SlideShare a Scribd company logo
NCURA Conference Export Controls and Embargoes,  What You Never Wanted to Know November, 2002 Jamie Lewis Keith, Senior Counsel Massachusetts Institute of Technology
A.  How Does An Academic Research Institution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2 B.  Not An Easily Answered Question ,[object Object]
C.  Five Key Elements To Successful Compliance Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3
D.  How To Keep It Simple 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E.  When Export Controls (EAR, ITAR, Embargoes) Do Not Apply Public Domain/Publicly Available ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],5
6 E.  When Export Controls (EAR, ITAR, Embargoes) Do Not Apply Public Domain/Publicly Available ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],E.  When Export Controls (EAR, ITAR, Embargoes) Do Not Apply Public Domain/Publicly Available 7
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],E.   When Export Controls (EAR, ITAR, Embargoes) Do Not Apply US University Fundamental Research 8
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9 E.   When Export Controls (EAR, ITAR, Embargoes) Do Not Apply US University Fundamental Research
10 ,[object Object],[object Object],[object Object],E.   When Export Controls (EAR, ITAR, Embargoes) Do Not Apply US University Fundamental Research
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],F.   When Export Controls Do or May Apply Helpful Thresholds – License Required? 11
12 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],F.   When Export Controls Do or May Apply Helpful Thresholds – License Required?
13 ,[object Object],[object Object],[object Object],4. If Exclusions Do Not Apply,  And  Equipment, Software, Information Is On USML, License Is Required  Before  Any Exposure to Foreigners In US, Even On Campus (deemed export) or Transfer or Travel Abroad ,[object Object],[object Object],[object Object],[object Object],[object Object],F.   When Export Controls Do or May Apply Helpful Thresholds – License Required?
14 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],G.   Major Truths

More Related Content

Similar to OctoberEmbargoConference51

August Presentation On Special Export Controls With References
August Presentation On Special Export Controls With ReferencesAugust Presentation On Special Export Controls With References
August Presentation On Special Export Controls With ReferencesExport Experts, LLC
 
US Export_Control_Laws_Presentationti.pptx
US Export_Control_Laws_Presentationti.pptxUS Export_Control_Laws_Presentationti.pptx
US Export_Control_Laws_Presentationti.pptx
ottaviofabbri
 
Export Control Laws Training
Export Control Laws TrainingExport Control Laws Training
Export Control Laws Training
kwaters001
 
Demystifying US Export Control Regulations for Dual-Use Technologies
Demystifying US Export Control Regulations for Dual-Use TechnologiesDemystifying US Export Control Regulations for Dual-Use Technologies
Demystifying US Export Control Regulations for Dual-Use Technologies
KTN
 
Export control training presentation
Export control training presentationExport control training presentation
Export control training presentationRichard Cirulli
 
Export-Control-and-Postgraduate-Research-Students.pdf
Export-Control-and-Postgraduate-Research-Students.pdfExport-Control-and-Postgraduate-Research-Students.pdf
Export-Control-and-Postgraduate-Research-Students.pdf
UKCGE
 
Working with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled TechnologyWorking with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled Technology
Michigan State University Research
 
2007-04-13_export_control_basics_rom_7-16-08.ppt
2007-04-13_export_control_basics_rom_7-16-08.ppt2007-04-13_export_control_basics_rom_7-16-08.ppt
2007-04-13_export_control_basics_rom_7-16-08.ppt
SoiabKhan1
 
Working with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled TechnologyWorking with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled Technology
Michigan State University Research
 
Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2
KMb Unit, York University
 
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
VMware Tanzu
 
Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3Robert Corona
 
Medical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMedical Device Advertising Law & Regulation
Medical Device Advertising Law & Regulation
Michael Swit
 
Medical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMedical Device Advertising Law & Regulation
Medical Device Advertising Law & Regulation
Michael Swit
 
ITAR Compliance and Interactions with Customers, Suppliers and Visitors
ITAR Compliance and Interactions with Customers, Suppliers and VisitorsITAR Compliance and Interactions with Customers, Suppliers and Visitors
ITAR Compliance and Interactions with Customers, Suppliers and Visitors
Linqs
 
UCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and CostsUCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and CostsStanford University
 
ITAR Boot Camp
ITAR Boot CampITAR Boot Camp
ITAR Boot Camp
Rachel Hamilton
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
Daegis
 
Export Control Overview
Export Control OverviewExport Control Overview
Export Control Overview
Jerry Bishop
 

Similar to OctoberEmbargoConference51 (20)

August Presentation On Special Export Controls With References
August Presentation On Special Export Controls With ReferencesAugust Presentation On Special Export Controls With References
August Presentation On Special Export Controls With References
 
US Export_Control_Laws_Presentationti.pptx
US Export_Control_Laws_Presentationti.pptxUS Export_Control_Laws_Presentationti.pptx
US Export_Control_Laws_Presentationti.pptx
 
Export Control Laws Training
Export Control Laws TrainingExport Control Laws Training
Export Control Laws Training
 
Demystifying US Export Control Regulations for Dual-Use Technologies
Demystifying US Export Control Regulations for Dual-Use TechnologiesDemystifying US Export Control Regulations for Dual-Use Technologies
Demystifying US Export Control Regulations for Dual-Use Technologies
 
Export control training presentation
Export control training presentationExport control training presentation
Export control training presentation
 
Export-Control-and-Postgraduate-Research-Students.pdf
Export-Control-and-Postgraduate-Research-Students.pdfExport-Control-and-Postgraduate-Research-Students.pdf
Export-Control-and-Postgraduate-Research-Students.pdf
 
Working with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled TechnologyWorking with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled Technology
 
2007-04-13_export_control_basics_rom_7-16-08.ppt
2007-04-13_export_control_basics_rom_7-16-08.ppt2007-04-13_export_control_basics_rom_7-16-08.ppt
2007-04-13_export_control_basics_rom_7-16-08.ppt
 
Working with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled TechnologyWorking with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled Technology
 
Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2
 
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
 
Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3Export Compliance ITAR 2 of 3
Export Compliance ITAR 2 of 3
 
Medical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMedical Device Advertising Law & Regulation
Medical Device Advertising Law & Regulation
 
Medical Device Advertising Law & Regulation
Medical Device Advertising Law & RegulationMedical Device Advertising Law & Regulation
Medical Device Advertising Law & Regulation
 
ITAR Compliance and Interactions with Customers, Suppliers and Visitors
ITAR Compliance and Interactions with Customers, Suppliers and VisitorsITAR Compliance and Interactions with Customers, Suppliers and Visitors
ITAR Compliance and Interactions with Customers, Suppliers and Visitors
 
UCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and CostsUCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
UCSF Life Sciences: Week 7 Devices Resources, Activities and Costs
 
ITAR Boot Camp
ITAR Boot CampITAR Boot Camp
ITAR Boot Camp
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
 
The SIU Group Brief PPP
The SIU Group Brief PPPThe SIU Group Brief PPP
The SIU Group Brief PPP
 
Export Control Overview
Export Control OverviewExport Control Overview
Export Control Overview
 

More from guest66dc5f

Os Timed Original
Os Timed OriginalOs Timed Original
Os Timed Originalguest66dc5f
 
Control your entire house with your iPhone
Control your entire house with your iPhoneControl your entire house with your iPhone
Control your entire house with your iPhoneguest66dc5f
 
Awesome car collection
Awesome car collectionAwesome car collection
Awesome car collectionguest66dc5f
 
Freaky car number plates
Freaky car number platesFreaky car number plates
Freaky car number plates
guest66dc5f
 
Sunil-Hacking_firefox
Sunil-Hacking_firefoxSunil-Hacking_firefox
Sunil-Hacking_firefoxguest66dc5f
 
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Codeguest66dc5f
 
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_WindowsChetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_Windowsguest66dc5f
 
WHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_LawWHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_Lawguest66dc5f
 
Rohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_lawsRohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_lawsguest66dc5f
 
Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2guest66dc5f
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toasterguest66dc5f
 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniquesguest66dc5f
 
Varun-Subtle_Security_flaws
Varun-Subtle_Security_flawsVarun-Subtle_Security_flaws
Varun-Subtle_Security_flawsguest66dc5f
 
longisland_golf_07
longisland_golf_07longisland_golf_07
longisland_golf_07guest66dc5f
 
GolfLakeCity_002
GolfLakeCity_002GolfLakeCity_002
GolfLakeCity_002guest66dc5f
 

More from guest66dc5f (20)

Os Timed Original
Os Timed OriginalOs Timed Original
Os Timed Original
 
Control your entire house with your iPhone
Control your entire house with your iPhoneControl your entire house with your iPhone
Control your entire house with your iPhone
 
Awesome car collection
Awesome car collectionAwesome car collection
Awesome car collection
 
Freaky car number plates
Freaky car number platesFreaky car number plates
Freaky car number plates
 
David-FPGA
David-FPGADavid-FPGA
David-FPGA
 
Sunil-Hacking_firefox
Sunil-Hacking_firefoxSunil-Hacking_firefox
Sunil-Hacking_firefox
 
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
 
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_WindowsChetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
 
WHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_LawWHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_Law
 
Rohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_lawsRohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_laws
 
David-FPGA
David-FPGADavid-FPGA
David-FPGA
 
Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2Shreeraj-Hacking_Web_2
Shreeraj-Hacking_Web_2
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toaster
 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniques
 
Varun-Subtle_Security_flaws
Varun-Subtle_Security_flawsVarun-Subtle_Security_flaws
Varun-Subtle_Security_flaws
 
CostofWarinIraq
CostofWarinIraqCostofWarinIraq
CostofWarinIraq
 
NR-golf-sept07
NR-golf-sept07NR-golf-sept07
NR-golf-sept07
 
golf
golfgolf
golf
 
longisland_golf_07
longisland_golf_07longisland_golf_07
longisland_golf_07
 
GolfLakeCity_002
GolfLakeCity_002GolfLakeCity_002
GolfLakeCity_002
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

OctoberEmbargoConference51

  • 1. NCURA Conference Export Controls and Embargoes, What You Never Wanted to Know November, 2002 Jamie Lewis Keith, Senior Counsel Massachusetts Institute of Technology
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.