in Arms Regulations. Please contact the Export Compliance Program, to ensure all appropriate approvals are in place and a TCP has been established prior to beginning the project.<\/p>\n\n\n\n<p>See <a href=\"https:\/\/research.unl.edu\/researchcompliance\/resources\/\" target=\"_blank\" rel=\"noreferrer noopener\">Regulatory Information &amp; Other Resources<\/a> for additional travel requirements when engaging in DOE work that is regulated under the AEA. Restrictions and requirements are typically included in award documents, but please contact the Export Compliance Program with questions about how this might apply to your work under a DOE award.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"CCL\">Commerce Control List (CCL), ECCNs, &amp; EAR 99 <\/h2>\n\n\n\n<p>A key in determining whether an export license is needed\nor applicable in controlling a particular item, from the Department of Commerce,\nis knowing whether the item you intend to export has a specific Export Control\nClassification Number (ECCN). The ECCN is an alpha-numeric code, (which may\nlook something like this: 3A001) and that describes the item and indicates\nlicensing requirements. All ECCNs are listed in the&nbsp;<a href=\"http:\/\/www.bis.doc.gov\/index.php\/regulations\/export-administration-regulations-ear\">Commerce\nControl List (CCL)<\/a>&nbsp;(Supplement\nNo. 1 to Part 774 of the EAR) which is available on the Government Printing\nOffice website. The CCL is divided into the following ten broad categories, and\neach category is further subdivided into five product groups.<\/p>\n\n\n\n<figure class=\"wp-block-table dcf-table-bordered\"><table><tbody><tr><td>\n  0\n  <\/td><td>\n  Nuclear\n  &amp; Miscellaneous\n  <\/td><\/tr><tr><td>\n  1\n  <\/td><td>\n  Materials,\n  Chemicals, Microorganisms and Toxins\n  <\/td><\/tr><tr><td>\n  2\n  <\/td><td>\n  Materials\n  Processing\n  <\/td><\/tr><tr><td>\n  3\n  <\/td><td>\n  Electronics\n  <\/td><\/tr><tr><td>\n  4\n  <\/td><td>\n  Computers\n  <\/td><\/tr><tr><td>\n  5 Part\n  1\n  <\/td><td>\n  Telecommunications\n  <\/td><\/tr><tr><td>\n  5 Part\n  2\n  <\/td><td>\n  Information Security\n  <\/td><\/tr><tr><td>\n  6\n  <\/td><td>\n  Sensors\n  and Lasers\n  <\/td><\/tr><tr><td>\n  7\n  <\/td><td>\n  Navigation\n  and Avionics\n  <\/td><\/tr><tr><td>\n  8\n  <\/td><td>\n  Marine\n  <\/td><\/tr><tr><td>\n  9\n  <\/td><td>\n  Aerospace and Propulsion\n  <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:48px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-table dcf-table-bordered\"><table><tbody><tr><td>\n  A\n  <\/td><td>\n  Systems, Equipment and\n  Components\n  <\/td><\/tr><tr><td>\n  B\n  <\/td><td>\n  Test,\n  Inspection and Production Equipment\n  <\/td><\/tr><tr><td>\n  C\n  <\/td><td>\n  Material\n  <\/td><\/tr><tr><td>\n  D\n  <\/td><td>\n  Software\n  <\/td><\/tr><tr><td>\n  E\n  <\/td><td>\n  Technology\n  <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>If your item falls under U.S. Department of Commerce jurisdiction but is not listed on the CCL, it is designated as EAR99. <\/p>\n\n\n\n<p>EAR99 is the general \u201ccatch-all\u201d classification number assigned to any item that is subject to the EAR but that does not have a specific export control classification number listed in the Commerce Control list.  EAR99 items generally consist of low-technology consumer goods and do not require a license in many situations. However, if you plan to export an EAR99 item to an embargoed country, to an end-user of concern, or in support of a prohibited end-use, you may be required to obtain a license and should check with ECCP staff prior to making any export decisions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"CUI_CDI\"><strong>Controlled Unclassified Information (CUI) &amp; Covered Defense Information (CDI)<\/strong><\/h2>\n\n\n\n<p>This information is intended to provide guidance to the UNL campus regarding applicability of Controlled Unclassified Information (CUI) and Covered Defense Information (CDI) in research and securing controlled information via Office 365 US Government.<\/p>\n\n\n\n<p><strong>Controlled Unclassified Information<\/strong> (CUI) is federal non-classified information (<a href=\"https:\/\/www.ecfr.gov\/cgi-bin\/text-idx?SID=afd2d82eb107bc8e2e9a4b34cb2ad723&amp;mc=true&amp;node=pt32.6.2002&amp;rgn=div5\" target=\"_blank\" rel=\"noreferrer noopener\">32 CFR Part 2002<\/a>)&nbsp;the U.S. Government creates or possesses, or that a non-federal&nbsp;entity (i.e. the University of Nebraska-Lincoln) receives, possesses, or creates for, or on behalf of, the U.S Government,&nbsp;that requires information security controls to safeguard&nbsp;or disseminate.<\/p>\n\n\n\n<p><strong>Covered Defense Information<\/strong> (CDI) is a category of CUI. CDI is a specific term used by the DoD to describe information that requires protection under the DFARS Clause 252.204-7012, it is defined as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Controlled Technical Information (CTI)<\/li>\n\n\n\n<li>DoD Critical Infrastructure Security Information<\/li>\n\n\n\n<li>Naval Nuclear Propulsion Information<\/li>\n\n\n\n<li>Unclassified Controlled Nuclear Information (UCNI) \u2013 Defense<\/li>\n<\/ul>\n\n\n\n<p><strong>As described in the Controlled Unclassified Information (CUI) Registry, CUI is divided into the following organizational groups:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"916\" height=\"612\" src=\"https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/cui-image.png\" alt=\"\" class=\"wp-image-2062\" srcset=\"https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/cui-image.png 916w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/cui-image-300x200.png 300w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/cui-image-768x513.png 768w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/cui-image-600x401.png 600w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/cui-image-624x417.png 624w\" sizes=\"auto, (max-width: 916px) 100vw, 916px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The categories in bold are examples of data that university researchers and administrators may commonly encounter in the course of their work. For a full list of subgroups within each organizational group, reference the <a href=\"https:\/\/www.archives.gov\/cui\/registry\/category-list\" target=\"_blank\" rel=\"noreferrer noopener\">National Archives<\/a>.<\/li>\n\n\n\n<li>All CUI requires some form of safeguarding however, some groups of CUI must also comply with export control regulations to protect the information; these will most commonly fall under the categories listed in the two inner circles.<\/li>\n<\/ul>\n\n\n\n<p><em>Key\nInformation:<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>While CUI encompasses multiple areas of information, University researchers will typically encounter CUI requirements included in sponsor contracts (FAR\/DFAR (252.204-7008, 7009, 7012 clauses) or in regulations governing the type of data they are receiving\/collecting\/storing\/transmitting (e.g. HIPAA, FERPA, genetic information).<\/li>\n\n\n\n<li>Information, as defined by the federal CUI Program, may include research data and other project information that a research team receives, possesses, or creates in the performance of a sponsored contract.\n<ul class=\"wp-block-list\">\n<li>This means that a research project at the University of Nebraska-Lincoln (UNL) may require the implementation of information security controls when the federal contract\/award contains language\/clauses (FAR, DFAR) requiring those controls for CUI or CDI.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Office of Research Compliance, Integrity, and Security (RCIS) and Office of Sponsored Programs (OSP) review&nbsp;research contracts and awards to determine the applicability of the clauses in negotiation with the sponsor.<\/li>\n\n\n\n<li>A research project may also include CUI if it is using data acquired under a&nbsp;Data Use\/Transfer Agreement (DUA\/DTA) and the data (e.g. CDI\/HIPAA\/PHI) is categorized as CUI.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p id=\"for-marking-of-cui-and-other-helpful-information\"><strong>For Marking of CUI and other helpful information <\/strong><\/p>\n\n\n\n<p>The table below has questions that are intended to help research personnel determine if something is Controlled Unclassified Information (CUI) and how to document\/treat it. This is a helpful guide but does not include all of the needed information. For additional resources please use the following links below:<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.archives.gov\/files\/cui\/documents\/20161206-cui-marking-handbook-v1-1-20190524.pdf?_ga=2.242765890.1755493648.1637696565-39405878.1636999563\" target=\"_blank\" rel=\"noreferrer noopener\">CUI Marking Handbook<\/a> gives you instructions on how to handle and document CUI as well as other helpful information. The <a href=\"https:\/\/www.esd.whs.mil\/Portals\/54\/Documents\/DD\/issuances\/dodi\/520048p.PDF?_ga=2.242765890.1755493648.1637696565-39405878.1636999563\" target=\"_blank\" rel=\"noreferrer noopener\">DoD Instruction 5200.48 Controlled Unclassified Information (CUI)<\/a> has information about CUI regulations regarding DoD.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>University of Nebraska-Lincoln Guidance Document for Marking Research Documents and Presentations to ensure appropriate access and documentation.<\/strong><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Please use the table below while creating presentations, documents, reports that may be using <strong>controlled unclassified<\/strong> and <strong>proprietary information<\/strong>.<\/p>\n\n\n\n<p>*Documents, reports, etc. will be referred to as article in the guidance*<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>&nbsp;<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Question<\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Yes<\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><strong><\/strong><\/td><\/tr><tr><td>1.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Does the article include any controlled or proprietary information?<\/td><td class=\"has-text-align-center\" data-align=\"center\">Identify what type of controlled and\/or proprietary information it includes, including what the relevant sources are and go to <strong><em>Question 2.<\/em><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">No marking necessary. &nbsp; (If an article does not include any type of controlled and\/or proprietary information, it may be useful to mark the first page as such). &nbsp;<\/td><\/tr><tr><td>2.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Did the external party provide you information that is proprietary and non-public that you have included in the article? (Make sure to check that the external party allows such information to be included by reviewing all necessary forms\/documents, non-disclosure agreements, material transfer agreements and any other documents).<\/td><td class=\"has-text-align-center\" data-align=\"center\">Ensure that the cover page is marked with the inclusion of such information and consider <strong><em>question 4.<\/em><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">No action required.<\/td><\/tr><tr><td>3.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Does the article include any research results subject to a publication or dissemination restriction? An example is the DFAR 252.204-7000 Disclosure of Information clause.<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong><em>Consider question 4.<\/em><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">No marking necessary. &nbsp; (If an article does not include any type of controlled and\/or proprietary information, it may be useful to mark the first page as such). &nbsp;<\/td><\/tr><tr><td>4.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Considering the type of controlled information identified by questions 2 and 3, is the controlled information technical information subject to the US export control regulations? (Consider this information. <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#Technology\" target=\"_blank\" rel=\"noreferrer noopener\">Technology<\/a>, under the EAR and <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#Technical_data\" target=\"_blank\" rel=\"noreferrer noopener\">Technical Data<\/a> under the ITAR.)<\/td><td class=\"has-text-align-center\" data-align=\"center\">If yes, mark the cover page with the Export Control disclaimer. (Below guidance) &nbsp; Best Practice: consider including in the portion markers in the relevant sections of the document the classification and jurisdiction of the technology or technical data. (ITAR Cat II or ECCN EAR99). <strong><em>Consider Question 5.<\/em><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">No additional action required.<\/td><\/tr><tr><td>5.<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Considering the type of controlled information identified in earlier questions, is there any Controlled Unclassified Information included?<\/td><td class=\"has-text-align-center\" data-align=\"center\">Mark in accordance with CUI Marking Handbook &nbsp; At a minimum, ensure that the Cover page is marked Controlled or CUI and that each page in the document includes a Banner marking of Controlled or CUI. &nbsp; If CUI specified, you must include the specific authority in the banner marking. (E.g. Export Controlled Research should be marked as CUI\/\/SP-EXPTR &nbsp; Best Practice: if the document includes both controlled and publicly releasable information, consider portion marking. [1]<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;No additional action required.<\/td><\/tr><tr><td>6.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Considering the type of controlled information identified in earlier questions, is there any Covered Defense Information included?<\/td><td class=\"has-text-align-center\" data-align=\"center\">Mark in accordance with the DoD Instruction 5200.48 Controlled Unclassified Information (CUI)<\/td><td class=\"has-text-align-center\" data-align=\"center\">No additional action required.<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">1. Portion marking for CUI would be (CUI) or (CUI\/\/relevant category) and portion marking for uncontrolled information is (U).<\/figcaption><\/figure>\n\n\n\n<p><strong>The following disclaimer language is provided as a template for research personnel to utilize:<\/strong><\/p>\n\n\n\n<p><strong>Export Control Disclaimer<\/strong> &#8211; WARNING &#8211; This document contains technical data whose export is restricted by the Arms Export Control Act (Title 22, U.S.C., Sec 2751, et seq.) or the Export Administration Act of 1979, as amended (Title 50, U.S.C., App. 2401 et seq.). Violations of these export laws are subject to severe criminal penalties.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Video Reference for CUI-Marking Instructions<\/strong><\/p>\n\n\n\n<p><strong>Video:<\/strong>&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=UxpF21AsxZE\" target=\"_blank\" rel=\"noreferrer noopener\">Introduction to Marking CUI (updated August 6, 2018)<\/a>&nbsp;\u2013 For an overview of how to mark documents, emails, presentations, systems, and other files containing CUI, watch this video. It addresses the designation indicator and CUI banner marking, including CUI control marking, CUI category markings, and Limited Dissemination Control Markings. The video also discusses portion marking, cover sheets, marking multipage documents, and decontrolling CUI.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<ul class=\"wp-block-list\">\n<li>0:00 \u2014&nbsp;Intro:&nbsp; What a Marking Standard Is<\/li>\n\n\n\n<li>1:32 \u2014&nbsp;CUI Basics<\/li>\n\n\n\n<li>1:44 \u2014&nbsp;CUI-Specified<\/li>\n\n\n\n<li>2:38 \u2014&nbsp;Designation Indicator<\/li>\n\n\n\n<li>3:22 \u2014&nbsp;Banner Marking<\/li>\n\n\n\n<li>6:48 \u2014&nbsp;Limited Dissemination Controls<\/li>\n\n\n\n<li>8:15 \u2014&nbsp;Portion Marking<\/li>\n\n\n\n<li>9:31 \u2014&nbsp;Marking Multiple Pages<\/li>\n\n\n\n<li>9:53 \u2014&nbsp;Separate Banner Markings from Administrative Markings<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<ul class=\"wp-block-list\">\n<li>10:49 \u2014&nbsp;Coversheets<\/li>\n\n\n\n<li>11:32 \u2014&nbsp;Forms<\/li>\n\n\n\n<li>12:17 \u2014&nbsp;Email<\/li>\n\n\n\n<li>13:20 \u2014&nbsp;Presentations\/PowerPoints<\/li>\n\n\n\n<li>13:53 \u2014&nbsp;Transmittal Documents<\/li>\n\n\n\n<li>14:28 \u2014&nbsp;Electronic Media (hard drive, USB, CD ,etc.)<\/li>\n\n\n\n<li>14:56 \u2014&nbsp;Audio, Video, and Photographs<\/li>\n\n\n\n<li>15:40 \u2014&nbsp;Shipping and Mailing<\/li>\n\n\n\n<li>16:04 \u2014&nbsp;Decontrol CU<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p>See the video for details:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.youtube.com\/watch?v=UxpF21AsxZE\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"484\" height=\"273\" src=\"https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2022\/02\/CUI-Video-Thumbnail.png\" alt=\"\" class=\"wp-image-2624\" srcset=\"https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2022\/02\/CUI-Video-Thumbnail.png 484w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2022\/02\/CUI-Video-Thumbnail-300x169.png 300w\" sizes=\"auto, (max-width: 484px) 100vw, 484px\" \/><\/a><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>For more videos from the National Archive on CUI related topics please use the link below:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.archives.gov\/cui\/training.html#intro-to-marking\" target=\"_blank\" rel=\"noreferrer noopener\">CUI Training | National Archives<\/a><\/p>\n\n\n\n<p>See also guidance topic on <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#Safeguarding\" target=\"_blank\" rel=\"noreferrer noopener\">Safeguarding Covered Defense Information, Controlled Unclassified Information &amp; Office 365 US Government<\/a>.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Training Resources<\/strong><\/p>\n\n\n\n<p>If you will be working with CUI, Export Control Compliance Staff may require you to take a course on CUI. If you score a 70% or better you will pass the course and receive a certification. This certification does not expire, however UNL has determined it will be valid for 3 years upon the completion date.  <\/p>\n\n\n\n<p>If Export Control requires you to complete a CUI training, use the link below for access to the training and information. (Please note, if you are not required to take this training you are still allowed to take the training for your own personal knowledge).<\/p>\n\n\n\n<p><a href=\"https:\/\/securityawareness.usalearning.gov\/cui\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">DoD Mandatory Controlled Unclassified Information (CUI) Training (usalearning.gov)<\/a><\/p>\n\n\n\n<p><strong>For additional resources regarding CUI and Cyber Security Training please use the following resources below.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CUI information <a href=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Export%20Controls%20(EC)\/Guidance%20Documents\/21-03-29%20ESO%20CUI%20Slick%20Sheet%20FINAL.pdf?csf=1&amp;web=1&amp;e=zmh1Ww?e=WMaSje\" data-type=\"URL\" data-id=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Export%20Controls%20(EC)\/Guidance%20Documents\/21-03-29%20ESO%20CUI%20Slick%20Sheet%20FINAL.pdf?csf=1&amp;web=1&amp;e=zmh1Ww?e=WMaSje\" target=\"_blank\" rel=\"noreferrer noopener\">Brochure\/Handout<\/a>.<\/li>\n\n\n\n<li>DoD Cyber Awareness Challenge, this training covers several different areas of Cyber Awareness.\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/public.cyber.mil\/training\/cyber-awareness-challenge\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Awareness Challenge 2022 \u2013 DoD Cyber Exchange<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Identifying and Safeguarding Personally Identifiable Information (PII), this training discusses how to correctly identify and safeguard PII.\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/public.cyber.mil\/training\/identifying-and-safeguarding-personally-identifiable-information-pii-v4\/\" target=\"_blank\" rel=\"noreferrer noopener\">Identifying and Safeguarding Personally Identifiable Information (PII) \u2013 DoD Cyber Exchange<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>For further assistance\/questions please consult with UNL Export Control Compliance Personnel. *If your project is documented as an Export Control Project in NuRamp, there may be more information that is specific to your research in the Project details.*<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"C_E_Technology\">Critical and Emerging Technology<\/h2>\n\n\n\n<p>Critical and Emerging Technologies reference broader areas of technology the U.S. government has identified as having an economic and\/or strategic defense advantage and are taking measures to control the proliferation of these technologies.&nbsp;<\/p>\n\n\n\n<p>The areas below are a few of the common areas of potential national security for Critical and Emerging Technologies. There are more areas that may be considered Critical and Emerging, and this list is subject to change depending on the federal government.<\/p>\n\n\n\n<p>If you are planning on or are conducting research, work or any other activities in these fields, then your work may fall under the new Critical and Emerging Technology policy (<a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2024\/02\/Critical-and-Emerging-Technologies-List-2024-Update.pdf\">Listed Update<\/a>) issued under the National Science and Technology Council (NSTC) dated February 2024.<\/p>\n\n\n\n<p>To help determine if your activities are subject to the new policy please see the questions below. The questions below are not comprehensive but are meant to give guidance. UNL Export Control also has additional <a href=\"https:\/\/research.unl.edu\/researchcompliance\/export-control-process\/\">information<\/a> to help you determine if you work may be export controlled. If you have questions or think your work may relate to this policy, please contact UNL Export Control. &nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Does your sponsor (RFI\/RFP, award contract, grant, or other documents) state that the work is Critical and Emerging or include other Research Security, Cybersecurity, or Export Control restrictions\/clauses?<\/li>\n\n\n\n<li>Regardless of funding, are you planning or are you working with international collaborators? &nbsp;\n<ul class=\"wp-block-list\">\n<li>Including sending equipment, material or data internationally?<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Is your work controlled under the EAR, NRC, ITAR or another regulatory agency?<\/li>\n<\/ul>\n\n\n\n<p><em>If you answered yes to any of the items above, your work may be controlled under this policy.<\/em><\/p>\n\n\n\n<p><strong>Common areas defined as Critical and Emerging technologies for national security can include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Advanced Computing<\/strong>: Using computer clusters or supercomputers to complete projects, research or activities. &nbsp;<\/li>\n\n\n\n<li><strong>Advanced Engineering Materials<\/strong>: Material specially designed for specific applications that has improved properties compared to traditional materials.<\/li>\n\n\n\n<li><strong>Advanced Gas Turbine Engine Technologies<\/strong>: Engines or technologies to improve standard Advanced Gas Turbine Engines. &nbsp;<\/li>\n\n\n\n<li><strong>Advanced and Networked Sensing and Signature Management<\/strong>: Process of understanding, studying and modifying electromagnetic signatures, commonly done in military applications.<\/li>\n\n\n\n<li><strong>Advanced Manufacturing<\/strong>: New and advanced equipment, technologies and procedures to improve manufacturing of products. &nbsp;<\/li>\n\n\n\n<li><strong>Artificial Intelligence<\/strong>: Theory and development of computer systems in order to perform specific tasks or tasks that involve intelligence.<\/li>\n\n\n\n<li><strong>Biotechnologies<\/strong>: The use of living organisms or biological material\/systems to create or modify other products.<\/li>\n\n\n\n<li><strong>Clean Energy Generation and Storage<\/strong>: The process of creating clean power solutions, storage and products.<\/li>\n\n\n\n<li><strong>Data Privacy, Data Security, and Cybersecurity Technologies<\/strong>: Data that may have specific safety, security, national threat and other controlled data and cybersecurity technologies, data, and products.<\/li>\n\n\n\n<li><strong>Directed Energy<\/strong>: Using electromagnetic systems to alter chemical and electrical energy into radiated energy that can be used to target a specific area.<\/li>\n\n\n\n<li><strong>Highly Automated, Autonomous, and Uncrewed Systems (UxS), and Robotics<\/strong>: Devices and equipment involving or using Uncrewed Systems and Robotics.<\/li>\n\n\n\n<li><strong>Human-Machine Interfaces<\/strong>: Devices that allow for the interaction of human and machines, systems or devices.<\/li>\n\n\n\n<li><strong>Hypersonics<\/strong>: Equipment, materials, or devices capable of going five times faster than the speed of sound (Mach 5).<\/li>\n\n\n\n<li><strong>Integrated Communication and Networking Technologies<\/strong>: The use of equipment, devices or software to create different communication or networking groups that can process and communicate information.<\/li>\n\n\n\n<li><strong>Positioning, Navigation, and Timing (PNT) Technologies<\/strong>: Technology used to determine how, where and when something may happen.<\/li>\n\n\n\n<li><strong>Quantum Information and Enabling Technologies<\/strong>: The use of quantum mechanics and theory to process and transmit information.<\/li>\n\n\n\n<li><strong>Semiconductors and Microelectronics: <\/strong>Semiconductors or integrated circuits are made of solid substances that are made up of conductive and insulator material for electronic devices. Microelectronics are small scale circuits or devices.<\/li>\n\n\n\n<li><strong>Space Technologies and Systems<\/strong>: Equipment, devices, software and material that is used for space related activities.<\/li>\n<\/ul>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Advanced Computing and Semiconductor Research and Manufacturing<\/summary>\n<p>New Export Controls Related to Advanced Computing and&nbsp;Semiconductor Manufacturing<\/p>\n\n\n\n<p>On October 7, 2022, the Department of Commerce announced a series of new export controls <a href=\"https:\/\/www.federalregister.gov\/documents\/2022\/10\/13\/2022-21658\/implementation-of-additional-export-controls-certain-advanced-computing-and-semiconductor\">rules<\/a> on advanced computing and semiconductor manufacturing items. The interim final rules were made effective on 11\/17\/2023. The regulatory agencies&#8217; guidance <a>are<\/a> subject to change, so please make sure to contact UNL Export Control for the most current regulations. While the new export control regulations are largely targeted at the People\u2019s Republic of China, including Hong Kong, (collectively \u201cPRC\u201d), the breadth and scope extend beyond the PRC to Macau and other <a href=\"https:\/\/www.bis.gov\/ear\/title-15\/subtitle-b\/chapter-vii\/subchapter-c\/part-740\/supplement-no-1-part-740-country-groups\">D5 Countries<\/a>. The controls are intended to restrict the PRC\u2019s ability to obtain advanced computing chips, develop and maintain supercomputers, and manufacture advanced semiconductors. In addition, the new rules make clear that foreign government actions that prevent the U.S. from making compliance determinations will impact certain foreign companies\u2019 access to U.S. technology.&nbsp;<\/p>\n\n\n\n<p>Per UNL <a href=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Webpages\/EC\/Published%20to%20Web\/EC%20Policies%20%26%20Procedures\/EC%20Policy%20PDF%20%26%20Separate%20Docs\/Policy%20pdfs%20PUBLISHED%20TO%20WEB\/UNL%20ECCP%20Policy%209.001_Foreign%20Transaction%20Review.pdf?csf=1&amp;web=1&amp;e=T6SgqT?csf=1&amp;web=1&amp;e=xjOBv8\">ECCP Policy 9.001<\/a>, all international shipments must be approved by UNL Export Control Compliance Personnel (ECCP). &nbsp;If you work with advanced computing chips, supercomputers, semiconductors, or integrated circuits, please make sure to contact <a href=\"mailto:exportcontrol@unl.edu\">UNL ECCP<\/a> if you plan on working with foreign nationals in the US or will be working with foreign nationals or entities outside the US. &nbsp;<\/p>\n\n\n\n<p><em>Key Information:<\/em><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Adds certain advanced and high-performance computing chips and computer commodities that contain such chips to the <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#CCL\">Commerce Control List (CCL)<\/a> &#8211; meaning an Export Control license will likely be required.<\/li>\n\n\n\n<li>There are new requirements for export control licenses based on the following items. The following items are likely <strong><u>prohibited<\/u><\/strong> without an export license (please check with UNL Export Control Compliance Personnel (ECCP)):\n<ul class=\"wp-block-list\">\n<li>Supercomputer, semiconductor, integrated circuits or semiconductor manufacturing equipment being sent to or used in the PRC, Macau or any D5 country.<\/li>\n\n\n\n<li>If any of the items are sent to or will be used in the PRC, Macau or any D5 country.<\/li>\n\n\n\n<li>If you have material or manufacturing equipment developed by an entity headquartered in, located in or having the parent company headquartered in the PRC, Macau or any D5 country.<\/li>\n\n\n\n<li>If you know your export, reexport or transfer of the items listed above will be used for activities specified in <a href=\"https:\/\/www.ecfr.gov\/current\/title-15\/subtitle-B\/chapter-VII\/subchapter-C\/part-744\/section-744.6\">744.6(c)(2)(i)<\/a> through 744.6(c)(2)(iii).<\/li>\n\n\n\n<li>If you know an item is destined to a semiconductor fabrication facility (any place where production occurs) in the PRC, Macau or any D5 country that fabricates integrated circuits. Licenses for facilities owned by PRC entities will face a \u201cpresumption of denial\u201d, and facilities owned by multinationals will be decided on a case-by-case basis.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>Any form of \u201cSupport\u201d from a U.S. person or entity that contributes to the development and\/or production of integrated circuits at certain PRC-located semiconductor fabrication facilities without an export control license. Fundamental Research or Fundamental Research Exclusion (FRE) does not remove the need for an export license for \u201cSupport\u201d.<\/li>\n\n\n\n<li>Reviews Research Personnel Activities (Services and\/or Development) at Advanced NODE Facilities in PRC, of other facilities working with PRC under the Foreign Direct Product Rule (FDPR).<\/li>\n\n\n\n<li>In addition, no license exceptions (<strong><u>including for temporary travel<\/u><\/strong>) will be available for certain integrated circuits and other items described in this new rule (including associated software and technology) when destined to the PRC.<\/li>\n\n\n\n<li>Shipping, transmitting, or transferring to or within the PRC; facilitating the shipment, transmission, or transfer to or within the PRC; or servicing (anywhere), any item that you know will be used in the development or production of integrated circuits at a semiconductor fabrication facility located in the PRC that fabricates <a href=\"https:\/\/www.ecfr.gov\/current\/title-15\/subtitle-B\/chapter-VII\/subchapter-C\/part-744\/section-744.23\">Advanced-Node Integrated Circuits<\/a> meeting any of the following criteria:\n<ul class=\"wp-block-list\">\n<li>Logic integrated circuits using a non-planar architecture or with a \u201cproduction\u201d technology node of 16\/14 nanometers or less,<\/li>\n\n\n\n<li>NOT-AND (NAND) memory integrated circuits with 128 layers or more; or<\/li>\n\n\n\n<li>Dynamic random-access memory (DRAM) integrated circuits using a \u201cproduction\u201d technology node of 18 nanometer half-pitch or less.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p>*If you are unsure if any of the requirements above will be met, please contact UNL ECCP.<\/p>\n\n\n\n<ol start=\"7\" class=\"wp-block-list\">\n<li>Shipping, transmitting, or transferring to or within the PRC any item; facilitating the shipment, transmission, or transfer to or within the PRC of any item; or servicing any item located in the PRC, that you know will be used in the development or production of integrated circuits at any semiconductor fabrication facility located in the PRC, <strong>regardless of end user<\/strong>.<\/li>\n\n\n\n<li>Exporting any item when you have knowledge that the item will be used in the development, production, use, operation, installation, maintenance, repair, overhaul, or refurbishing of a \u201csupercomputer\u201d located in or destined to the PRC.<\/li>\n\n\n\n<li>Exporting any item when you have knowledge that the item will be incorporated into, or used in the development, or production, of any component or equipment that will be used in a \u201csupercomputer\u201d located in or destined to the PRC.<\/li>\n\n\n\n<li>Exporting any item when you have knowledge that the item will be used in the development or production in the PRC of any parts, components, or equipment as follows: equipment for the manufacturing of semiconductor devices or materials; test equipment for testing finished or unfinished semiconductor devices; test, inspection and production commodities for military electronics; other equipment for the manufacture of electronics parts, components, and materials; or other equipment for the inspection or testing of electronic components and materials.<\/li>\n<\/ol>\n\n\n\n<p><em>*No license exceptions are available for the activities above<\/em><\/p>\n\n\n\n<p><em>*There is a presumption of denial for any license applications made for the activities above<\/em><\/p>\n\n\n\n<p><em>*The regulations are subject to change, please make sure to contact UNL ECCP if you have any questions or may be working in any of the areas above. The items above are a general overview of the new regulations, but do not incorporate the full regulation. Please review the full regulation <\/em><a href=\"https:\/\/www.federalregister.gov\/documents\/2022\/10\/13\/2022-21658\/implementation-of-additional-export-controls-certain-advanced-computing-and-semiconductor\"><em>here<\/em><\/a><em> or contact UNL ECCP.<\/em><\/p>\n\n\n\n<p>In addition, many entities in the PRC (including universities) are being added on a rolling basis to restricted parties\u2019 lists administered by Federal Regulatory agencies such as the Department of Commerce. As a result, heightened due diligence is necessary when dealing with parties in the PRC. Contact the UNL ECCP for <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#RPS\">restricted party screening (RPS)<\/a> of foreign entities or individuals that you wish to collaborate or otherwise engage in research activities with.<\/p>\n\n\n\n<p>Some common items controlled and regulated under these guidelines include the following. This is just an example and does not include all regulated items. The technology controlled under these ECCNs is subject to licensing requirements depending on the end use and country controls and other controls. Please reach out to UNL ECCP for the most up to date guidance.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Export Control Classification Number (ECC)<\/td><td>Description of Semiconductor Manufacturing Equipment (SME)<\/td><\/tr><tr><td>3A090.a<\/td><td>Integrated circuits having one or more digital processing units having either of the following: a.1. a \u2018total processing performance\u2019 of 4800 or more, or a.2. a \u2018total processing performance\u2019 of 1600 or more and a \u2018performance density\u2019 of 5.92 or more.<\/td><\/tr><tr><td>3A090.b<\/td><td>Integrated circuits having one or more digital processing units having either of the following: b.1. a \u2018total processing performance\u2019 of 2400 or more and less than 4800 and a \u2018performance density\u2019 of 1.6 or more and less than 5.92, or b.2. a \u2018total processing performance\u2019 of 1600 or more and a \u2018performance density\u2019 of 3.2 or more and less than 5.92.<\/td><\/tr><tr><td>3B001.a.4<\/td><td>Equip. designed for silicon (Si), carbon doped silicon, silicon germanium (SiGe), or carbon doped SiGe epitaxial growth<\/td><\/tr><tr><td>3B001.d<\/td><td>Deposition equipment<\/td><\/tr><tr><td>3B001.f<\/td><td>Lithography equipment<\/td><\/tr><tr><td>3B001.j<\/td><td>\u201cEUV\u201d mask substrates<\/td><\/tr><tr><td>3B001.k<\/td><td>Equipment designed for ion beam deposition or physical vapor deposition of multilayer reflector for \u201cEUV\u201d masks<\/td><\/tr><tr><td>3B001.l<\/td><td>\u201cEUV\u201d pellicles.<\/td><\/tr><tr><td>3B001.m<\/td><td>Equipment for manufacturing \u201cEUV\u201d pellicles.<\/td><\/tr><tr><td>3B001.n<\/td><td>Equipment designed for coating, depositing, baking, or developing photoresist formulated for \u201cEUV\u201d lithography.<\/td><\/tr><tr><td>3B001.o<\/td><td>Semiconductor wafer fabrication annealing equipment with specified parameters.<\/td><\/tr><tr><td>3B001.p<\/td><td>Three types of semiconductor wafer fabrication cleaning and removal equipment<\/td><\/tr><tr><td>3B002.c<\/td><td>Inspection equipment designed for \u201cEUV\u201d mask blanks or \u201cEUV\u201d patterned masks.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Artificial Intelligence<\/summary>\n<p>There are many types of Artificial Intelligence (AI), which are based on its capabilities, functionalities and technology. While these types of AI are different and have different capabilities, there are no specifications on which type of AI may be more closely regulated under emerging technology regulations. Instead, the controls are likely to come from what the AI is created for, what it can be used for and the type of equipment that is used.<\/p>\n\n\n\n<p>Based on the latest word from Bureau of Industry and Security, they are writing regulations to control certain artificial intelligence related technology and products. It is important to keep that in mind that with the evolving regulatory environment even if you\u2019ve never dealt with or had to think about export controls before, you may end up needing to work with UNL ECCP in the future to ensure compliance with any federal regulations.&nbsp; As of right now there are some regulated AI which pertains to AI and related equipment with military application which meets certain USML categories criteria, particularly category VIII, XII and XIII.<\/p>\n\n\n\n<p><strong>Capabilities<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Narrow\/Weak AI<\/em>\n<ul class=\"wp-block-list\">\n<li>This type of AI can perform specific tasks, such as playing games, navigation, internet searches. This type of AI operates under very specific contexts.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>General\/Strong AI<\/em>\n<ul class=\"wp-block-list\">\n<li>This type of AI can complete more than specific tasks, and can function on its own with its own cognitive capacity.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Superintelligent AI<\/em>\n<ul class=\"wp-block-list\">\n<li>This type of AI is still in the development stage, however, the concept would be AI that is capable of surpassing human intelligence.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Functionality<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Reactive Machines<\/em>\n<ul class=\"wp-block-list\">\n<li>These AI systems do not store memory or past experiences, and they react to the situation in the moment.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Limited Memory<\/em>\n<ul class=\"wp-block-list\">\n<li>Unlike Reactive Machines, Limited Memory does use past data to make informed decisions. This is the most common for AI systems. &nbsp;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Theory of Mind<\/em>\n<ul class=\"wp-block-list\">\n<li>Theory of Mind AI is an improvement on Limited Memory AI as it uses not only past data, but also human emotions, needs, and other human activities\/needs.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Self-aware AI<\/em>\n<ul class=\"wp-block-list\">\n<li>As with Superintelligent AI, this is theoretical. The over all idea of this type of AI would be that the AI would not only be able to understand human emotions, process and learn data but would also become self-aware\/sentient.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Technology<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Machine Learning (ML) (one of the main branches)<\/em>\n<ul class=\"wp-block-list\">\n<li>AI systems capable of self-improvement and learning through experience. Original software\/code is created, and improves upon itself through its experiences.<\/li>\n\n\n\n<li>New ECCN 2B001 is related to Machine Learning Technology (see more below in ECCNS).<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Deep Learning (one of the main branches)<\/em>\n<ul class=\"wp-block-list\">\n<li>Deep Learning is a subset of Machine Learning, the difference is that it learns from large amounts of data versus from experience. This type of AI is used in many image recognition and voice controlled consumer devices.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Natural Language Processing (one of the main branches)<\/em>\n<ul class=\"wp-block-list\">\n<li>This AI is used for interpreting human language and is common for chatbots and translation services\/analysis.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Robotics (one of the main branches)<\/em>\n<ul class=\"wp-block-list\">\n<li>This category covers robots and computers that are designed to use or work with AI.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Computer Vision<\/em>\n<ul class=\"wp-block-list\">\n<li>Computer Vision uses AI to interpret the world visually for different type of image analysis and surveillance.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Expert Systems<\/em>\n<ul class=\"wp-block-list\">\n<li>This system is used to answer questions or solve problems under a specific category or set of rules.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Below are a few examples of how AI may be regulated: <\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>In July 2020 the Bureau of Industry and Security issued a Notice of Inquiry on Advanced Surveillance Systems and Other Items of Human Rights Concerns and proposed amendments to that in their proposed rule that was issued <a href=\"https:\/\/www.federalregister.gov\/documents\/2024\/07\/29\/2024-16498\/export-administration-regulations-crime-controls-and-expansionupdate-of-us-persons-controls\">07\/29\/2024 Export Administration Regulations: Crime Controls and Expansion\/Update of U.S. Persons Controls<\/a>.\n<ul class=\"wp-block-list\">\n<li>There will likely be new licensing requirements for human facial recognition software and other biometric systems for surveillance some of which incorporate artificial intelligence as well as changes to end user\/end country controls<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>If you create Source Code for AI software or algorithms, these may be controlled under the EAR or USML regulations and have restrictions on publication or sharing of source code. The regulations may also restrict the sharing of source code to collaborators or developing source code with foreign collaborators.\n<ul class=\"wp-block-list\">\n<li>Data Transfer Use Agreements or other federal licenses may be required to share source code with others.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Additional Reading materials on AI can be found below: \n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/cset.georgetown.edu\/article\/dont-forget-the-catch-all-basics-ai-export-controls\/\">For Export Controls on AI, Don\u2019t Forget the \u201cCatch-All\u201d Basics<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.reuters.com\/technology\/us-lawmakers-unveil-bill-make-it-easier-restrict-exports-ai-models-2024-05-10\/\">US lawmakers unveil bill to make it easier to restrict exports of AI models<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/natlawreview.com\/article\/footnote-frenzy-charting-out-commerces-proposed-expanded-us-person-and-end-use#google_vignette\">Footnote Frenzy: Charting Out Commerce\u2019s Proposed Expanded US Person and End Use Export Controls and Facial Recognition Controls<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p>Please reach out to <a href=\"mailto:exportcontrol@unl.edu\">UNL ECCP<\/a> for the latest guidance. &nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Hypersonics<\/summary>\n<p>Hypersonics research involves working with material, equipment and items that can travel or are used to travel over five times the speed of sound. Hypersonics were first used during World War 2 and have been continuing to improve in their use for military application, commercial application and in the private sectors. As Hypersonics can be used for a wide variety of reasons, research, data and equipment around Hypersonics may be subject to the International Traffic and Arms Regulation (ITAR) for use in military applications. Hypersonics may also be subject to the Export Administration Regulation (EAR) for items, data and equipment that are dual use (civilian and military).<\/p>\n\n\n\n<p>On October 7<sup>th<\/sup>, 2022 the Bureau of Industry and Security (BIS) released the interim final rule (IFR) \u201c<a href=\"https:\/\/www.federalregister.gov\/documents\/2023\/10\/25\/2023-23055\/implementation-of-additional-export-controls-certain-advanced-computing-items-supercomputer-and\">Implementation of Additional Export Controls: Certain Advanced Computing and Semiconductor Manufacturing Items; Supercomputer and Semiconductor End Use; Entity List Modification<\/a>\u201d. &nbsp;The rule was in part a strategic effort to disrupt China\u2019s ability to use advanced computers for its military modernization efforts including their development of weapons of mass destruction such as nuclear and hypersonic weapons.<\/p>\n\n\n\n<p>International collaboration pertaining to hypersonic may warrant additional safeguarding to prevent violation of federal regulations due to the potential military and dual use application. Whether the data, equipment or items are controlled under the ITAR or EAR, a license may be required to work with international collaborations. This is detailed in the Oct. 7<sup>th<\/sup> rule relating to US persons activity controls, which creates restrictions on foreign end uses and end users of concern.&nbsp;<\/p>\n\n\n\n<p>Determination of if a license is required will be done by the export control office. Please reach out to them if you want to or are planning to work with a foreign entity or individual. This includes working on publications, sending parts, data, equipment, applying for grants, providing a service and more. The determination will be made based on the regulations, type of work, and countries involved in the research. Countries such as Cuba, Iran, North Korea, Syria, Sudan, Russia and China have more restrictions and in some cases are sanctioned from doing work related to hypersonics with the US.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Quantum Information and Enabling Technologies<\/summary>\n<p>The Critical and Emerging technologies policy splits Quantum Information and Enabling Technologies into five sections. These five sections are all based on quantum mechanics and quantum theory.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Quantum computing<\/em>\n<ul class=\"wp-block-list\">\n<li>Involves a multidisciplinary approach to solve complex problems using quantum mechanics\/theory.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Materials, isotopes, and fabrication techniques for quantum devices<\/em>\n<ul class=\"wp-block-list\">\n<li>Research involving quantum devices, quantum materials, or other materials\/items\/data that could be used to create or improve quantum devices, techniques, technologies, and overall quantum related items.\n<ul class=\"wp-block-list\">\n<li>Not limited to semiconductors, computer devices or programs\/software.<\/li>\n\n\n\n<li>If the material, isotopes, technique or device is capable of quantum research, there may be controls around how that system may be used based on the regulations.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Quantum sensing<\/em>\n<ul class=\"wp-block-list\">\n<li>Using quantum systems to make extremely accurate measurements in the environment and our surroundings.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Quantum communications and networking<\/em>\n<ul class=\"wp-block-list\">\n<li>Sending of qubits between quantum networks\/processers.<\/li>\n\n\n\n<li>Ways of communicating through optical fibers, copper wire or microwaves in order to provide faster and more reliable networks.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Supporting systems<\/em>\n<ul class=\"wp-block-list\">\n<li>Systems that are capable of quantum mechanics and quantum theory either in principle or practice.\n<ul class=\"wp-block-list\">\n<li>If a system is capable of quantum research, there may be controls around how that system may be used based on the regulations.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Like other emerging technology areas, regulations are coming out that control certain equipment, and or end use, and may require additional safeguarding if research will be done in a foreign country, for a foreign sponsor or with international collaborators.<\/p>\n\n\n\n<p>In addition to the critical and emerging regulations, a new rule was issued on <a href=\"https:\/\/www.federalregister.gov\/documents\/2024\/09\/06\/2024-19633\/commerce-control-list-additions-and-revisions-implementation-of-controls-on-advanced-technologies#print\">9\/6\/2024<\/a> which added new ECCNS, restrictions on collaborations, international shipping and working with foreign nationals (including foreign nationals inside the US (Deemed Export)).<\/p>\n\n\n\n<p>Some common items controlled and regulated under these guidelines include the following. This is just an example and does not include all regulated items. The technology controlled under these ECCNs is subject to licensing requirements depending on the end use and country controls and other controls. Please reach out to UNL ECCP for the most up to date guidance.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Export Control Classification Number (ECC)<\/td><td>Description of Quantum Technologies<\/td><\/tr><tr><td>3A901*<\/td><td>Quantum processors based on superconducting arrays must operate at extremely low temperatures (20 mK or below), and other quantum computing implementations require colling below 200 mK.<\/td><\/tr><tr><td>3A904*<\/td><td>Cryogenic cooling systems and components.<\/td><\/tr><tr><td>3B904*<\/td><td>Cryogenic wafer probing equipment.<\/td><\/tr><tr><td>3C907*<\/td><td>Epitaxial materials consisting of a \u201csubstrate\u201d having at least one epitaxially grown layer and containing other specified materials.<\/td><\/tr><tr><td>3C908*<\/td><td>Fluorides, hydrides, chlorides, of silicon or germanium, containing other specified materials.<\/td><\/tr><tr><td>3C909*<\/td><td>Silicon, silicon oxides, germanium or germanium oxides, containing any other specified materials.<\/td><\/tr><tr><td>3D901*<\/td><td>\u201cSoftware\u201d, not specified elsewhere, \u201cspecially designed\u201d or modified for the \u201cdevelopment,\u201d \u201cproduction,\u201d of items controlled in ECCN 3A901.b, 3B903, or 3B904.<\/td><\/tr><tr><td>3E003<\/td><td>silicon-on insulation (SOI) technology for the &#8220;development&#8221; or \u201cproduction&#8221; related to radiation hardening of integrated circuits. \u201cTechnology\u201d for the development or production of quantum technology<\/td><\/tr><tr><td>3E003.b<\/td><td>Hetero-structure semiconductor electronic devices such as high<br>&nbsp;&nbsp; electron mobility transistors (HEMT), hetero-bipolar transistors<br>&nbsp;&nbsp; (HBT), quantum well and super lattice devices;<br>&nbsp;&nbsp; Note: 3E003.b does not control &#8220;technology&#8221; for high electron<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;mobility transistors (HEMT) operating at frequencies lower than<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;31.8 GHz and hetero-junction bipolar transistors (HBT) operating<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;at frequencies lower than 31.8 GHz.<\/td><\/tr><tr><td>3E901*<\/td><td>\u201cTechnology\u201d according to the General Technology Note for the \u201cdevelopment\u201d or \u201cproduction\u201d of items controlled by 3A901, 3A904, 3B903, 3B904, 3C907, 3C908, or 3C909.<\/td><\/tr><tr><td>4A006**<\/td><td>Quantum computers and related electronic assemblies and components including specified qubit devices and circuits and quantum control components and measurement devices<\/td><\/tr><tr><td>4A906*<\/td><td>Quantum computers and related \u201celectronic assemblies\u201d and \u201ccomponents\u201d therefor.<\/td><\/tr><tr><td>4D001<\/td><td>a. &#8220;Software&#8221; &#8220;specially designed&#8221; or modified for the &#8220;development&#8221; or &#8220;production&#8221;, of equipment or &#8220;software&#8221; controlled by 4A001, 4A003, 4A004, 4A005 or 4D (except 4D090, 4D980, 4D993 or 4D994).<br><br>b. &#8220;Software&#8221;, other than that controlled by 4D001.a, &#8220;specially<br>&nbsp;&nbsp; designed&#8221; or modified for the &#8220;development&#8221; or &#8220;production&#8221; of<br>&nbsp;&nbsp; equipment as follows:<br>&nbsp;&nbsp; b.1. &#8220;Digital computers&#8221; having an &#8220;Adjusted Peak Performance&#8221;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;(&#8220;APP&#8221;) exceeding 24 Weighted TeraFLOPS (WT);<br>&nbsp;&nbsp; b.2. &#8220;Electronic assemblies&#8221; &#8220;specially designed&#8221; or modified for<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;enhancing performance by aggregation of processors so that the<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&#8220;APP&#8221; of the aggregation exceeds the limit in 4D001.b.1. &nbsp;<\/td><\/tr><tr><td>4D906*<\/td><td>\u201cSoftware\u201d \u201cspecially designed\u201d or modified for the \u201cdevelopment\u201d or \u201cproduction\u201d, of commodities controlled by 4A906.b or 4A906.c.<\/td><\/tr><tr><td>4E001<\/td><td>a. &#8220;Technology&#8221; according to the General Technology Note, for the<br>&nbsp;&nbsp; &#8220;development&#8221;, &#8220;production&#8221;, or &#8220;use&#8221; of equipment or &#8220;software&#8221;<br>&nbsp;&nbsp; controlled by 4A (except 4A980 or 4A994 and &#8220;use&#8221; of equipment<br>&nbsp;&nbsp; controlled under 4A090) or 4D (except 4D980, 4D993, 4D994 and &#8220;use&#8221; of software controlled under 4D090).<br><br>b. &#8220;Technology&#8221; according to the General Technology Note, other than that controlled by 4E001.a, for the &#8220;development&#8221; or \u201cproduction&#8221; of equipment as follows:<br>&nbsp;&nbsp; b.1. &#8220;Digital computers&#8221; having an &#8220;Adjusted Peak Performance&#8221;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;(&#8220;APP&#8221;) exceeding 24 Weighted TeraFLOPS (WT);<br>&nbsp;&nbsp; b.2. &#8220;Electronic assemblies&#8221; &#8220;specially designed&#8221; or modified for<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;enhancing performance by aggregation of processors so that the<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&#8220;APP&#8221; of the aggregation exceeds the limit in 4E001.b.1.<br><br>c. &#8220;Technology&#8221; for the &#8220;development&#8221; of &#8220;intrusion software.&#8221;<br>Note 1: 4E001.a and 4E001.c do not apply to &#8220;vulnerability disclosure&#8221; or &#8220;cyber incident response&#8221;.<br>Note 2: Note 1 does not diminish national authorities&#8217; rights to ascertain compliance with 4E001.a and 4E001.c. &nbsp;<\/td><\/tr><tr><td>4E906*<\/td><td>\u201ctechnology\u201d for the \u201cdevelopment\u201d or \u201cproduction\u201d of items controlled by 4A906.b, 4A906.c, or 4D906; and to control in 4E906.b \u201ctechnology\u201d for the \u201cuse\u201d of \u201csoftware\u201d controlled by 4D906.<\/td><\/tr><tr><td>5A002<\/td><td>&#8220;Information security&#8221; systems, equipment and &#8220;components,&#8221;<\/td><\/tr><tr><td>6A996<\/td><td>&#8220;Magnetometers&#8221; not controlled by ECCN 6A006, &#8220;Superconductive&#8221; electromagnetic sensors, and &#8220;specially designed&#8221; &#8220;components&#8221;&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>*ECCN\u2019s have been added under new rule <a href=\"https:\/\/www.federalregister.gov\/documents\/2024\/09\/06\/2024-19633\/commerce-control-list-additions-and-revisions-implementation-of-controls-on-advanced-technologies#print\">9\/6\/2024<\/a> as quantum items.<\/p>\n\n\n\n<p>** ECCN has been proposed as a new ECCN by BIS, but has not been finalized, this ECCN may be approved in the future, as an ECCN to categorize specific quantum related devices*<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Additional Resources and Considerations<\/summary>\n<p>Facial Recognition Systems have not been identified as Critical and Emerging Technology, but some of the software, technology, equipment and techniques have been controlled by other Critical and Emerging Technology regulations as well as some specific regulations identified in <a href=\"https:\/\/www.federalregister.gov\/documents\/2020\/07\/17\/2020-15416\/advanced-surveillance-systems-and-other-items-of-human-rights-concern\">Advanced Surveillance Systems and Other Items of Human Rights Concern Notice of Inquiry (NOI)<\/a>, which was published July 17<sup>th<\/sup>, 2020.<\/p>\n\n\n\n<p>The BIS introduced a new rule on 9\/6\/2024 titled \u201c<a href=\"https:\/\/www.federalregister.gov\/documents\/2024\/09\/06\/2024-19633\/commerce-control-list-additions-and-revisions-implementation-of-controls-on-advanced-technologies\">Commerce Control List Additions and Revisions; Implementation of Controls on Advanced Technologies Consistent with Control Implemented by International Partners<\/a>\u201d. This rule discusses the addition of ECCNS and license requirements for advanced technologies and quantum devices. The new regulation has added 11 new ECCNS, and has created additional license requirements for countries listed as <a href=\"https:\/\/www.ecfr.gov\/current\/title-15\/subtitle-B\/chapter-VII\/subchapter-C\/part-740\/appendix-Supplement%20No.%201%20to%20Part%20740\">group<\/a> D and E, as well as <a href=\"https:\/\/www.ecfr.gov\/current\/title-15\/subtitle-B\/chapter-VII\/subchapter-C\/part-740\/appendix-Supplement%20No.%201%20to%20Part%20740\">country group A<\/a>. For country group A, certain countries have adopted United States Export Control Policies and may be exempt from licensing requirements (License Exception IEC Eligible). Lastly, this rule adds restrictions on deemed export for certain technologies and software related to advanced computing and quantum technology.<\/p>\n\n\n\n<p>If you are working within any of the fields listed above that are categorized as critical and emerging technologies, please contact UNL Export Control before shipping, sharing, collaborating or any other form of research\/work with a foreign entity\/institution or individual. There may be restrictions upon the type of work that can be conducted in the United States with foreign nationals depending on contractual agreement, categorization (EAR\/ITAR) and deemed export regulations.<\/p>\n\n\n\n<p>An additional regulation to be aware of is the Foreign-Security End User (FSEU), which restricts shipping and collaboration with FSEU. FSEU\u2019s can be <a href=\"https:\/\/www.ecfr.gov\/current\/title-22\/section-126.1\">defined<\/a> as armed forces, police, intelligence, or other internal security forces that are a part of or belong to countries listed in <a href=\"https:\/\/www.ecfr.gov\/current\/title-15\/subtitle-B\/chapter-VII\/subchapter-C\/part-740\/appendix-Supplement%20No.%201%20to%20Part%20740\">Groups D:5 and E<\/a>.<\/p>\n\n\n\n<p>These regulations must be followed no matter if the research is funded or unfunded, and if the research will be published or is already published. These regulations are constantly growing, so please reach out for any questions or concerns around critical and emerging technology.<\/p>\n\n\n\n<p>Additional ECCNS and information that have resulted in changes in how technology is controlled. Some of the ECCNS relate directly to the items listed above as Critical and Emerging technologies while others relate to similar fields of research. &nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Final Rule<\/td><td>ECCN<\/td><td>ECCN Definition<\/td><td>Additional Notes<\/td><\/tr><tr><td><a href=\"https:\/\/www.bis.doc.gov\/index.php\/documents\/regulations-docs\/federal-register-notices\/federal-register-2022\/2893-87-fr-729-0y521-extension-of-controls-on-emerging-tech-software-for-analysis-geospatial-imagery-1-6-22\/file\">1\/06\/2020<\/a><\/td><td>0Y521<\/td><td>Series Supplement\u2014Extension of Controls on an Emerging Technology (Software Specially Designed To Automate the Analysis of Geospatial Imagery Classification)<\/td><td>&nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.bis.doc.gov\/index.php\/documents\/regulations-docs\/2333-category-2-materials-processing-1\/file\">12\/8\/2023<\/a><\/td><td>2B001<\/td><td>Machine tools and any combination thereof, for removing (or cutting) metals, ceramics or \u201ccomposites\u201d, which, according to the manufacturer&#8217;s technical specifications, can be equipped with electronic devices for \u201cnumerical control\u201d; as follows (see List of Items Controlled).<\/td><td>&nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.federalregister.gov\/documents\/2024\/09\/06\/2024-19633\/commerce-control-list-additions-and-revisions-implementation-of-controls-on-advanced-technologies\">9\/6\/2024<\/a><\/td><td>2B910<\/td><td>Additive manufacturing equipment, designed to produce metal or metal alloy components.<\/td><td>Controlled as specially designed for military material and equipment.<\/td><\/tr><tr><td><a href=\"https:\/\/www.bis.doc.gov\/index.php\/documents\/regulations-docs\/federal-register-notices\/federal-register-2019\/2398-84-fr-23886\/file\">5\/23\/2019<\/a><\/td><td>3A001.b<\/td><td>Electronic Items<\/td><td>ECCN 3A001 is amended by adding paragraph b.3.f to control discrete microwave transistors \u2018\u2018rated for operation with a peak saturated power output greater than 5 W (37.0 dBm) at all frequencies exceeding 8.5 GHz up to and including 31.8 GHz\u2019\u2019.<\/td><\/tr><tr><td><a href=\"https:\/\/www.federalregister.gov\/documents\/2020\/07\/17\/2020-15416\/advanced-surveillance-systems-and-other-items-of-human-rights-concern\">7\/17\/2020<\/a><\/td><td>3A980<\/td><td>Voice print identification systems and components<\/td><td>&nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.federalregister.gov\/documents\/2020\/07\/17\/2020-15416\/advanced-surveillance-systems-and-other-items-of-human-rights-concern\">7\/17\/2020<\/a><\/td><td>3A981<\/td><td>Polygraphs and psychological stress analysis equipment and components<\/td><td>&nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.federalregister.gov\/documents\/2024\/09\/06\/2024-19633\/commerce-control-list-additions-and-revisions-implementation-of-controls-on-advanced-technologies\">9\/6\/2024<\/a><\/td><td>3B903<\/td><td>Scanning Electron Microscope (SEM) equipment designed for imaging semiconductor devices or integrated circuits<\/td><td>A specialized SEM can be used to reverse engineer integrated circuits and perform chip design recovery and for this reason warrants national security controls to protect innovation in integrated circuit development of the United States and other supplier countries.<\/td><\/tr><tr><td><a href=\"https:\/\/www.bis.doc.gov\/index.php\/documents\/regulations-docs\/2334-ccl3-8\/file\">11\/17\/2023<\/a><\/td><td>3D003<\/td><td>\u2018Computational lithography\u2019 \u201csoftware\u201d \u201cspecially designed\u201d for the \u201cdevelopment\u201d of patterns on \u201cEUV\u201d- lithography masks or reticles.<\/td><td>&nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.bis.doc.gov\/index.php\/documents\/regulations-docs\/federal-register-notices\/federal-register-2020\/2632-85-fr-62583\/file\">10\/5\/2020<\/a><\/td><td>3E004<\/td><td>\u2018Technology\u2019\u2019 \u2018\u2018Required\u2019\u2019 for the Slicing, Grinding and Polishing of 300 mm Diameter Silicon Wafers To Achieve a \u2018Site Front Least sQuares Range\u2019 (\u2018SFQR\u2019) Less Than or Equal to 20 nm at Any Site of 26 mm x 8 mm on the Front Surface of the Wafer and an Edge Exclusion Less Than or Equal to 2 mm<\/td><td>This rule adds ECCN 3E004 to control \u2018\u2018technology\u2019\u2019 for the production of substrates for high-end integrated circuits. The parameters include minimization of the flatness and the surface defect.<\/td><\/tr><tr><td><a href=\"https:\/\/www.bis.doc.gov\/index.php\/documents\/regulations-docs\/federal-register-notices\/federal-register-2019\/2398-84-fr-23886\/file\">5\/23\/2019<\/a><\/td><td>5A002<\/td><td>Information Security<\/td><td>ECCN 5A002 is amended in order to add a control on certain types of postquantum cryptographic algorithms.<\/td><\/tr><tr><td><a href=\"https:\/\/www.bis.doc.gov\/index.php\/documents\/regulations-docs\/federal-register-notices\/federal-register-2020\/2632-85-fr-62583\/file\">10\/5\/2020<\/a><\/td><td>5A004.b, 5D002, 5E002<\/td><td>Systems, Software, Technology<\/td><td>These ECCNS relate to Digital Forensic and cyber incident tools, equipment and software<\/td><\/tr><tr><td><a href=\"https:\/\/www.bis.doc.gov\/index.php\/documents\/regulations-docs\/federal-register-notices\/federal-register-2020\/2632-85-fr-62583\/file\">10\/5\/2020<\/a><\/td><td>5D001.e and 5E001.a<\/td><td>Software and Technology<\/td><td>Surveillance equipment and software<\/td><\/tr><tr><td><a href=\"https:\/\/www.bis.doc.gov\/index.php\/documents\/regulations-docs\/federal-register-notices\/federal-register-2019\/2398-84-fr-23886\/file\">5\/23\/2019<\/a><\/td><td>9A004<\/td><td>Space Launch Vehicles and \u2018\u2018Spacecraft\u2019\u2019, \u2018\u2018Spacecraft Buses\u2019\u2019, \u2018\u2018Spacecraft Payloads\u2019\u2019, \u2018\u2018Spacecraft\u2019\u2019 On-Board Systems or Equipment, and Terrestrial Equipment<\/td><td>&nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.bis.doc.gov\/index.php\/documents\/regulations-docs\/federal-register-notices\/federal-register-2020\/2632-85-fr-62583\/file\">10\/5\/2020<\/a><\/td><td>9A012<\/td><td>Non-military \u2018\u2018Unmanned Aerial Vehicles,\u2019\u2019 (\u2018\u2018UAVs\u2019\u2019), unmanned \u2018\u2018airships\u2019\u2019, related equipment and \u2018\u2018components\u2019\u2019, as follows (see List of Items Controlled).<\/td><td>&nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.bis.doc.gov\/index.php\/documents\/regulations-docs\/federal-register-notices\/federal-register-2020\/2632-85-fr-62583\/file\">10\/5\/2020<\/a><\/td><td>9A515<\/td><td>\u2018\u2018Spacecraft\u2019\u2019 and Related Commodities<\/td><td>&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n<\/details>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"DD2345\"><strong>DD2345 Form<\/strong><\/h2>\n\n\n\n<p>The DD 2345 Militarily\nCritical Technical Data Agreement is a certification required by U.S.\ncontractors (universities) that wish to obtain access to unclassified technical\ndata disclosing militarily critical technology with military or space\napplication. This data is under the control of, or in the possession of, the\nU.S. Department of Defense (DoD).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unclassified Militarily Critical Technical Data (MCTD) is data that can be used to produce military or space equipment and related technology. also includes such things as, ITAR information, blueprints, drawings, computer software and operating instructions and technical information.<\/li>\n<\/ul>\n\n\n\n<p>The University of\nNebraska-Lincoln (UNL) holds one general DD2345 certification. As per\nguidelines regarding these certifications, Institutions of Higher Education are\nsupposed to hold only one certification (i.e. to avoid multiple researchers or\nPI\u2019s applying and utilizing separate or inaccurate certifications). The ECCP\nstaff and empowered official serve as the data custodians for this\ncertification. Those outside of the ECCP shall not hold or apply separately for\nanother DD2345 without communication and\/or agreement from the UNL empowered\nofficial.<\/p>\n\n\n\n<p>In order to access UNL\u2019s DD 2345 form information, please read and complete the&nbsp;<a href=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Webpages\/EC\/Published%20to%20Web\/A-Z\/Export%20Control%20Guidance%20A-Z%20-%20docs\/UNL%20DD2345%20Request%20Form.pdf?csf=1&amp;web=1&amp;e=NYQSV4?e=5HWAkq\" target=\"_blank\" rel=\"noreferrer noopener\">Request for Use Form<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Deemed_Export\"><strong>Deemed Export<\/strong><\/h2>\n\n\n\n<p>In addition to the shipment of a\ncommodity (e.g. a product) from the United States to a foreign country, the\nExport Administration Regulations state that the release of controlled\ntechnology to foreign persons in the U.S. are &#8220;deemed&#8221; to be an export\nto the person\u2019s country or countries of nationality and is found in 734.2(b) of\nthe EAR. <\/p>\n\n\n\n<p>Note: Those organizations having\npersons with permanent residence status, U.S. citizenship, and persons granted\nstatus as &#8220;protected individual,&#8221; are exempt from the deemed export\nrule.<\/p>\n\n\n\n<p>Many of the licenses for deemed\nexports involve those conducting scientific research. Note that under 734.8 of\nthe EAR, fundamental research is defined as &#8220;basic and applied research in\nscience and engineering where the resulting information is ordinarily published\nand shared broadly within the scientific community&#8221; and, as such, is\nexempt from EAR licensing 5 requirements. Research conducted using publically\navailable information is also exempt from any license requirements.<\/p>\n\n\n\n<p>In addition, Per Part 772 of the\nExport Administration Regulations (EAR), &#8220;technology&#8221; is specific\ninformation necessary for the &#8220;development,&#8221; &#8220;production,&#8221;\nor &#8220;use&#8221; of a product. The General Technology Note states that the &#8220;export\nof technology,&#8221; is controlled according to the provisions of each\nCategory.&#8221; It further states that &#8220;technology required for the\ndevelopment, production, or use of a controlled product remains controlled even\nwhen applicable to a product controlled at a lower level.&#8221; Please note\nthat the terms &#8220;required,&#8221; &#8220;development,&#8221;\n&#8220;production,&#8221; &#8220;use,&#8221; and &#8220;technology&#8221; are all\ndefined in Part 772 of the EAR. Controlled technology is that which is listed\non the Commerce Control List.\u201cUse\u201d. (All categories and General Technology\nNote)<\/p>\n\n\n\n<p>Operation, installation (including on\nsite installation), maintenance (checking), repair, overhaul and refurbishing. \u201cDevelopment\u201d.\n(General Technology Note)\u201cDevelopment\u201d is related to all stages prior to serial\nproduction, such as: design, design research, design analyses, design concepts,\nassembly and testing of prototypes, pilot production schemes, design data,\nprocess of transforming design data into a product, configuration design,\nintegration design, layouts.\u201cProduction\u201d. (General Technology Note) (All\nCategories) Means all production stages, such as: product engineering,\nmanufacture, integration, assembly (mounting), inspection, testing, and quality\nassurance.<\/p>\n\n\n\n<p>Note: In general, it is difficult for\na deemed export to occur under the \u201cuse\u201d definition of equipment in the EAR\nbecause it must meet all of the above noted categories of use. A foreign person\ninvolved in the \u201cdevelopment\u201d or \u201cproduction\u201d of a dual use item, is more\nlikely to meet the deemed export parameters, in which case a deemed export\nlicense may be required.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Dual_Use\"><strong>Dual Use<\/strong><\/h2>\n\n\n\n<p>Dual use\ndescribes tangible items, software, and\/or technology that have both a\npotential civilian and military use. Determining whether or not an item could\nfall under the dual use definition should be made in consultation by the ECCP\nstaff as the details of the item can have significant impact in understanding\nwhether or not it is dual use. <\/p>\n\n\n\n<p>Note: For\nexample, an iPad can be used in a classroom (civilian use) and also function as\na weapons control system (military use).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"DURC\"><strong><br><br>Dual-Use Research of Concern (DURC) and Pathogen with<br>Enhanced Pandemic Potential (PEPP)<\/strong><br><\/h2>\n\n\n\n<p>The Office of Science and Technology Policy (OSTP) under the United States Government (USG) has created a new policy \u201c<a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2024\/05\/USG-Policy-for-Oversight-of-DURC-and-PEPP.pdf\">United States Government Policy for Oversight of Dual Use Research of Concern and Pathogens with Enhanced Pandemic Potential\u201d.<\/a> This new policy supersedes the 2012 United States Government Policy for Oversight of Life Sciences Dual Use Research of Concern (Federal DURC Policy) the 2014 United States Government Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern (Institutional DURC Policy) and the Recommended Policy Guidance for Departmental Development of Review Mechanisms for Potential Pandemic Pathogen Care and Oversight. This new policy was published May 2024 with an effective date of May 2025.<\/p>\n\n\n\n<p>The purpose of this policy is to provide an oversight framework for conducting and managing certain federally funded life sciences research on biological agents and toxins. Specifically, when they are enhanced, have the potential to pose risks to public health, agriculture, food security, economic security, or national health. The overarching goal of the policy is to require institutions receiving federal funding to establish policies, practices, and procedures to identify potential DURC and ensure development and implementation of risk mitigations plans for such experiments. *This policy may also affect non-funded research. *<\/p>\n\n\n\n<p>The following agents and toxins are listed by the select agent regulatory agency. This list may change, so please refer to&nbsp;<a href=\"https:\/\/www.ecfr.gov\/current\/title-9\/chapter-I\/subchapter-E\/part-121\">9 CFR 121.3-121.4<\/a>,&nbsp;<a href=\"https:\/\/www.ecfr.gov\/current\/title-42\/chapter-I\/subchapter-F\/part-73\/section-73.3\">42 CFR 73.3<\/a>\u2013<a href=\"https:\/\/www.ecfr.gov\/current\/title-42\/chapter-I\/subchapter-F\/part-73\/section-73.4\">73.4<\/a>, and&nbsp;<a href=\"https:\/\/www.ecfr.gov\/current\/title-7\/subtitle-B\/chapter-III\/part-331\/section-331.3\">7 CFR 331.3<\/a>,&nbsp;<a href=\"https:\/\/www.selectagents.gov\/sat\/list.htm\">USDA<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/aspr.hhs.gov\/S3\/Pages\/Enhanced-Potential-Pandemic-Pathogens.aspx\">HHS<\/a>&nbsp;websites and Section 4.1.1 and 4.1.2 of the Oversight of Dual Use Research of Concern and Pathogens with Enhanced Pandemic Potential Policy. The seven groups below of Select Agents and Toxins are part of this new policy.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">HHS Select Agents and Toxins<\/h4>\n\n\n\n<details><summary><em>Biological agents and toxins listed in this part of the list are controlled by Select Agent Regulations, please refer to the Select Agents and Toxins list for any relevant strain exclusions.<\/em><br><\/summary><div>\n<p>Abrin<br>Bacillus cereus Biovar anthracis<br>Botulinum neurotoxins<br>Clostridium botulinum and neurotoxin-producing species of Clostridia<br>Conotoxins (Short, paralytic alpha conotoxins containing the following amino acid sequence X1CCX2PACGX3X4X5X6CX7)<br>Coxiella burnetii<br>Crimean-Congo hemorrhagic fever virus<br>Diacetoxyscirpenol<br>Eastern equine encephalitis virus<br>Ebola virus<br>Francisella tularensis<br>Lassa fever virus<br>Lujo virus<br>Marburg virus<br>Mpox virus Clade I<br>1918-1919 H1N1 including reconstructed replication competent forms of the 1918 pandemic influenza virus containing any portion of the coding regions of all eight gene segments (Reconstructed 1918 Influenza virus)<br>Ricin<br>Rickettsia prowazekii<br>Severe acute respiratory coronavirus (SARS-CoV)<br>SARS-CoV\/SARS-CoV-2 chimeric viruses resulting from any deliberate manipulation of SARS-CoV-2 to incorporate nucleic acids coding for SARS-CoV virulence factors<br>Saxitoxin<br>Chapare virus<br>Guanarito virus<br>Jun\u00edn virus<br>Machupo virus<br>Sab\u00eda virus<br>Staphylococcal enterotoxins (subtypes A, B, C, D, E)<br>T-2 toxin<br>Tetrodotoxin<br>Tick-borne encephalitis complex virus: Far Eastern subtype<br>Tick-borne encephalitis complex virus: Siberian subtype<br>Kyasanur Forest disease virus<br>Omsk hemorrhagic fever virus<br>Variola major virus (Smallpox virus)<br>Variola minor virus (Alastrim)<br>Yersinia pestis<\/p>\n<\/div><\/details>\n\n\n\n<h4 class=\"wp-block-heading\">Overlap Select Agents and Toxins<\/h4>\n\n\n\n<details><summary>List of Agents and Toxins<\/summary><div>\n<p>Bacillus anthracis<br>Bacillus anthracis Pasteur strain<br>Brucella abortus<br>Brucella melitensis<br>Brucella suis<br>Burkholderia mallei<br>Burkholderia pseudomallei<br>Hendra virus<br>Nipah virus<br>Rift Valley fever virus<br>Venezuelan equine encephalitis virusAdd some description that will expand<\/p>\n<\/div><\/details>\n\n\n\n<h4 class=\"wp-block-heading\">USDA Veterinary Services (VS) Select Agents and Toxins<\/h4>\n\n\n\n<details><summary>List of Agents and Toxins<\/summary><div>\n<p>African horse sickness virus<br>African swine fever virus<br>Avian influenza virus [this is included here as a veterinary select agent in 9 CFR 121.3. Low pathogenicity strains are excluded.]<br>Classical swine fever virus<br>Foot-and-mouth disease virus<br>Goat pox virus<br>Lumpy skin disease virus<br>Mycoplasma capricolum<br>Mycoplasma mycoides<br>Newcastle disease virus<br>Peste des petits ruminants virus<br>Rinderpest virus<br>Sheep pox virus<br>Swine vesicular disease virus<\/p>\n<\/div><\/details>\n\n\n\n<h4 class=\"wp-block-heading\">USDA Plant Protection and Quarantine (PPQ) Select Agents and Toxins<\/h4>\n\n\n\n<details><summary>List of Agents and Toxins<\/summary><div>\n<p>Coniothyrium glycines<br>Peronosclerospora philippinensis (Peronosclerospora sacchari)<br>Ralstonia solanacearum<br>Rathayibacter toxicus<br>Sclerophthora rayssiae<br>Synchytrium endobioticum<br>Xanthomonas oryzae<\/p>\n<\/div><\/details>\n\n\n\n<h4 class=\"wp-block-heading\">Other Risk Group 4 Pathogens<\/h4>\n\n\n\n<details><summary><em>Pathogens listed in this part of the list are Risk Group 4 but not controlled by the Select Agent Regulations, please refer to the NIH Guidelines for any relevant strain exclusions.<\/em><br><\/summary><div>\n<p>Tick-borne encephalitis virus complex including Absetterov, Central European<br>encephalitis, Hanzalova, Hypr, and Kumlinge<br>Herpesvirus simiae (herpes B or monkey B virus)<br>Hemorrhagic fever agents and viruses as yet undefined<\/p>\n<\/div><\/details>\n\n\n\n<h4 class=\"wp-block-heading\">Other Risk Group 3 Pathogens<\/h4>\n\n\n\n<details><summary><em>Pathogens listed in this part of the list are Risk Group 3 but not controlled by the Select Agent Regulations, please refer to the NIH Guidelines for any relevant strain exclusions.<\/em><br><\/summary><div>\n<p>Bartonella<br>Brucella<br>Orientia tsutsugamushi<br>Pasteurella multocida type B -&#8220;buffalo&#8221; and other virulent strains<br>Rickettsia akari, R. australis, R. canada, R. conorii, R. rickettsii, R, siberica, R. typhi (R.<br>mooseri)<br>Chikungunya virus except the vaccine strain 181\/25<br>Semliki Forest virus<br>Flexal virus<br>Lymphocytic choriomeningitis virus (LCM) (neurotropic strains)<br>Hantaviruses, including Hantaan virus<br>Middle East respiratory syndrome coronavirus (MERS-CoV)<br>Severe acute respiratory coronavirus 2 (SARS-CoV-2)<br>Japanese encephalitis virus except strain SA 14-14-2<br>Yellow fever virus<br>Human influenza A virus H2N2 (1957-1968)<br>Highly pathogenic avian influenza A virus H5Nx strains within the Goose\/Guangdong\/96-like H5 lineage (e.g., H5N1, H5N6, H5N8 etc.)<br>Transmissible spongiform encephalopathy (TSE) agents (e.g., Creutzfeldt-Jacob disease and kuru agents)<\/p>\n<\/div><\/details>\n\n\n\n<h4 class=\"wp-block-heading\">Other<\/h4>\n\n\n\n<details><summary>Additional Information<\/summary><div>\n<p>Any attenuated pathogen or vaccine strain that is currently excluded from the Select Agent Regulations that exhibits the recovery of virulence at or near the wild-type<\/p>\n\n\n\n<p><br>Mpox virus clade I\/II chimeric viruses resulting from any deliberate manipulation of clade II to incorporate nucleic acids coding for clade I virulence factors<\/p>\n<\/div><\/details>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">Categories of Research<\/h4>\n\n\n\n<p>There are two categories under this policy, Category 1 research is subject to oversight by research institutions and federal funding agencies. Category 2 is subject to oversight by research institutions, federal funding agencies, and their federal department if applicable due to heightened potential for biosafety and biosecurity risks.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Category 1 Research<\/h4>\n\n\n\n<p>There are three criteria that must be met: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Involves one or more of the biological agents and toxins specified in the policy (listed above).<\/li>\n\n\n\n<li>It is reasonably anticipated to result or does result in one of the experimental outcomes:\n<ul class=\"wp-block-list\">\n<li>Increase transmissibility of a pathogen within or between host species;<\/li>\n\n\n\n<li>Increase the virulence of a pathogen or convey virulence to a non-pathogen;<\/li>\n\n\n\n<li>Increase the toxicity of a known toxin or produce a novel toxin;<\/li>\n\n\n\n<li>Increase the stability of a pathogen or toxin in the environment, or increase the ability to disseminate a pathogen or toxin<\/li>\n\n\n\n<li>Alter the host range or tropism of a pathogen or toxin;<\/li>\n\n\n\n<li>Decrease the ability for a human or veterinary pathogen or toxin to be detected using standard diagnostic or analytical methods;<\/li>\n\n\n\n<li>Increase resistance of a pathogen or toxin to clinical and\/or veterinary prophylactic or therapeutic interventions;<\/li>\n\n\n\n<li>Alter a human or veterinary pathogen or toxin to disrupt the effectiveness of preexisting immunity, via immunization or natural infection, against the pathogen or toxin; or<\/li>\n\n\n\n<li>Enhance the susceptibility of a host population to a pathogen or toxin.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Based on current understanding, the research institution and\/or federal funding agency assesses that the research constitutes DURC as specified in 4.1.3\n<ul class=\"wp-block-list\">\n<li>4.1.3 Category 1 Risk Assessment\n<ul class=\"wp-block-list\">\n<li>Based on current understanding, the research can be reasonably anticipated to provide, or does provide, knowledge, information, products, or technologies that could be misapplied to do harm with no \u2014 or only minor \u2014 modification to pose a significant threat with potential consequences to public health and safety, agricultural crops and other plants, animals, the environment, materiel, or national security as specified in 4.1.3.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Category 2 Research<\/h4>\n\n\n\n<p>There are three criteria that must be met: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It involves, or is reasonably anticipated to result in a Pathogen with Pandemic Potential (PPP) as specified in section 4.2.1\n<ul class=\"wp-block-list\">\n<li>A PPP, or any pathogen that will be modified in such a way that is reasonably anticipated to result in PPP.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>It is reasonably anticipated to result in, or does result in, one or more of the experimental outcomes or actions listed below:\n<ul class=\"wp-block-list\">\n<li>Enhance transmissibility of the pathogen in humans;<\/li>\n\n\n\n<li>Enhance the virulence of the pathogen in humans;<\/li>\n\n\n\n<li>Enhance the immune evasion of the pathogen in humans such as by modifying the pathogen to disrupt the effectiveness of pre-existing immunity via immunization or natural infection; or<\/li>\n\n\n\n<li>Generate, use, reconstitute, or transfer an eradicated or extinct PPP, or a previously identified Pathogen with Enhanced Pandemic Potential (PEPP). &nbsp;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Based on current understanding, the research institution and\/or federal funding agency assesses that the research is reasonably anticipated to result in the development, use, or transfer of a PEPP or an eradicated or extinct PPP that may pose a significant threat to public health, the capacity of health systems to function, or national security as specified in section 4.2.3.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Definitions<\/h4>\n\n\n\n<details><summary>Click here for expansion of definitions<\/summary><div>\n<p>\u201cBiological agents\u201d are any microorganism (including, but not limited to, bacteria, viruses, fungi, or protozoa), infectious material, or any naturally occurring, bioengineered, or synthesized component of any such microorganism or infectious material, capable of causing:<br>     Death, disease, or other biological malfunction in a human, an animal, a plant, or another living organism;<br>     Deterioration of food, water, equipment, supplies, or material of any kind; or,<br>     Deleterious alteration of the environment.<\/p>\n\n\n\n<p>\u201cBiosafety\u201d is the application of practices, controls, and containment infrastructure that reduces the risk of unintentional exposure to, contamination with, release of, or harm from pathogens, toxins, and other associated biological materials.<\/p>\n\n\n\n<p>\u201cBiosecurity\u201d is the application of security measures designed to prevent the loss, theft, misuse, diversion, unauthorized possession or material introduction, or intentional release of pathogens, toxins, biological materials, and related information and\/or technology.<\/p>\n\n\n\n<p>\u201cDual use research\u201d is research conducted for legitimate purposes that generates knowledge, information, technologies, and\/or products that can be utilized for benevolent or harmful purposes.<\/p>\n\n\n\n<p>\u201cDual use research of concern (DURC)\u201d is life sciences research that, based on current understanding, can be reasonably anticipated to provide knowledge, information, products, or technologies that could be misapplied to do harm with no, or only minor, modification to pose a significant threat with potential consequences to public health and safety, agricultural crops and other plants, animals, the environment, materiel, or national security.<\/p>\n\n\n\n<p>\u201cInstitutional Contact for Dual Use Research (ICDUR)\u201d is the official designated by the research institution to serve as an internal resource for application of the Policy as well as the liaison (as necessary) between the institution and the relevant federal funding agency.<\/p>\n\n\n\n<p>\u201cInstitutional review entity (IRE)\u201d is the entity established by the research institution to execute the institutional oversight responsibilities described in Section 5.2, with the attributes described in Section 5.2.B.<\/p>\n\n\n\n<p>\u201cLife sciences\u201d is the study or use of living organisms, viruses, or their products, including all disciplines, methodologies, and applications of biology (including biotechnology, genomics, proteomics, bioinformatics, and pharmaceutical and biomedical research and techniques).<\/p>\n\n\n\n<p>\u201cPathogen with enhanced pandemic potential (PEPP)\u201d is a type of pathogen with pandemic potential (PPP) resulting from experiments that enhance a pathogen\u2019s transmissibility26 or virulence, or disrupt the effectiveness of pre-existing immunity, regardless of its progenitor agent, such that it may pose a significant threat to public health, the capacity of health systems to function, or national security. Wild-type pathogens that are circulating in or have been recovered from nature are not PEPPs, but may be considered PPPs because of their pandemic potential.<\/p>\n\n\n\n<p>\u201cPathogen with pandemic potential (PPP)\u201d is a pathogen that is likely capable of wide and uncontrollable spread in a human population and would likely cause moderate to severe disease and\/or mortality in humans.<\/p>\n\n\n\n<p>\u201cReasonably anticipated\u201d describes an assessment of an outcome such that, generally, individuals with scientific expertise relevant to the research in question would expect this outcome to occur with a non-trivial likelihood. It does not require high confidence that the outcome will definitely occur, but excludes experiments in which experts would anticipate the outcome to be technically possible, but highly unlikely.<\/p>\n<\/div><\/details>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">For additional information on the policy please see the links below.<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2024\/05\/USG-Policy-for-Oversight-of-DURC-and-PEPP.pdf\">United States Government Policy for Oversight of Dual Use Research of Concern and Pathogens with Enhanced Pandemic Potential<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2024\/05\/USG-DURC-PEPP-Implementation-Guidance.pdf\">Implementation Guidance for the United States Government Policy for Oversight of Dual Use Research of Concern and Pathogens with Enhanced Pandemic Potential<\/a>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: revert\">Common Examples of Category 1 and Category 2 Research on Page. 67 to 76.<\/span><\/li>\n\n\n\n<li>Frequently Asked Questions can in Appendix E(Pg. 78).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Export Control and IBC<\/h5>\n\n\n\n<p>UNL faculty and staff planning to conduct research with agents and toxins listed under DURC, will require a Technology Control Plan (TCP) before the research starts. This is in addition to meeting&nbsp;<a href=\"https:\/\/ehs.unl.edu\/Biosafety_Guidelines.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">UNL Biosafety Guidelines<\/a>&nbsp;on Dual Use Research of concern. Please contact the <ins><a href=\"mailto:exportcontrol@unl.edu?subject=DURC%20Questions\">Export Control Compliance Program<\/a><\/ins> &amp; <ins><a href=\"mailto:biosafety@unl.edu?subject=DURC%20Questions\">Biosafety Officer<\/a><\/ins>, to ensure all appropriate approvals are in place and a TCP has been established prior to beginning the project. These two offices work together to ensure the above requirements are met.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Educational_Info\"><strong>Educational Information<\/strong><\/h2>\n\n\n\n<p>Information not subject to the EAR if it is released by instruction in catalog courses and associated teaching laboratories of academic institutions. Certain types of information related to encryption software cannot be considered \u201ceducational information\u201d and therefore are subject to the EAR even if they are released \u201cby instruction in catalog courses and associated teaching laboratories of academic institutions.\u201d<\/p>\n\n\n\n<p>Information that is normally taught or released by the university as part of the normal instruction in a catalog course or in an associated teaching laboratory is considered Educational Information and, as provided for under the federal regulations (<a href=\"http:\/\/www.ecfr.gov\/cgi-bin\/text-idx?SID=5b741d9e95f4ffd56b78cfa7d615a72d&amp;mc=true&amp;node=pt15.2.734&amp;rgn=div5%23se15.2.734_13%23se15.2.734_13#se15.2.734_13\">15 CFR\u00a7734.3(b)(iii<\/a>), is <strong>NOT <\/strong>subject to export controls. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Embargoed_Sanctioned_Countries\"><strong>Embargoed or Sanctioned Countries with Special Rules<\/strong><\/h2>\n\n\n\n<p>U.S. sanctions programs vary in scope and by country.&nbsp; Some are broad-based and oriented geographically (i.e. Cuba, Iran).&nbsp; Others are \u201ctargeted\u201d (i.e. counter-terrorism, counter-narcotics) and focus on specific individuals and entities.&nbsp; These programs may encompass broad prohibitions at the country level as well as targeted sanctions. Special export rules apply to Cuba, Iran, North Korea, Syria, Sudan and other countries with sanctions. Due to the diversity among sanctions, we advise visiting the <a href=\"https:\/\/www.treasury.gov\/about\/organizational-structure\/offices\/Pages\/Office-of-Foreign-Assets-Control.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">Office of Foreign Assets Control (OFAC) \u201cSanctions Programs and Country Information\u201d<\/a> page for information on a specific program.<\/p>\n\n\n\n<p>University activities that involve any type of transaction (e.g., travel to an embargoed country, transfer of information, data or technology; shipping materials; payment of funds; hosting a visitor etc.) with a Non-U.S. person or entity from an embargoed or sanctioned country may be subject to export controls and in some cases strictly prohibited by the U.S. government. A general or specific export license may be required by OFAC for all research and educational activities to an embargoed or sanctioned country.<\/p>\n\n\n\n<p>For example, the Cuba sanctions regulate personal travel to Cuba, as well as, professional research activity conducted with Cuban institutions here and abroad.&nbsp; That said, the Cuba regulations allow for a broad range of research and humanitarian related activity when approved by license from OFAC or if the activities fall under the \u201cGeneral License\u201d and do not require prior approval.<\/p>\n\n\n\n<p>The Iran sanctions (<a href=\"https:\/\/www.federalregister.gov\/documents\/2018\/11\/05\/2018-24058\/iranian-transactions-and-sanctions-regulations\" target=\"_blank\" rel=\"noreferrer noopener\">Iranian Transactions and Sanctions Regulations- ITSR<\/a>), in contrast, do not regulate individual travel to Iran, but remain highly restricted as to any activity or research, which OFAC defines as a \u201cservice\u201d to Iran.&nbsp; While, certain kinds of collaborative activities are permissible with Iranian institutions, many are prohibited. Research that contemplates the exchange of material items with Iran, providing guidance or advice on the nuclear or energy sector, attending a conference, or providing advice on establishing a laboratory or research facility in Iran, are examples of services where a license may be required.&nbsp; Likewise, peer review or editorial comment that extends beyond the scope of what is normally defined as credential input or scientific journal editorial review may also trigger a license requirement.<\/p>\n\n\n\n<p>Collaboration with former students or others living in Iran may require a license, as noted previously some activities may be permissible, such as the \u201cPublishing exemption\u201d which allows US persons to engage in a transaction \u201cnecessary and ordinarily incident to the publishing and marketing of manuscripts, books, journals, and newspapers in paper or electronic form.\u201d (31 CFR 560.538). However, this exemption cannot be used if the other parties represents the Government of Iran or identified on a restricted party list. Before engaging in collaboration, contact the Export Control Office.<\/p>\n\n\n\n<p>With respect to Syria and Sudan, travel and transactions with these countries will also trigger a review because of the geopolitical instability in both countries, transactions with those nations similarly, must be evaluated carefully for evolving sanctions and requirements.<\/p>\n\n\n\n<p>Special requirements also extend to individual and entities in other countries, such as North Korea; Libya; Crimea region of Ukraine; Russia; Venezuela and a few others. Hence, when contemplating any research or transactional activity with one of these OFAC countries or foreign nationals known to reside in these countries, contact the <a href=\"mailto:exportcontrol@unl.edu\">Export Control Office<\/a> for an export control review and information on license requirements before proceeding. If a specific OFAC license is required, the Export Control Office can assist; however, it may take months to receive an approval from the US government or may not be approved at all.<\/p>\n\n\n\n<p><em>Export Control Compliance Policies<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/research.unl.edu\/researchcompliance\/policies-procedures-2\/\">ECCP Policy 9.001: Foreign Transaction Review<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Entities_On_Restricted_List\"><strong>Entities on the Restricted List<\/strong><\/h2>\n\n\n\n<p>The U.S. Government periodically publishes laws, regulations, executive orders, or directives that identify entities, companies or persons that are prohibited or restricted from engaging in specific transactions or activities. These restrictions can apply to the activities of institutions of higher education. Activities such as travel, research collaboration, providing or receiving services, and\/or hosting visitors from entities will require a review by the Export Control Compliance Office (ECCP) prior to engaging in any activities with them.<\/p>\n\n\n\n<p>These lists are constantly being revised by the U.S. Government, please follow the links for each regulatory list or contact UNL Export Control for questions.<\/p>\n\n\n\n<p><strong>BIS <a rel=\"noreferrer noopener\" href=\"https:\/\/www.bis.doc.gov\/index.php\/policy-guidance\/lists-of-parties-of-concern\/entity-list\" target=\"_blank\">Entity List<\/a>:<\/strong><\/p>\n\n\n\n<p>The Export Administration (EAR) contains a list of names of certain foreign persons, which includes private and public: businesses, institutions, educational institutions, and government organizations. Individuals or Entities listed on this list may be subject to license requirements or other export control requirements. For more information click the link above.<\/p>\n\n\n\n<p><strong>BIS <a rel=\"noreferrer noopener\" href=\"https:\/\/www.bis.doc.gov\/index.php\/policy-guidance\/lists-of-parties-of-concern\/unverified-list\" target=\"_blank\">Unverified List<\/a>:<\/strong><\/p>\n\n\n\n<p>This list is maintained by the Export Administration, and the regulations focus on shipping items to an individual or entity on the list. For more information click the link above. <\/p>\n\n\n\n<p><strong>OFAC <a rel=\"noreferrer noopener\" href=\"https:\/\/www.treasury.gov\/resource-center\/sanctions\/SDN-List\/Pages\/default.aspx\" target=\"_blank\">Specially Designated Nationals and Blocked Persons (SDN) (OFAC)<\/a>:<\/strong><\/p>\n\n\n\n<p>This list contains individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. Specially Designated Nations or SDNs are also listed here. For more information click the link above.<\/p>\n\n\n\n<p><strong>Bureau of International Security &amp; Nonproliferation (ISN) <a rel=\"noreferrer noopener\" href=\"https:\/\/www.state.gov\/key-topics-bureau-of-international-security-and-nonproliferation\/nonproliferation-sanctions\/\" target=\"_blank\">Nonproliferation Sanctions (NPS)<\/a>:<\/strong><\/p>\n\n\n\n<p>The United States imposes sanctions under various legal authorities against individuals or entities that engage in proliferation activities. For more information click the link above.<\/p>\n\n\n\n<p>See also the guidance topic <a href=\"#Restrictions_Sanctions_Lists\">United States Restrictions and Sanctions Related Lists.<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Export\"><strong>Export&nbsp;<\/strong><\/h2>\n\n\n\n<p>To send or take\ncontrolled tangible items, software or technology out of the United States in\nany manner, to transfer ownership or control of controlled tangible items,\nsoftware or technology to a foreign person, or to disclose information about\ncontrolled items, software or information to a foreign government or foreign\nperson. The controlled tangible item, software or technology being sent or\ntaken out of the United States is also referred to as an \u201cexport.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"EAR\"><strong>Export Administration Regulations (EAR)<\/strong><\/h2>\n\n\n\n<p>Federal regulations\nthat regulate the export and re-export of most commercial items. These items\ncan range anywhere from a simple pencil to large equipment. UNL faculty, staff,\nand students must be cognizant in understanding whether or not their items are\ncontrolled via an ECCN or if it is categorized as the lowest set of controls\nvia EAR 99. <\/p>\n\n\n\n<p>See also the guidance topic on <a href=\"#CCL\">Commerce Control List, ECCNs, &amp; EAR 99<\/a>. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Export_Controls\">Export Controls<\/h2>\n\n\n\n<p>Federal regulations that restrict the release of certain items, information and software to foreign nationals in the United States and abroad. Those regulations are the Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR), as well as regulations administered by the Office of Foreign Assets Control (OFAC).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Biological_Agents_Toxins\">Export Controls &amp; Biological Agents and Toxins <\/h2>\n\n\n\n<p>The United States (U.S.) Department of Commerce, and the State Department, along with various other government agencies control certain technology, items, etc. Authorization from one or more government agencies may be required to transfer export-controlled items internationally. Please also keep in mind that every export from the United States is an import to another country. That country may also have import regulations, duties and taxes that must be followed.<\/p>\n\n\n\n<p>Additionally, foreign national (e.g. F-1, J-1, H1-B, B-1 visa holder or foreign entity) access or use of export-controlled items, in the U.S. may be restricted unless authorized by the federal government.<\/p>\n\n\n\n<p><strong>EAR-Controlled Biologicals<\/strong><\/p>\n\n\n\n<p>The Bureau of Industry and Security Export Administration Regulations (EAR) controls certain biological pathogens, toxins, and chemical agents through the Commerce Control List (CCL). Faculty and staff planning to transfer biological agents outside the U.S. or to a foreign national in the U.S. are encouraged to seek guidance from the Export Controls Office before engaging in such activities. Several relevant export control classification numbers (ECCN) from the CCL1 are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ECCN 1C350 &#8211; Chemicals that may be used as precursors for toxic chemical agents;<\/li>\n\n\n\n<li>ECCN 1C351 &#8211; Human and animal pathogens and \u201ctoxins\u201d (including, but not limited to, viruses like the Western equine encephalitis, bacteria like the Brucella abortus, and toxins like Shiga toxin;<\/li>\n\n\n\n<li>ECCN 1C353 &#8211; Genetic elements (including, but not limited to chromosomes, genomes, plasmids, transposons, and vectors) and genetically modified organisms associated with the pathogens and toxins;<\/li>\n\n\n\n<li>ECCN 1C354 &#8211; Plant pathogens (including, but not limited to, bacteria such as Xanthomonas albilineans, fungi such as Magnaporthe oryzae);<\/li>\n\n\n\n<li>ECCN 1E351 &#8211; Technology for the disposal of the listed biologicals;<\/li>\n\n\n\n<li>ECCN 1C991 &#8211; Vaccines, immunotoxins, toxin based products (includes medical products, diagnostic and food test kits with toxins);<\/li>\n\n\n\n<li>ECCN 2B352 &#8211; Biological Processing Equipment (including, but not limited to, certain centrifugal separators cable of the continuous separation of pathogenic microorganisms, certain equipment designed for fixed installation in containment facilities).<\/li>\n<\/ul>\n\n\n\n<p><strong>ITAR-Controlled Biologicals<\/strong><\/p>\n\n\n\n<p>It is important to keep in mind that biological agents may also be controlled under the International Traffic in Arms Regulations (ITAR) (see Category XIV: Toxicological Agents Including Chemical, Biological Agents and Associated Equipment, of the United States Munitions List) . Foreign nationals and entities in the United States may not access ITAR-controlled biologicals without authorization from the government. ITAR treats any of the following as defense articles:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201cBiological agent or biologically derived substance specifically developed or modified to increase its capability to produce casualties in humans or livestock or to degrade equipment or damage crops.&#8221;<\/li>\n\n\n\n<li>&#8220;Equipment and its components, parts, accessories, and attachments specifically designed or modified for military operations and compatibility with military equipment.&#8221; <em>Note that equipment used with biological materials may be included under this category<\/em>.<\/li>\n<\/ul>\n\n\n\n<p><strong>Fundamental Research and Published Information Exclusions<\/strong><\/p>\n\n\n\n<p>Generally, in the United States, a foreign national may use EAR export-controlled pathogens and toxins for fundamental research so long as the technology being shared with the foreign national or entity is publicly available and part of fundamental research (see below). It is important to keep in mind that unlike EAR controlled pathogens and toxins, foreign nationals and entities in the United States may not access ITAR controlled biological agents\/substances (see Category XIV: Toxicological Agents Including Chemical, Biological Agents and Associated Equipment, of the United States Munitions List (USML)).<\/p>\n\n\n\n<p>Fundamental research is defined as research in science, engineering, or mathematics, the results of which ordinarily are published and shared broadly within the research community, and for which the researchers have not accepted restrictions for proprietary or national security reasons. Please reference our guidance on Fundamental Research Exclusion (FRE) for further information.<\/p>\n\n\n\n<p><strong>Examples of Potentially Export-Controlled Activities<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Foreign national (e.g. F-1, J-1, H1B, B-1, etc.) visa holder is going to work in a laboratory that conducts research related to export-controlled biologicals or vaccines for diseases in animals, plants and humans.<\/li>\n\n\n\n<li>Sharing proprietary or non-publicly available information, including how to produce, maintain, quality check, or dispose of biological agents or genetic elements with a foreign national or entity anywhere.<\/li>\n\n\n\n<li>Shipping an export-controlled biological agent or genetic element internationally (\u201chand carried\u201d is considered an export).<\/li>\n<\/ul>\n\n\n\n<p><strong>Common Misconceptions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Some people believe attenuated strains are not controlled; however, attenuated strains can still be controlled.<\/li>\n\n\n\n<li>Some people believe minimal quantities are not controlled; however, any quantity of a controlled biological is still controlled.<\/li>\n\n\n\n<li>Some people believe their research materials and equipment are not controlled if the project is fundamental research, however, the fundamental research exclusion does not apply to physical\/tangible items.<\/li>\n\n\n\n<li>Some people believe that if the biological is no longer subject to the Department of Health &amp; Human Services Center for Disease Control and Prevention \u2013 Federal Select Agent Program (<a href=\"https:\/\/www.selectagents.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.selectagents.gov\/<\/a>), it is also not export controlled, however, these are separate concerns controlled by separate governmental departments. Material that may no longer be regulated under the Select Agent Regulations, may still be regulated under the EAR.<\/li>\n<\/ul>\n\n\n\n<p><strong>Additional Resources<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.bis.doc.gov\/index.php\/policy-guidance\/product-guidance\/chemical-and-biological-%20controls\/14-policy-guidance\/deemed-exports\/111-deemed-export-and-fundamental-research-for-%20biological-items\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>BIS FAQ\u2019s<\/strong><\/a><strong> <\/strong>\u2013 Deemed Exports and Fundamental Research for Biological Items<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading Export_License\" id=\"Export_License\">Export License<\/h2>\n\n\n\n<p>An export license is formal approval from a federal regulatory agency to export a controlled item to a specific person in a specific place for a specific purpose. Either the BIS or the DDTC, depending on whether the item is specified on the Commerce Control List or United States Munitions List, respectively, issues export licenses for most controlled items.<\/p>\n\n\n\n<p>When the recipient of an intended export is located in a country subject to a comprehensive embargo, special approval needs to be obtained from OFAC (in addition to any approval required by other agencies). Countries subject to comprehensive embargoes include Cuba, Iran, North Korea, (North) Sudan and Syria. Several other countries are subject to less stringent embargoes, but may still require a license for travel and other transactions.<\/p>\n\n\n\n<p>At UNL, the Export Control staff and empowered official have sole authority to determine whether a particular transaction requires an export license. They also have sole authority to apply for export licenses on behalf of UNL faculty, students, and staff.<\/p>\n\n\n\n<p>Export licenses require very specific answers to the following questions:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>What are you exporting?<\/li>\n\n\n\n<li>Where are you exporting it to?<\/li>\n\n\n\n<li>Who will receive it?<\/li>\n\n\n\n<li>How will they use it?<\/li>\n<\/ol>\n\n\n\n<p>License applications typically take about 60-90 days to process, so you should plan to <a href=\"mailto:exportcontrol@unl.edu\">contact the Export Control staff<\/a> as early as possible to determine whether a license is required and begin gathering the necessary information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"License_Exception\">Export License Exception<\/h2>\n\n\n\n<p>An Export License Exception is a special authorization that allows you to export or re-export, under very specific conditions, items that would otherwise require an export license. Export License Exceptions are detailed in EAR\u00a7740. <\/p>\n\n\n\n<p>See <a href=\"#Educational_Info\">Educational Information<\/a>, <a href=\"#FRE\">Fundamental Research Exclusion<\/a>, and <a href=\"#PIE\">Published Information Exclusion<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Foreign_National\">Foreign National or Foreign Person<\/h2>\n\n\n\n<p>Anyone who is\nnot a \u201cU.S. person.\u201d A \u201cU.S. person\u201d is any one of the following: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>U.S. Citizen<\/li>\n\n\n\n<li>lawful permanent resident alien (green card holder)<\/li>\n\n\n\n<li>refugee<\/li>\n\n\n\n<li> protected political asylee or someone granted temporary residency under the amnesty provision. <\/li>\n<\/ul>\n\n\n\n<p>Anyone who doesn\u2019t fit into one of these categories is considered a \u201cforeign person.\u201d This means that faculty, staff, and students at UNL with work or student visas are considered \u201cforeign persons\u201d for the purposes of export controls.<\/p>\n\n\n\n<p>More detailed information about the agencies\u2019 respective regulations can be found on the <a href=\"http:\/\/research.unl.edu\/researchcompliance\/resources\/\">Regulatory Information page.<\/a><\/p>\n\n\n\n<p>Depending on the details of a project that a foreign national may be planning to work on, or their country(ies) of citizenship and that country\u2019s current status under U.S. government regulations, some foreign nationals may not be eligible to work on certain projects. ECCP staff can assist in clarifying when this may or may not be applicable.<\/p>\n\n\n\n<p>See also the guidance on <a href=\"#Research_FN\">Participation in Research by Foreign Nationals<\/a>. <\/p>\n\n\n\n<p>Note: Any\nforeign entity not incorporated or organized to do business in the United\nStates falls within the definition of a foreign national. This includes any\nbranch of a foreign government and also can include universities and research\nlaboratories in other countries.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"FRE\"><strong>Fundamental Research Exclusion (FRE)<\/strong><\/h2>\n\n\n\n<p>Sometimes, a research project may produce information that would normally be subject to export controls and require an export license in order to be shared with colleagues in or from other countries. However, the results of \u201cfundamental research\u201d projects are specifically excluded from these licensing requirements in most circumstances.<\/p>\n\n\n\n<p>Keep in mind that even if the fundamental research exclusion applies, it applies only to the results of the research. If the conduct of the research includes activities subject to export controls, a license must be obtained before any foreign nationals can participate in those activities.<\/p>\n\n\n\n<p>\u201cFundamental research\u201d is defined as basic and applied research in science, mathematics, and engineering, where the resulting information is ordinarily published and shared broadly within the scientific community.  Under the State Department\u2018s narrower interpretation, \u201cfundamental research\u201d can only describe information and technology that already is in existence and in the public domain. In order for research data to qualify for the \u201cfundamental research\u201d exclusion from the licensing requirements, it must meet two criteria:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Research results must be freely publishable; and<\/li>\n\n\n\n<li>There must be no limitations on access to or dissemination of research results on the basis of national origin.<\/li>\n<\/ol>\n\n\n\n<p>If either condition is not met, this exception is destroyed and dissemination of the data may require a license. For example, certain terms in a statement of work or research agreement might prevent a project from qualifying for the fundamental research exclusion. These include terms that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Grant the sponsor pre-approval rights over publication of research results<\/li>\n\n\n\n<li>Allow the sponsor to claim resulting research information as proprietary or trade secret<\/li>\n\n\n\n<li>Prohibit foreign nationals from participating in the project<\/li>\n\n\n\n<li>Restrict the publication or other dissemination of research results from a given project<\/li>\n<\/ul>\n\n\n\n<p>UNL\u2019s Export Control staff and empowered official are the only persons authorized to determine whether a research project at UNL qualifies as fundamental research.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"International_Shipping\"><strong>International Shipping<\/strong><\/h2>\n\n\n\n<p>In addition to any environmental and biosafety guidelines, all shipments of tangible items to foreign countries are subject to export controls. Sometimes the university must obtain an export license from the Commerce Department or State Department for the shipment. Certain documentation must also be filed with the government before any shipments can be made. Failure to do so may constitute an export violation that could result in severe fines and\/or other penalties. Please contact the&nbsp;<a href=\"mailto:exportcontrol@unl.edu\">Export Control Staff<\/a>&nbsp;prior to negotiating any material transfer agreements (MTAs) or packing any materials for international shipments. The Export Control Staff can help you be certain your shipment meets export and sanction laws.<\/p>\n\n\n\n<p><a href=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Webpages\/EC\/Published%20to%20Web\/A-Z\/Export%20Control%20Guidance%20A-Z%20-%20docs\/Int%27l%20Inv%20Template%20for%20Web.pdf?csf=1&amp;web=1&amp;e=zj6OmQ?e=W5tfoQ\" target=\"_blank\" rel=\"noreferrer noopener\">Click here for an example of the shipping invoice<\/a><\/p>\n\n\n\n<p>Related Definitions:<\/p>\n\n\n\n<p><strong>End-use<\/strong>&nbsp;\u2013 a detailed description of how the ultimate\nconsignee intends to use the commodities being exported.<\/p>\n\n\n\n<p><strong>End-user<\/strong>&nbsp;\u2013 a person abroad that receives and ultimately\nuses the exported or re-exported items. The end-user is not a forwarding agent\nor intermediary, but may be the purchaser or ultimate consignee.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"International_Travel\"><strong>International\nTravel<\/strong><\/h2>\n\n\n\n<p>When traveling abroad, faculty, staff and students at UNL should be familiar with the impact of export control regulations. Researchers need to make sure that any information discussed or items taken out of the U.S. are either not controlled, or if controlled, the proper licenses are in place. University personnel, as individuals, can be held liable for improperly transferring controlled technology. Thus, it is important to review and understand that federal requirements are civil and criminal sanctions, with the ability to assess fines and\/or invoke prison sentences for individuals violating the export control and embargo laws. These fines or sentencing consequences are substantial and apply to university personnel as well as the University as an institution.<\/p>\n\n\n\n<p>To ensure you do not run\nthe risk of exporting sensitive information or technology when traveling\nabroad, or dealing with sanctioned countries, entities or individuals, keep in\nmind that presentations and discussions must be limited to topics that are not\nrelated to controlled items or technologies, unless that information is already\npublished or otherwise in the public domain.<\/p>\n\n\n\n<p>Before sharing technology\nor information, verify that it falls into one or more of the following\ncategories prior to traveling:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Research that qualifies for the&nbsp;<a href=\"https:\/\/research.unl.edu\/researchcompliance\/eccp-faq\/\">fundamental research exclusion<\/a><\/li>\n\n\n\n<li>Published information<\/li>\n\n\n\n<li>Publicly available software<\/li>\n\n\n\n<li>Educational information<\/li>\n\n\n\n<li>Patent applications<\/li>\n<\/ul>\n\n\n\n<p>Depending on your\ninternational destination(s), an export license or other government approval\nmay be required for your laptop computer, software or other equipment. There\nare exceptions for \u201ctools of the trade,\u201d but these exceptions depend on the\nequipment and the country of your destination.&nbsp;Encryption\nsoftware&nbsp;in particular is subject to special regulations and more\nstringent license requirements.<\/p>\n\n\n\n<p>Fortunately, most\ninternational travel does not raise any export control concerns. However, there\nare denied entities in almost every country. The checklist is designed to\nprovide UNL travelers information on applicable export control regulations they\nwill need to follow based on the nature of their activities while traveling as\nwell as verifying any export control restrictions for your foreign destination.<\/p>\n\n\n\n<p>For additional\ninformation, please visit our&nbsp;<a href=\"http:\/\/research.unl.edu\/researchcompliance\/eccp-faq\/\">FAQ and\ncaution information page.<\/a><\/p>\n\n\n\n<p><strong>International Travel Services<br><\/strong>For travel outside the U.S., UNL requires all international travelers to file an electronic travel authorization and use Travel &amp; Transport for flight arrangements. Please visit the <a href=\"https:\/\/nebraska.edu\/travel\/international-travel\">University of Nebraska International Travel Resources<\/a> page for additional information and details about foreign travel policies.<\/p>\n\n\n\n<p>Once you have filed your electronic travel authorization through Concur, you will also receive a notification from NuRamp. If you are traveling to a country with risks, sanctions, embargoes, or concerns, you will need to complete our export control travel checklist. If you are traveling to a country with no identified risks, sanctions etc, you will simply receive an informational email and asked to contact Export Control staff if you are traveling with certain items or have plans that should be reviewed for export control concerns. <\/p>\n\n\n\n<p><strong>Visa Support<br><br><\/strong>UNL faculty and staff traveling abroad can use the&nbsp;<a href=\"http:\/\/international.unl.edu\/visas\">International Engagement<br>Visa Support Webpage<\/a>&nbsp;to find details about how to secure a visa, and enroll in the US State Department Smart Traveler Enrollment Program (STEP).<\/p>\n\n\n\n<p><strong>Evacuation Coverage for UNL Personnel Traveling Abroad<br> <\/strong>On February 1, 2015, the University of Nebraska \u2013 Lincoln secured blanket international travel coverage for all faculty and staff who travel outside the country on UNL business with the correct visa. Faculty and staff no longer need to purchase&nbsp;this insurance individually. Additional information can be found on the&nbsp;<a href=\"https:\/\/nebraska.edu\/travel\/international-travel\">University of Nebraska International Travel site.<\/a><\/p>\n\n\n\n<p><strong>Best Practices When Bringing Personal Devices and Accessing UNL Information and Resources<\/strong><\/p>\n\n\n\n<p>It is best practice if there is unpublished, sensitive, and\/or confidential information relating to your UNL work\/research to put in place safeguards. Only bring information\/applications that are absolutely necessary for you to bring when traveling internationally.&nbsp; Make sure to keep electronic devices in your possession and if not on your person make sure the devices are password protected, in a locked room and if possible, a locked safe. It is best practice to uninstall apps (such as Office Suite apps) used to access unpublished, sensitive, and\/ or confidential information before traveling internationally and use the online version instead. If not uninstalling apps, it is good to keep the apps password protected and only use when needed.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"remote_presentations\"><strong>International Conferences and Presentations (Remote)<\/strong><\/h2>\n\n\n\n<p>There are a few things to consider before presenting material in a remote setting for conferences, seminars, trade shows, or presentations \u201coutside\u201d the U.S. Although you are not physically traveling or shipping material, United States Export Control Laws and Regulations still apply in many instances to data and information that you may be sharing via a remote setting (e.g. zoom presentation).&nbsp;<\/p>\n\n\n\n<p>In general, if the information that you plan on presenting is already published and found in the public domain, it is usually safe for you to share this information. However, if the classification of the Scope of Work or the material, technology, or methods includes:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>EAR&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The EAR considers information released at an \u201copen\u201d conference, meeting, seminar, trade show, or other open gathering to be published, and so excluded from EAR control&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201cOpen\u201d is defined as Fundamental research that is basic and applied research in science, mathematics, and engineering, where the resulting information is ordinarily published and shared broadly within the scientific community and all technically qualified members of the public are eligible to attend and attendees are permitted to take notes or otherwise make a personal record of the proceedings and presentations. For more information, please see our information on <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#FRE\" target=\"_blank\" rel=\"noreferrer noopener\">Fundamental Research Exclusion (FRE)<\/a>&nbsp;<\/li>\n\n\n\n<li>You can deliver or present the results of your fundamental research in the EAR scope at open conferences, and you can present or deliver other information within the scope of the EAR if you have the right to disclose it (e.g., not constrained by a non-disclosure agreement).&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ITAR&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Information in the scope of the ITAR released by a US person at a conference, seminar, trade show, or exhibition \u201coutside\u201d the US might not be clearly excluded from ITAR control, unless previously or otherwise published in accordance with the ITAR. You can deliver or present the results of your fundamental research in the ITAR scope at open conferences in the US. For more information, please see our information on <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#ITAR\" target=\"_blank\" rel=\"noreferrer noopener\">International Traffic in Arms Regulations (ITAR)<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201cOutside\u201d the US, you can deliver or present the following information in the ITAR scope:&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>General systems descriptions that <strong>ARE NOT<\/strong> considered ITAR technical data (ITAR \u00a7120.10(a)(5)).&nbsp;<\/li>\n\n\n\n<li>Public domain information, such as published research results or material previously released in a university course, at conferences or meetings outside the US.&nbsp;<\/li>\n\n\n\n<li><strong>Caution:<\/strong> when you answer a question or engage in follow-up discussion, you could be providing a defense service (assisting a non-US person with a defense article), because the information you provide is not in the public domain.&nbsp;<\/li>\n\n\n\n<li>Items, software, or technical data controlled by ITAR before being received by UNL cannot be released at open conferences.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>OFAC&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Even if the material or technology to be presented is FRE, or the equipment, or items are listed as <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#CCL\" target=\"_blank\" rel=\"noreferrer noopener\">EAR99\/ECCN<\/a>, a country, institution or entity may be listed on one of the U.S. government\u2019s embargoed\/sanctioned countries or part of a restricted parties list such as OFAC&#8217;s Specially Designated Nationals list or the Commerce Dept.&#8217;s Entity List and be subject to comprehensive sanctions.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Please reach out to the UNL Export Control Personnel for questions regarding international presentations or conferences if your work is not in the public domain or if you will be presenting on material that is Export Controlled, or in a country or an <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#Entities_On_Restricted_List\" target=\"_blank\" rel=\"noreferrer noopener\">entity<\/a> (Universities can have restrictions too)&nbsp; with sanctions or embargoes. We can complete a review and screenings to ensure you are not sharing or working with a person\/entity with restrictions.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Additional Resouces can be found at:&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/research.unl.edu\/researchcompliance\/research-data-security-guidance-topics-a-z\/#Tele-video-conferencing\" target=\"_blank\" rel=\"noreferrer noopener\">Tele\/Video Conferencing (Zoom\/Teams)<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#Publicly_Available\" target=\"_blank\" rel=\"noreferrer noopener\">UNL Export Control A-Z Guidance (Publicly Available, Public Domain, and Open Source)<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ITAR\"><strong>International Traffic in Arms Regulations (ITAR)<\/strong><\/h2>\n\n\n\n<p>International Traffic in Arms Regulations (ITAR) are\nadministered by the U.S. Department of State and ITAR places strict controls on\nthe export of \u201cdefense articles\u201d and \u201cdefense services.\u201d These Federal regulations are used primarily to control the\nimport and export of defense articles and defense services. Similar to ECCNs\nand EAR 99, another key way in determining whether or not your\nitems\/information fall under export control regulations is to understand\nwhether or not they fall under any of the ITAR categories.<\/p>\n\n\n\n<p>These categories are enumerated under the United States Munitions List (<a href=\"https:\/\/www.ecfr.gov\/cgi-bin\/retrieveECFR?gp=&amp;SID=70e390c181ea17f847fa696c47e3140a&amp;mc=true&amp;r=PART&amp;n=pt22.1.121\">USML<\/a>). &nbsp;USML categories are organized by paragraphs and subparagraphs and identified alphanumerically (e.g. Category IX.10 refers to infrared scene generators, and Category XII.3 refers to laser spot trackers or laser spot detection\u2026\u201d). The categories usually start by enumerating or otherwise describing end-items, followed by major systems and equipment; parts, components, accessories, and attachments; and technical data and defense services directly related to the defense articles of that USML category.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"letter_of_attestation\"><strong>Letter of Attestation<\/strong><\/h2>\n\n\n\n<p>If the department is hiring\/hosting non-U.S. person(s), renewing a non-immigrant visa for an employee, hosting visitors, visiting students, or speakers it must be certified that a \u201cNo Matching Record\u201d Visual Compliance screening was conducted prior to EC Assessment Approval. If a matching record is found, the department should also recognize that the non-U.S. person may be affiliated with restricted, barred, or concerning entities, institutions, and\/or other organizations. This means there are restrictions or due diligence on our ability to share data with or provide access to certain technologies to individuals employed by or affiliated with these restricted, barred, or concerning entities. Additionally, keep in mind that any non-U.S. person(s) receiving funding from a restricted, barred, or concerning entity should be treated as restricted parties themselves, even if they are not individually named on a restricted parties list or list of concern.<\/p>\n\n\n\n<p>One way the university is mitigating the risk of hiring\/hosting non-U.S. person(s), renewing a non-immigrant visa for an employee, hosting visitors, visiting students, or speakers who might have an affiliation, or their institution and\/or other organizations might show up on a restricted party list or list of concern is through Letters of Attestation (LOA). An LOA is an acknowledgment to the Beneficiary and Supervisor that the Beneficiary has an affiliation with an entity on a Restricted Party List or List of Concern and they cannot export-control information to that entity and should be committed to fundamental research. An LOA is situation specific. When the need for an LOA has been identified, Export Control will contact the Supervisor with the appropriate information needed for them to complete the LOA. The LOA can be found by using the link below:<br><a href=\"https:\/\/go.unl.edu\/ec_loa\">https:\/\/go.unl.edu\/ec_loa<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Military\"><strong>Military or Space Related Research <\/strong><\/h2>\n\n\n\n<p>International Traffic in\nArms Regulations (ITAR) are administered by the U.S. Department of State. ITAR\nplaces strict controls on the export of \u201cdefense articles\u201d and \u201cdefense\nservices.\u201d Defense articles include any item, software or technical data on\nthe&nbsp;<a href=\"http:\/\/www.ecfr.gov\/cgi-bin\/text-idx?node=pt22.1.121\">United\nStates Munitions List (USML).<\/a>&nbsp;Defense services\ninclude assistance (including training) or any technical data associated with a\ndefense article furnished to foreign persons, whether or not in the United\nStates. Any defense article, service or related technical data found to be on\nthe USML requires an export license before it can be exported \u2013 that is, given\nto a foreign person, whether or not they are in the United States. Some license\nexemptions are available under specific circumstances, but in general you\nshould expect to obtain an export license.<\/p>\n\n\n\n<p>ITAR controls exports\nthat are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Predominantly items of military nature<\/li>\n\n\n\n<li>Modified or specifically designed for military use<\/li>\n\n\n\n<li>\u201cSpace\u201d related items and technology<\/li>\n\n\n\n<li>Controlled for national security reasons<\/li>\n<\/ul>\n\n\n\n<p>Because spacecraft and\nsatellites are subject to export controls, UNL policy requires a determination\nor technology control plan (TCP) for almost every research project that studies\nthe design or operation of these items. Certain projects funded by federal\nagencies, such as NASA, also prohibit the participation of certain foreign\npersons or entities.&nbsp;<a href=\"mailto:exportcontrol@unl.edu\">Contact\nthe Export Control<\/a>&nbsp;Staff for more information.<\/p>\n\n\n\n<p>Research into military technologies will also generally require the implementation of a TCP. This includes studies into the design and operation of weapons, defense systems, military vehicles, and protective gear. Almost all military research projects require government approval, so please be sure to contact the Export Control Staff when applying for funding from the Defense Department, Department of Energy, NASA, or the Department of Homeland Security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"NASA_Checklist\">NASA Checklist<\/h2>\n\n\n\n<p>NASA is restricted by specific applications of Section 1340(a) of The Department of Defense and Full-Year Appropriations Act, Public Law 112-10 (NASA&#8217;s 2011 continuing resolution), and Section 539 of the Consolidated and Further Continuing Appropriation Act of 2012, Public Law 112-55 (NASA&#8217;s FY 2012 appropriation) from using funding appropriated in the Acts to enter into or fund any grant or cooperative agreement of any kind to participate, collaborate, or coordinate bilaterally in any way with China or any Chinese-owned company, at the prime recipient level or at any subrecipient level, whether the bilateral involvement is funded or performed under a no-exchange of funds arrangement.<\/p>\n\n\n\n<p>NASA defines \u201cChina or Chinese-owned Company,\u201d to mean the People\u2019s Republic of China (PRC), any company owned by the PRC, or any company incorporated under the laws of the PRC; this would include Chinese universities and research institutes. The law is interpreted by NASA to prohibit participation (funded or unfunded) by any individual, regardless of nationality, who is affiliated with the Chinese Government or a Chinese-owned Company.NASA does not consider this a prohibition of Chinese nationals.For each NASA proposal or award, UNL must certify compliance with this restriction. When research personnel submit a proposal to NASA, they will be contacted by OSP and RCIS staff in order to complete a NASA Certification form. This form asks a series of questions regarding each person\u2019s involvement with China and requires signature and attestation that the information being disclosed is true. Affirmative disclosures regarding involvement with China will be reported to NASA as part of the proposal\/award process. Moreover, PIs are responsible for ensuring that, prior to adding additional participants to a NASA project,or if any changes occur with any project personnel\u2019s involvement with China, the new participants must provide a complete and up-to-date certification to Sponsored Programs and\/or an update to previously submitted information. In addition, Export Control and COI purposes necessitated a couple of additional steps beyond the certification form. Please reference the NASA checklist document linked below to review the three specific steps required for these awards.<\/p>\n\n\n\n<p>If any question arise regarding whether or not research personnel should disclose certain information, they must always err on the side of caution and ensure full and transparent disclosure to NASA and to UNL.<\/p>\n\n\n\n<p> <a rel=\"noreferrer noopener\" href=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Standard%20Operating%20Procedures%20(SOPs)\/EC\/Drafts\/Schulz_Evans_Reviews\/ECSOP-17%20NASA-China%20Certification\/NASA%20Cheklist%20Form%2012.8.2021%20(1).pdf?csf=1&amp;web=1&amp;e=auCucY?e=qVfHID\" data-type=\"URL\" data-id=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Standard%20Operating%20Procedures%20(SOPs)\/EC\/Drafts\/Schulz_Evans_Reviews\/ECSOP-17%20NASA-China%20Certification\/NASA%20Cheklist%20Form%2012.8.2021%20(1).pdf?csf=1&amp;web=1&amp;e=auCucY?e=qVfHID\" target=\"_blank\">NASA Checklist<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"OFAC\"><strong>The Office of Foreign Assets Control (OFAC)<\/strong><\/h2>\n\n\n\n<p>The Office of Foreign Assets Control (OFAC) of the US Department of the Treasury administers and enforces economic and trade sanctions based on US foreign policy and national security goals against targeted foreign countries and regimes, terrorists, international narcotics traffickers, those engaged in activities related to the proliferation of weapons of mass destruction, and other threats to the national security, foreign policy or economy of the United States. OFAC acts under Presidential national emergency powers, as well as authority granted by specific legislation, to impose controls on transactions and freeze assets under US jurisdiction. Many of the sanctions are based on United Nations and other international mandates, are multilateral in scope, and involve close cooperation with allied governments.<br><br>See also the guidance topic <a href=\"#Embargoed_Sanctioned_Countries\">Embargoed or Sanctioned Countries with Special Rules.<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Meetings\"><strong>Open &amp; Closed Meetings<\/strong><\/h2>\n\n\n\n<p>Open meetings are conferences, seminars or\nother gatherings where all technically qualified members of the public are\neligible to attend and attendees are permitted to take notes or otherwise make\na personal record of the proceedings and presentations. <\/p>\n\n\n\n<p>This\nis in contrast to a closed meeting in which not all technically qualified\nmembers of the public may attend and often notes or recording of the\nproceedings or presentations may be prohibited. This is typically due to the\nnature of the information that will be presented or discussed. <\/p>\n\n\n\n<p>It is particularly important to disclose that you plan on attending a closed meeting if you are traveling internationally or if you will be presenting or provided access to any information that will be export controlled. You should contact ECCP staff prior to participating in a closed meeting, so that they can review whether or not certain security parameters should be put into place regarding your attendance at such a meet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"online_STEM_courses\">Online STEM courses to Sanctioned and Embargoed Countries<\/h2>\n\n\n\n<p>Export control laws and regulations control the export of tangible and intangible items, materials, information, or services, which may include online learning. Typically, no license is required to share information that is part of an online course. The regulations provide for an educational exemption. The International Traffic in Arms Regulations (<a rel=\"noreferrer noopener\" href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#ITAR\" target=\"_blank\">ITAR<\/a>) exempts most sharing of information \u201ccommonly taught\u201d in colleges and universities, and the Export Administration Regulations (<a rel=\"noreferrer noopener\" href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#EAR\" target=\"_blank\">EAR<\/a>) usually exempts educational information \u201creleased by instruction in catalog courses and associated teaching laboratories\u201d. <\/p>\n\n\n\n<p>However, the Office of Foreign Assets Control (<a rel=\"noreferrer noopener\" href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#OFAC\" target=\"_blank\">OFAC<\/a>) regulates instruction delivered online, to individuals who are residents in, or ordinarily resident to, comprehensively sanctioned and embargoed countries in instances when such instruction is considered a \u201cservice\u201d (certain exceptions apply). Specific Licenses to provide a \u201cservice\u201d to comprehensively sanctioned and embargoed countries are required under most circumstances. Under other circumstances a General License, which authorizes a particular type of transaction without the need to apply for a Specific License is allowable. There may also be licensing requirements for software and other items associated with the online courses. <\/p>\n\n\n\n<p>The ECCP will assess the applicable restrictions summarized in the below guidance chart and explore potential options for requesting U.S Government licensing authorization if\/when applicable.&nbsp; This means, if you are planning on delivering an online learning course to anyone residing in or ordinarily resident to one of the below countries, you must contact the ECCP prior to engaging in this activity.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Webpages\/EC\/Published%20to%20Web\/A-Z\/Export%20Control%20Guidance%20A-Z%20-%20docs\/Online%20STEM%20courses%20to%20Sanctioned%20and%20Embargoed%20Countries%20Guidance%20Chart.DRAFT.pdf?csf=1&amp;web=1&amp;e=ZLxW5H?e=JZ6zOm\" data-type=\"URL\" data-id=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Webpages\/EC\/Published%20to%20Web\/A-Z\/Export%20Control%20Guidance%20A-Z%20-%20docs\/Online%20STEM%20courses%20to%20Sanctioned%20and%20Embargoed%20Countries%20Guidance%20Chart.DRAFT.pdf?csf=1&amp;web=1&amp;e=ZLxW5H?e=JZ6zOm\">Guidance Chart<\/a> <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Research_FN\"><strong>Participation in Research by Foreign Nationals<\/strong><\/h2>\n\n\n\n<p><a href=\"#Foreign_National\">Foreign nationals<\/a>&nbsp;are persons who are not U.S. citizens or lawful permanent residents (those who have green cards). A foreign national also means any foreign corporation, business association, partnership or any other entity or group that is not incorporated to do business in the U.S.<\/p>\n\n\n\n<p>The university campus is\nopen to students and faculty from many different countries. However, access to\nrestricted or export-controlled technology, commodities, defense articles and\ndefense services by an unauthorized foreign person could result in severe\ncriminal or civil penalties for the university and the university employee\nmaking the export.<\/p>\n\n\n\n<p>When planning research\ninvolving foreign countries or foreign nationals (including graduate or\nundergraduate research assistants), the principal investigator (PI) should\nunderstand that, depending upon the nature of the research and the status of\nthe foreign country, obtaining export licenses can take several months. Therefore,\nthe PI must identify any possible export control restrictions in the early\nplanning stages of a proposal and contact the&nbsp;<a href=\"mailto:exportcontrol@unl.edu\">Export Control Staff<\/a>&nbsp;for\nassistance in complying with applicable laws.<\/p>\n\n\n\n<p>While UNL strives to\nmaintain an open campus that fosters collaboration between students and faculty\nfrom many different countries, allowing unauthorized foreign persons to access\ncontrolled items or information, such as export controlled technology, commodities,\ndefense articles, technical data, and\/or defense services, can constitute a\nviolation of one or more export control regulations. Prosecution of an export\nviolation may result in fines of up to $1 million and\/or a prison sentence of\nup to 20 years.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Publicly_Available\"><strong>Publicly Available, Public Domain, and Open Source<\/strong><\/h2>\n\n\n\n<p>Information that is already published or is out in the public domain is considered public information and, as provided for under the federal regulations (<a href=\"http:\/\/www.ecfr.gov\/cgi-bin\/text-idx?SID=5b741d9e95f4ffd56b78cfa7d615a72d&amp;mc=true&amp;node=pt15.2.734&amp;rgn=div5%23se15.2.734_17#se15.2.734_17\" target=\"_blank\" rel=\"noreferrer noopener\">15 CFR\u00a7734.7<\/a> and <a href=\"http:\/\/www.ecfr.gov\/cgi-bin\/text-idx?SID=5b741d9e95f4ffd56b78cfa7d615a72d&amp;mc=true&amp;node=pt15.2.734&amp;rgn=div5%23se15.2.734_11%23se15.2.734_11#se15.2.734_110\" target=\"_blank\" rel=\"noreferrer noopener\">15 CFR\u00a7734.11<\/a>), is <strong>NOT <\/strong>subject to export controls (i.e. published information exclusion). However, there are differences between how the ITAR and EAR define this exclusion. While they share the idea that publicly available information should not be subject to export controls, they differ in how the information can be made publicly available. Additionally, the ITAR refers to information &#8220;in the public domain&#8221; while the EAR refer to &#8220;publicly available&#8221; information.<\/p>\n\n\n\n<p><strong>Publicly Available (EAR)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Refers to \u201cpublicly available technology and software\u201d, the EAR does not use the expression &#8220;public domain&#8221;. Publicly available technology and software are excluded from control under the EAR.<\/li>\n\n\n\n<li>Examples of information in the public domain include:\n<ul class=\"wp-block-list\">\n<li>Books, newspapers, pamphlets<\/li>\n\n\n\n<li>Publicly available technology<\/li>\n\n\n\n<li>Software with open source code that is made publicly available<\/li>\n\n\n\n<li>Information presented at conferences, meetings, and seminars open to the public<\/li>\n\n\n\n<li>Information included in published patents<\/li>\n\n\n\n<li> Websites freely accessible by the public<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Public Domain (ITAR)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Meaning information that is published, and which is generally accessible or available to the public. As referenced in the 22 CFR \u00a7 120.11, public domain includes:<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Books, newspapers, pamphlets<ul><li>Subscriptions of published information that do not have restrictions<\/li><li>Information included in published patents<\/li><li>Unlimited distributions at conferences, seminars, and trade shows open to the public<\/li><\/ul>\n<ul class=\"wp-block-list\">\n<li>Through public release with unlimited distribution in any form, that is approved by a United States department or agency<\/li>\n\n\n\n<li>Information regarding general scientific, mathematical, or engineering principles commonly taught in schools, colleges and universities is not controlled by ITAR<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Open Source<\/strong><\/p>\n\n\n\n<p>Open Source and Publicly available are commonly confused and used interchangeably. Open Source is available to all users but is restricted by copyright laws as Public Domain Software is not restricted by copyright laws.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Open source commonly refers to software that for which the original source code is made freely available and may be redistributed and modified.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Purchasing_EC\"><strong>Purchasing &amp; Export Controls Guidance<\/strong><\/h2>\n\n\n\n<p>When purchasing\nequipment, software or other tangible items, it is important to ensure that any\nexport control issues are addressed prior to bringing them to campus.<\/p>\n\n\n\n<p>The following guidance provides\ninformation for purchasing equipment, software, or other tangible items whether\nthey are from a foreign or U.S. vendor. It also provides questions to ask of\nvendors when purchasing these type of items, information on anti-boycott\nlanguage, international shipping for these purchases, and some examples of foreign\nUniversities or other entities that appear on the U.S. government Restricted or\nDenied listings.<\/p>\n\n\n\n<p><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Webpages\/EC\/Published%20to%20Web\/A-Z\/Export%20Control%20Guidance%20A-Z%20-%20docs\/Export%20Guidelines%20for%20Purchasing%20WM.pdf?csf=1&amp;web=1&amp;e=XVvrdN?e=h76Z6v\" target=\"_blank\">Purchasing &amp; Export Controls Guidance<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ReExport\"><strong>Re-export<\/strong><\/h2>\n\n\n\n<p>According to the&nbsp;<a href=\"https:\/\/www.bis.doc.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Bureau of Industry and\nSecurity (BIS)<\/a>, a reexport is \u201cthe shipment or transmission of an\nitem subject to the Export Administration Regulations (EAR) from one&nbsp;<strong>foreign<\/strong>&nbsp;country to another foreign country. A\nreexport also occurs when there is &#8216;release&#8217; of technology or software (source\ncode) subject to the EAR in one foreign country to a national of another\nforeign country.\u201d<\/p>\n\n\n\n<p>This is important to understand if\nyour item, technology or software requires a license before you can export it\nfrom the United States to a specific country. That same item, technology or\nsoftware requires a license to be reexported from its current non-U.S. country\nto another non-U.S. country (e.g. You are shipping an item from UNL to a lab in\nFrance, which then will be shipping that same item to a lab in China). <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Pub_Restrictions\"><strong>Restrictions on Publication<\/strong><\/h2>\n\n\n\n<p>Certain terms included in\ncontracts or agreements might prevent a project from qualifying for<a href=\"https:\/\/research.unl.edu\/researchcompliance\/eccp-faq\/\">&nbsp;the\nfundamental research exclusion<\/a>. These include terms\nthat:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>grant the sponsor pre-approval rights over publication of research results or<\/li>\n\n\n\n<li>allow the sponsor to claim resulting research information as proprietary or trade secret<\/li>\n\n\n\n<li>otherwise restrict the publication or other dissemination of research results from a given project.<\/li>\n<\/ul>\n\n\n\n<p>When information generated by such a project includes these type of terms, the project would therefore be controlled under export regulations because restrictions on publications void the fundamental research exclusion. Such controls may also result in restrictions on the participation of certain foreign nationals and require licensing. Also, contractual restrictions on participation by foreign nationals might be interpreted to imply restrictions on publication, with a potential loss of the fundamental research exclusion.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Nuclear_UAV_Missiles\"><strong>Research Related to Nuclear, Chemical, Biological Weaponry; Missiles; or Unmanned Vehicles<\/strong><\/h2>\n\n\n\n<p>Exports of special\nnuclear material (including Pu, 233U, and 235U) are governed by the Nuclear\nRegulatory Commission.<\/p>\n\n\n\n<p>Technologies related to\nthe production and use of nuclear material for peaceful purposes, like nuclear\nenergy, are regulated under the Export Administration Regulations and specific\nitems can be found in Categories of the Commerce Control List. <\/p>\n\n\n\n<p>Technologies related to\nthe military use of nuclear energy, including weapons systems, are regulated\nunder the International Traffic in Arms Regulations. Specific controlled\ntechnologies can be found in Categories enumerated under the United States\nMunitions List (USML).<\/p>\n\n\n\n<p>The Department of\nCommerce regulates and restricts the transfer and export of \u201cdual use\u201d\ntechnologies which are technologies or items having both commercial and\nmilitary or proliferation applications. These can be found listed on the\nCommerce Control List (CCL).<\/p>\n\n\n\n<p>Some examples of this\nresearch:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nuclear technologies associated with production and use of nuclear material for both peaceful and military applications, including certain associated technologies related to nuclear physics and\/or nuclear engineering.<\/li>\n\n\n\n<li>Rocket system technologies that contribute to ballistic missile systems, space launch vehicles and sounding rockets and unmanned air vehicles (UAV). The also include navigation, avionics and flight control usable in rocket systems and unmanned air vehicles.<\/li>\n\n\n\n<li>Chemical, biotechnology and biomedical engineering technologies that could be applied to develop and produce chemical and biological weapons.<\/li>\n\n\n\n<li>Remote sensing, imaging and reconnaissance technologies related to satellite and aircraft remote sensing that can be used for civilian imagery projects or for military and intelligence reconnaissance activities.<\/li>\n\n\n\n<li>Advanced computer\/microelectronic technology that can play a useful (but not necessarily critical) role in the development and deployment of missiles and missile systems and in the development and production of nuclear weapons.<\/li>\n\n\n\n<li>Certain materials technologies related to structural functions in aircraft, spacecraft, missiles, undersea vehicles and propulsion devices.<\/li>\n\n\n\n<li>Information security technologies associated with cryptography and cryptographic systems that help ensure secrecy for communications, video, data and related software.<\/li>\n\n\n\n<li>Laser and directed energy systems technologies that have critical military applications, including incorporation in guided ordinance such as laser guided bombs and ranging devices.<\/li>\n\n\n\n<li>Sensors and sensor technologies that provide real-time information and data and could provide a significant military advantage in a conflict.<\/li>\n\n\n\n<li>Marine technologies used in propulsion systems designed for undersea use and navigation and quieting systems associated with reducing detectability and enhancing operations survivability.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Encryption\"><strong>Research Related to Encryption Technologies<\/strong><\/h2>\n\n\n\n<p>Encryption software&nbsp;\nis software whose main task is encryption and decryption of data, usually in\nthe form of files on hard drives and removable media, or email messages sent\nover computer networks or the Internet.<\/p>\n\n\n\n<p>Sharing, shipping,\ntransmission or transfer of almost all encryption software in either source\ncode or object code is subject to U.S. export regulations. Even most publicly\navailable \u201cdual-use\u201d encryption code requires a license or license exception to\nship outside the U.S.<\/p>\n\n\n\n<p>In addition, U.S. persons\nare prohibited, without prior authorization, from providing technical\nassistance (instruction, skills training, working knowledge and consulting\nservices) to a foreign national with the intent to help in the overseas\ndevelopment or manufacture of encryption software subject to U.S. Government\nnotification or authorization. This prohibition does NOT limit university\npersonnel from teaching or discussing general information about cryptography or\ndeveloping or sharing encryption code within the United States that arises\nduring, or results from, fundamental research.<\/p>\n\n\n\n<p>However, source code for\nmost strong encryption software is subject to export controls. Projects that\nrequire access to such source code (either for the purposes of study or\ndevelopment) will likely be required to implement a&nbsp;<a href=\"http:\/\/research.unl.edu\/researchcompliance\/technology-control-plans\/\">technology\ncontrol plan<\/a>&nbsp;that specifically details information security procedures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Pathogens\"><strong>Research Involving Select Agents or Other Pathogens<\/strong><\/h2>\n\n\n\n<p>Both the International\nTraffic in Arms Regulations (ITAR) and the Export Administration Regulations\n(EAR) have provisions for the control of pathogens and toxins. The control\nlevel depends on which regulations apply to the item.<\/p>\n\n\n\n<p>Inside the United States\nany person, including foreign nationals, may purchase and use EAR export\ncontrolled pathogens and toxins for fundamental research. However, the \u201cdeemed\u201d\nexport rule applies to technical information about the controlled item or to\nthe development or production of technology associated with the controlled item.\nFor example, if a PI receives confidential, proprietary or export controlled\ninformation about the development or production of an EAR controlled\nbiological, the PI may need a \u201cdeemed\u201d export license to provide such\ninformation to a foreign national on campus.<\/p>\n\n\n\n<p>Select agent regulations\nare separate from export control regulations, any given research project may be\nsubject to either or both sets of regulations. This means that labs handling\nselect agents may be required to complete both an IBC protocol and in some\ncases a determination or technology control plan may be required.<\/p>\n\n\n\n<p>If a PI wishes to ship\ncontrolled pathogens or toxins outside the U.S. please Contact the Export\nControl Staff as an export license may be required.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"RPS\"><strong>Restricted Party Screening (RPS)<\/strong><\/h2>\n\n\n\n<p>The United States Government prohibits\nU.S. persons, including educational institutions, from conducting business with\npersons and entities designated as restricted parties (Specially Designated\nNationals and Blocked Persons &#8211; SDNs) on any federal restricted party listings.\nIn addition, some entities may also be added to what is call the \u201c<a href=\"https:\/\/www.bis.doc.gov\/index.php\/policy-guidance\/lists-of-parties-of-concern\/unverified-list\">unverified listing<\/a>,\u201d\nwhich is a listing of f0reign entities in which the U.S. government has\nconcerns but has not yet designated them as a restricted party.<\/p>\n\n\n\n<p>The Office of Foreign Asset Controls\n(OFAC) is the central repository for many of these restricted party or\nunverified lists.&nbsp; However, the lists are also administered and enforced\nby several additional U.S. agencies which include but are not limited to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Department of Commerce<\/li>\n\n\n\n<li>Department of State,<\/li>\n\n\n\n<li>Department of Treasury,<\/li>\n\n\n\n<li>FBI<\/li>\n\n\n\n<li>Department of Homeland Security<\/li>\n<\/ul>\n\n\n\n<p>The University of Nebraska-Lincoln utilizes a specialized software\nsubscription service for screening of entities and individuals against the\nrestricted party or unverified database listings maintained by the above listed\nagencies.&nbsp; This software, called&nbsp;<em>Visual Compliance<\/em><em>,<\/em> not only permits screening against all\nthe federally maintained lists, but also auto-updates all prior screenings on a\nnightly basis in the event of changes to any of the restricted party or\nunverified listings. Screenings can be completed quickly and easily by ECCP\nstaff, typically within the same day of the request. In many instances, such as\nexport controlled research and foreign national visa reviews, ECCP staff are\nalready completing screenings of entities and individuals. However, UNL\npersonnel can and should request screenings be completed under additional\ncircumstances such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tours involving foreign nationals or\nentities on campus. Particularly if a tour will involve R&amp;I and research areas\nthat could have or has been designated as working in an export controlled area.<\/li>\n\n\n\n<li>International collaborations<\/li>\n\n\n\n<li>Research protocols that will involve an\ninternational component. <\/li>\n\n\n\n<li>International shipments<\/li>\n<\/ul>\n\n\n\n<p>To request a screening using the&nbsp;<em>Visual Compliance<\/em>&nbsp;software, please\ncontact ECCP staff directly. When requesting a screening, please be prepared to\nprovide some of the following information in order for staff to complete the\nscreening(s):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Person or Entity Name<\/li>\n\n\n\n<li>Country(ies) of citizenship or country\nwhere the entity is located<\/li>\n\n\n\n<li>Reason for screening (e.g. campus tour)<\/li>\n<\/ul>\n\n\n\n<p>Additional Resources<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.bis.doc.gov\/index.php\/policy-guidance\/lists-of-parties-of-concern\/denied-persons-list\/23-compliance-a-training\/46-how-do-i-avoid-dealing-with-unauthorized-parties\">Department of Commerce Guidance on Restricted Party Screening<\/a>;<\/li>\n\n\n\n<li><a href=\"http:\/\/www.treasury.gov\/resource-center\/sanctions\/SDN-List\/Pages\/default.aspx\">Department of the Treasury Guidance on Restricted Party Screening<\/a>;\nand,<\/li>\n\n\n\n<li><a href=\"http:\/\/export.gov\/ecr\/eg_main_023148.asp\">Export.gov Information and Links to Consolidated Screening Lists<\/a>.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Safeguarding\"><strong>Safeguarding Covered Defense Information, Controlled Unclassified Information &amp; Office 365 US Government<\/strong><\/h2>\n\n\n\n<p>Information that falls under CDI requires safeguarding or dissemination controls pursuant to and consistent with law, regulations, and Government-wide policies that resides on the contractor\u2019s information system, government wide policy, and is:<\/p>\n\n\n\n<ol style=\"list-style-type:1\" class=\"wp-block-list\">\n<li>Marked or otherwise identified in the contract, task order, or delivery order and provided to the contractor by or on behalf of DoD in support of the performance of the contract; or<\/li>\n\n\n\n<li>Collected, developed, received, transmitted, used, or stored by or on behalf of the contractor in support of the performance of the contract.<\/li>\n<\/ol>\n\n\n\n<p>These controls must be compliant with the below federal regulations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.ecfr.gov\/cgi-bin\/text-idx?SID=afd2d82eb107bc8e2e9a4b34cb2ad723&amp;mc=true&amp;node=pt32.6.2002&amp;rgn=div5\" target=\"_blank\" rel=\"noreferrer noopener\">32 CFR Part 2002<\/a>: Issued&nbsp;by the Federal Information Security Oversight Office (ISOO) to establish policy for agencies on designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI, self-inspection and oversight requirements. The rule affects Federal executive branch agencies that handle CUI and all organizations (sources) that handle, possess, use, share, or receive CUI\u2014or which operate, use, or have access to Federal information and information systems on behalf of an agency.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.acq.osd.mil\/dpap\/dars\/dfars\/html\/current\/252204.htm#252.204-7012\" target=\"_blank\" rel=\"noreferrer noopener\">DFARS 252.204.7012<\/a>&nbsp;Safeguarding Covered Defense Information (CDI) &amp; Cyber Incident Reporting. This clause is found in DOD Contracts, which addresses the requirements of safeguarding and reporting breaches.<\/li>\n\n\n\n<li><a href=\"http:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-171r1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">NIST SP 800-171<\/a> Set of Information Technology Security standard guideline required for \u201cProtecting Controlled Unclassified Information in Nonfederal Systems and Organizations,\u201d provides requirements for protecting the confidentiality of Controlled Unclassified Information (CUI). The requirements apply to all components of nonfederal information systems and organizations that process, store, transmit CUI, or provide security protection for such components. The CUI requirements are intended for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations.\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-171r1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><em>NIST SP 800-171<\/em><\/a><em> identifies&nbsp;110 unique requirements that apply to University information systems&nbsp;that process, store, or transmit CUI.<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>At UNL,<strong> Office 365 US Government<\/strong> is the current solution that has been implemented to meet the NIST 800-171 IT security requirements. Office 365 US Government is a Microsoft Office (Word, Excel), email (Outlook) and storage platform that meets U.S. Government security standards. The below list of security features does not include everything covered by this platform, but some of the main features allow UNL researchers to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Store content in the continental United States.<\/li>\n\n\n\n<li>Support covered defense information and export-controlled data.<\/li>\n\n\n\n<li>Support protected health information with HIPAA business associate agreements.<\/li>\n<\/ul>\n\n\n\n<p><strong><em>If your project requires adherence to CUI or CDI requirements, please be aware that there is a cost associated with receiving access to use the secure Microsoft 365 US Government platform. Please ensure you are consulting with RICS\/OSP\/ITS regarding planning for this cost during the proposal stage if your research project will require this type of security.&nbsp;<\/em><\/strong><\/p>\n\n\n\n<p>If CUI or CDI compliance is required for a research project, RCIS and\/or OSP will work with the Principal Investigator and Information Technology Services (ITS) to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Verify that the research project will receive, possess, and\/or create CUI or CDI.<\/li>\n\n\n\n<li>Identify, with assistance from ITS, the appropriate information security system\/technology solution to use to secure and store the information.\n<ul class=\"wp-block-list\">\n<li>Appropriate system solutions may include Microsoft Office 365 US Government or use of encrypted\/secure email and storage.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Communicate an appropriate information security plan&nbsp;for the research project.&nbsp; This plan outlines the policies and procedures the research team will follow (e.g., information access restrictions, laboratory security, etc.) to comply with the CUI or CDI requirements.<\/li>\n<\/ul>\n\n\n\n<p><em>Questions to Consider:<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Does your research project receive funding from the Department of Defense (DoD) or a DoD-funded prime contractor?<\/li>\n\n\n\n<li>Does the contract contain&nbsp;DFARS&nbsp;252.204.7008, 7009 and 7012 clauses, on safeguarding covered defense information and cyber incident reporting? The following is an example\/part of a clause that could be contained in a contract:\n<ul class=\"wp-block-list\">\n<li><em>The covered contractor\u2019s information system shall be subject to the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, \u201cProtecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations\u201d (available via the internet at&nbsp;<\/em><a href=\"http:\/\/dx.doi.org\/10.6028\/NIST.SP.800-171\"><em>http:\/\/dx.doi.org\/10.6028\/NIST.SP.800-171<\/em><\/a><em>) in effect at the time the solicitation is issued or as authorized by the Contracting Officer.<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Have you been informed that you have a project funded by a non-DoD sponsor subject to DFARS 252.204.7008, 7009 and 7012 or NIST&nbsp;800-171?<\/li>\n\n\n\n<li>Does your project involve funding from DoD\u2019s Small Business Innovation Research (SBIR) or Strategic&nbsp;Technology Transfer Research (STTR) programs?<\/li>\n\n\n\n<li>Does the project result in storing, accessing, processing, or transmission of CUI\/CDI?<\/li>\n<\/ul>\n\n\n\n<p><em>Note: the Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity certification that will be required by Department of Defense contractors in the US Defense Industrial Base, university-based research labs &amp; facilities, University Affiliated Research Centers (UARCs) and Federally Funded R&amp;D Centers (FFRDCs). The CMMC is a unified standard for implementing cybersecurity across the defense industry base, which include universities that conduct research funded under DoD. CMMC requires that contractors be audited by 3rd party organizations to determine their current cybersecurity maturity level (1-5). The DFARS clause 252.204-7012 is currently viewed as a \u201ctrust measure,\u201d while CMMC will be a \u201cverification measure.\u201d&nbsp;<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"633\" src=\"https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/safeguarding-1024x633.jpg\" alt=\"\" class=\"wp-image-2046\" srcset=\"https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/safeguarding-1024x633.jpg 1024w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/safeguarding-300x186.jpg 300w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/safeguarding-768x475.jpg 768w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/safeguarding-1536x950.jpg 1536w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/safeguarding-950x587.jpg 950w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/safeguarding-600x371.jpg 600w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/safeguarding-624x386.jpg 624w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2020\/12\/safeguarding.jpg 1711w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>See also guidance topic on Controlled Unclassified Information (CUI) &amp; Covered Defense Information (CDI).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Student_Theses_Dissertations_EC\"><strong>Student Theses\/Dissertations &amp; Export Controls<\/strong><\/h2>\n\n\n\n<p>In general, most student involvement in research or other academic activities will not fall under export control regulations. However, in some circumstances, students may be working towards a graduate degree in an area where export controls apply. While this can be a valuable learning experience as part of the student\u2019s graduate work, faculty advisors must closely weigh how export control requirements (e.g. publication restrictions) will impact the student\u2019s ability to complete the project and meet academic or graduation requirements. This guidance is intended to provide information to students and faculty regarding student involvement and the parameters around graduate work that is subject to export control requirements.<\/p>\n\n\n\n<p>In addition to following all requirements as outlined within an export control determination or TCP, the below listing provides frequently encountered areas that must be considered by the student and the faculty member(s). When a student thesis\/dissertation will be involved, the faculty must ensure notification to the ECCP occurs as early on in the process as possible. Without this notification, it is difficult to ensure appropriate review, documentation, and export control requirements are met well ahead of the project starting and the student graduating.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>PIs:<\/strong> Due to security concerns, students are not allowed to be listed or function as the PI on any export-controlled project. The involved faculty member\/advisor is ultimately responsible for the project and must be listed as the Principal Investigator (PI). Instead, students should be listed as the Secondary Investigator (SI) if the project is specific to their thesis\/dissertation work.<\/li>\n\n\n\n<li><strong>Publication\/Foreign National Restrictions:<\/strong> If publication and\/or foreign national restrictions are applicable to the project:\n<ul class=\"wp-block-list\">\n<li>The final publication of the student thesis\/dissertation may be embargoed for a certain period of time, or permanently, given the sensitivity of the work.<\/li>\n\n\n\n<li>The PI must notify the Office of Graduate Studies as soon as they are aware publication restrictions are applicable to a student thesis\/dissertation. This notification is to ensure Graduate Studies can appropriately manage and embargo the information.<\/li>\n\n\n\n<li>For High Risk\/ITAR controlled projects that involve restrictions on foreign nationals, only the minimum amount of information and people must be notified and\/or have access to the information in Graduate Studies. The person(s) identified in Graduate Studies must be vetted and approved by the Export Control Compliance Program (ECCP) prior to the thesis\/dissertation information being provided.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Committees\/Presentations: <\/strong>When certain High Risk\/ITAR controlled projects or foreign national restrictions are involved, the ECCP must review and approve anyone selected to be part of the student\u2019s committee. In addition, when the final thesis\/dissertation will be presented, these same restrictions will govern whether or not the presentation can be open to the public or if it must be closed and only involve approved individuals. The faculty and student must ensure that this information is understood and provided to the ECCP for vetting\/approving individuals.<\/li>\n\n\n\n<li><strong>Printing\/Dissemination: <\/strong>Typically, students want to ensure the final version of their thesis\/dissertation is printed or disseminated. However, in the above cases, unless the sponsor of the project and\/or ECCP has reviewed and approved the release of the information\/publication restriction, the student will not be allowed to print or distribute final copies of their thesis\/dissertation.Students and faculty must ensure that publication restrictions are closely followed, and that information is not released prior to receiving approval.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Technical_data\"><strong>Technical data<\/strong><\/h2>\n\n\n\n<p>Technical data is a specific term defined under the ITAR that refers to information that is required for the design, development, production, manufacture, assembly, operation, repair, testing, maintenance or modification of defense articles. Technical data includes, but is not limited to, information in the form of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Blueprints, engineering scale drawings, photographs, plans, instructions and documentation for defense article;<\/li>\n\n\n\n<li>Information covered by an invention secrecy order or certain kinds of classified information;<\/li>\n\n\n\n<li>Generated by independent R&amp;D for military application;<\/li>\n\n\n\n<li>Generated under a DoD contract;<\/li>\n\n\n\n<li>Provides understanding of sensitive capabilities (e.g. stealth characteristics), or vulnerabilities (e.g. EMI problems);<\/li>\n\n\n\n<li>Extracted complete section from technical documents directly relating to defense articles or defense services;<\/li>\n\n\n\n<li>Software directly related to defense articles.<\/li>\n<\/ul>\n\n\n\n<p>The term \u201ctechnical data\u201d does not include information concerning general scientific, mathematical or engineering principles commonly taught in schools, colleges and universities. It also does not include information in the public domain or basic marketing information on function, purpose, or general system descriptions.<\/p>\n\n\n\n<p>Keep in mind that the \u201ctechnical data\u201d term, can appear in contracts and agreements that may not have the same meaning as the technical data definition under ITAR. The type of research and sponsor is a good indicator on whether the term refers to information related to defense articles or other type of information.<\/p>\n\n\n\n<p>UNL faculty, staff and students conducting research that will generate, access or store technical data, as defined under the ITAR, will require a Technology Control Plan (TCP), as this information is linked to defense articles and defense services. Note, UNL is not a cleared facility, therefore, technical data that is considered \u201cclassified\u201d information cannot be accessed or received on campus.<\/p>\n\n\n\n<p>See also the guidance topic <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#ITAR\" target=\"_blank\" rel=\"noreferrer noopener\">International Traffic in Arms Regulations (ITAR)<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Technology\">Technology<\/h2>\n\n\n\n<p>Per the Export Administration Regulations (EAR), &#8220;technology&#8221; is information necessary for the &#8220;development,&#8221; &#8220;production,&#8221; or &#8220;use&#8221; of an item. Technology goes beyond the general and basic marketing material, or information contained in published information such as manuals; the term refers to specific information that may come in the form of blueprints, drawings, plans, diagrams, models, methods, engineering specifications or other documentation linked to dual-use items identified in the Commerce Control List (<a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#CCL\" target=\"_blank\" rel=\"noreferrer noopener\">ECCNs on the CCL<\/a>). Therefore, the level of controls will depend on the nature of the technology and the country of origin of the foreign national. The \u201cdeemed export\u201d rules apply to the transfer of such technology, to a foreign national inside the U.S.&nbsp;<\/p>\n\n\n\n<p>When there are dual-use items, the export control office reviews the possibility of a deemed export of knowledge and technology. For the use of equipment, a deemed export would only occur if ALL 6 categories of \u201cuse\u201d of equipment by a foreign national are met, which are defined as: operation, installation, maintenance (checking), repair, overhaul and refurbishing (restore, review).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For example, a foreign national who is operating a commercial laser or optical equipment in a lab classified under ECCN 6A005 on the CCL, would only have access to the information of \u201coperation,\u201d which can be found in the user manual. The foreign national is not meeting all categories of \u201cuse,\u201d and there is no transfer of technology and therefore, no deemed export. On the other hand, if a foreign national is involved in the \u201cdevelopment\u201d (e.g., engineering specifications, design, blueprints) of a new laser that meets the parameters of ECCN 6A005, this would constitute a transfer of technology requiring further review to assess the level of control of the dual-use item and to determine of a deemed-export license is required.<\/li>\n<\/ul>\n\n\n\n<p>See also guidance topic <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#EAR\" target=\"_blank\" rel=\"noreferrer noopener\">Export Administration Regulation (EAR)<\/a>, <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#Deemed_Export\" target=\"_blank\" rel=\"noreferrer noopener\">Deemed Export<\/a> and <a href=\"https:\/\/research.unl.edu\/researchcompliance\/activities-subject-to-export-controls\/#Dual_Use\" target=\"_blank\" rel=\"noreferrer noopener\">Dual-Use<\/a>. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Restrictions_Sanctions_Lists\"><strong>U.S. Restrictions and Sanctions Related Lists (Consolidated Screening List)<\/strong><\/h2>\n\n\n\n<p>While the UNL Export Control Compliance Program uses Visual Compliance, a software that screens from multiple listings that includes the consolidated screening listings, the following information and resources are available for public use.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.trade.gov\/consolidated-screening-list\" target=\"_blank\" rel=\"noreferrer noopener\">Consolidated Screening List (CSL)<\/a> is a&nbsp;list of parties for which the United States Government maintains restrictions on certain exports,&nbsp;reexports, deemed exports or transfers of items. Each agency is responsible for maintaining and updating their respective lists. Companies, entities, and persons found on the lists are sanctioned by the U.S. government and may not export goods from the United States or receive exported goods from the United States. Exporters are responsible for ensuring that all export transactions are properly authorized.<\/p>\n\n\n\n<p>These tools are a consolidation of multiple export screening lists of the Departments of Commerce, State and the Treasury and may be used as an aid to in conducting electronic screens of potential parties to regulated transactions.<\/p>\n\n\n\n<p>In the event that a company, entity or person on the list appears to match a party potentially involved in your export activity or transaction, you must contact the Export Control Office in order to ensure appropriate follow up is completed.&nbsp;There may be a strict export prohibition, requirement for seeking a license application, evaluation of the end-use or user to ensure it does not result in an activity prohibited by any U.S. export regulations, or other restriction.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Definitions<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.bis.doc.gov\/index.php\/policy-guidance\/lists-of-parties-of-concern\/denied-persons-list\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Denied Persons List (DPL)<\/strong><\/a> &#8211; Individuals and entities that have been denied export privileges. Any dealings with a party on this list that would violate the terms of the denial order are prohibited.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.bis.doc.gov\/index.php\/policy-guidance\/lists-of-parties-of-concern\/unverified-list\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Unverified List<\/strong><\/a><strong> <\/strong>&nbsp;&#8211; End-users who the U.S. Bureau of Industry and Security (BIS) has been unable to verify in prior transactions. The presence of a party on this list in a transaction is a \u201cRed Flag\u201d that should be resolved before proceeding with the transaction.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.bis.doc.gov\/index.php\/policy-guidance\/lists-of-parties-of-concern\/entity-list\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Entity List<\/strong><\/a> &#8211; Parties whose presence in a transaction can trigger a license requirement supplemental to those elsewhere in the Export Administration Regulations (EAR). The list specifies the license requirements and policy that apply to each listed party.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.state.gov\/key-topics-bureau-of-international-security-and-nonproliferation\/nonproliferation-sanctions\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Nonproliferation Sanctions (NSP)<\/strong><\/a> &#8211; Parties that have been sanctioned under various statutes. The list is updated as appropriate, but the Federal Register is the only official and complete listing of nonproliferation sanctions determinations.<\/li>\n\n\n\n<li><a href=\"https:\/\/2009-2017.state.gov\/strategictrade\/redflags\/index.htm\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>AECA Debarred List<\/strong><\/a> \u2013 Entities and individuals prohibited from participating directly or indirectly in the export of defense articles, including technical data and defense services. Pursuant to the Arms Export Control Act (AECA) and the International Traffic in Arms Regulations (ITAR), the AECA Debarred List includes persons convicted in court of violating or conspiring to violate the AECA and subject to \u201cstatutory debarment\u201d or persons established to have violated the AECA in an administrative proceeding and subject to \u201cadministrative debarment.\u201d<\/li>\n\n\n\n<li><a href=\"https:\/\/www.treasury.gov\/resource-center\/sanctions\/SDN-List\/Pages\/default.aspx\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Specially Designated Nationals (SDN) List<\/strong><\/a> &#8211; Parties who may be prohibited from export transactions based on OFAC\u2019s regulations. The EAR requires a license for exports or reexports to any party in any entry on this list that contains any of the suffixes &#8220;SDGT&#8221; (Specially Designated Global Terrorists), &#8220;SDT&#8221; (Specially Designated Terrorist), &#8220;FTO&#8221; (Foreign Terrorist Organization), &#8220;IRAQ2&#8221; (Iraq Related Sanctions), or &#8220;NPWMD\u201d (Nonproliferation and Weapons of Mass Destruction).<\/li>\n\n\n\n<li><a href=\"https:\/\/www.treasury.gov\/resource-center\/sanctions\/SDN-List\/Pages\/fse_list.aspx\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Foreign Sanctions Evaders (FSE) List<\/strong><\/a><strong> <\/strong>&#8211; Foreign individuals and entities determined to have violated, attempted to violate, conspired to violate, or caused a violation of U.S. sanctions on Syria or Iran, as well as foreign persons who have facilitated deceptive transactions for or on behalf of persons subject to U.S. Sanctions. Transactions by U.S. persons or within the United States involving Foreign Sanctions Evaders (FSEs) are prohibited.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.treasury.gov\/resource-center\/sanctions\/SDN-List\/Pages\/ssi_list.aspx\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Sectoral Sanctions Identifications (SSI) List<\/strong><\/a> &#8211; Individuals operating in sectors of the Russian economy with whom U.S. persons are prohibited from transacting in, providing financing for, or dealing in debt with a maturity of longer than 90 days.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.treasury.gov\/resource-center\/sanctions\/SDN-List\/Pages\/plc_list.aspx\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Palestinian Legislative Council (PLC) List<\/strong><\/a> &#8211; Individuals of the PLC who were elected on the party slate of Hamas, or any other Foreign Terrorist Organization (FTO), Specially Designed Terrorist (SDT), or Specially Designated Global Terrorist (SDGT).<\/li>\n\n\n\n<li><a href=\"https:\/\/www.treasury.gov\/resource-center\/sanctions\/SDN-List\/Pages\/capta_list.aspx\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Correspondent Account or Payable<\/strong><\/a>-Through Account Sanctions (CAPTA) List &#8211; Foreign Financial Institutions Subject to CAPTA. As of March 14, 2019, the List includes one foreign financial institution subject to correspondent or payable-through account sanctions. Prior to March 14, 2019, this entity was on OFAC\u2019s Part 561 List.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>back to top This page is intended to provide guidance regarding activities subject to export controls and typically overseen by the Export Control Compliance Program (ECCP). Topics and definitions are arranged alphabetically from A-Z. If you are unable to find an answer to your questions, please contact the ECCP at exportcontrol@unl.edu, or 402-472-6965. As a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-38","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/pages\/38","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":46,"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/pages\/38\/revisions"}],"predecessor-version":[{"id":4317,"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/pages\/38\/revisions\/4317"}],"wp:attachment":[{"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/media?parent=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}