The U.S. State Department recognizes that technological advances in cybersecurity can simplify International Traffic in Arms Regulations (ITAR) compliance without compromising national security; The “end-to-end encryption carveout” allows for the exchange or sharing of unclassified defense-related technical data provided that:
- The technical data is end-to-end encrypted
- The cryptographic modules used are FIPS 140-2 compliant
- No cloud services provider has access to keys, network access codes, or passwords that enable decryption.
PreVeil’s security architecture meets these ITAR standards. Learn how PreVeil can enable your company to easily and affordably meet ITAR compliance.