Protecting sensitive customer information is a priority at Rösler whether in the form of intellectual property, proprietary manufacturing designs, or non-disclosure agreements. When it comes to matters of security and safety, we’ve gone a step further to create International Traffic in Arms Regulations (ITAR) Compliance Programs. In addition to delivering industry-leading mass finishing and shot blasting equipment, consumables, and service, Rösler’s expertise includes discrete handling of customer information in all industries, including aerospace and defense.
What is ITAR?
Administered by the U.S. Department of State, the legislation that created ITAR regulates the import and export of defense and military-related technologies. Its intent is to prevent foreign access to technologies included in the United States Munitions List (USML) by controlling access to the technology itself and associated data.
All companies and organizations involved with manufacturing, exporting, or furnishing defense articles and services – including second- and third-tier suppliers – are required to register with the Directorate of Defense Trade Controls (DDTC) and comply with ITAR regulations.
What does compliance entail?
Compliance requires companies to identify what data ITAR pertains to and who has access to it, where the information is stored, and be able to track its security.
In transferring this data, companies must also record information regarding whom the information is being transferred to as well as anticipated future transfers.
ITAR at Rosler
As a provider to aerospace, defense, and similar industries, Rösler US is committed to complying with ITAR regulations.
We have taken the appropriate steps to achieve ITAR compliance, including:
- Registering with the State Department, specifically the DDTC.
- Creating ITAR Compliance Programs and developing a well-fleshed-out approach to managing process issues.
- Acquiring U.S.-based, ITAR-compliant cloud storage.
From our Customer Experience Center (CEC) and engineering department to our assembly and logistics divisions, we ensure that our customers’ technologies and associated data are protected.
Our CEC features state-of-the-art safeguards for data and parts, company-wide knowledge of lockdown protocols, and independent communication channels. All of these measures prevent the unauthorized export of controlled information.
Throughout our building, safety and validation points exist to prevent unauthorized access to areas where parts and data are stored and processed. This includes customer receiving areas, logistics, and assembly bays; protections are developed and on deck for each transference of technology.