← All posts

ITAR Requirements for Employees: Access Control for Small Defense Contractors

A small defense contractor wins a program on Monday. By Tuesday, someone asks a simple question that changes the tone of the whole project: who on the team can see the drawings, specs, and test files?

That is usually the moment ITAR stops feeling like a legal issue and starts feeling operational. It affects hiring, onboarding, file permissions, visitor handling, remote work, subcontractors, and the evidence a CMMC assessor will look for when asking how controlled data is protected.

Small and mid-sized contractors often overcomplicate this at first. The rules are serious, but the path is manageable if personnel controls are treated as part of program execution rather than as a side task for legal or HR. Most problems start when firms assume ITAR is only about shipping hardware overseas. It is not. It also governs who can access defense-related technical data, including access that happens entirely inside the United States.

The practical question is never whether a contractor cares about compliance. It is whether employees, managers, and systems make the right access decision every day.

The new contract and the ITAR wake-up call

A new program manager at a small defense firm usually inherits two realities at once. The first is exciting: funded work, customer expectations, a chance to grow the business. The second is less glamorous: the contract may involve defense articles or technical data tied to the United States Munitions List (USML), which means employee access cannot be handled casually.

If the team is preparing for CMMC Level 2, that wake-up call gets louder. Assessors do not just want to hear that the company “takes security seriously.” They want to see who has access, why they have access, how everyone else is restricted, how employees are trained, and how all of it is proven with records. The broader Level 2 program context is covered in CMMC Level 2 requirements for small contractors.

Where small contractors usually stumble

The mistakes are predictable:

  • HR hires before compliance reviews. Someone starts work, gets a mailbox, and receives engineering files before anyone verifies eligibility.
  • IT grants broad access. Shared drives and collaboration tools are set up for convenience, not least privilege.
  • Program teams treat technical data like ordinary business data. Drawings, plans, software, and test information move through normal email or shared folders without clear markings.
  • Leaders rely on assumptions. People assume a long-time employee, dual national, subcontractor, or remote worker is “probably fine” without documented review.

Those issues do not come from bad intent. They come from weak process design. If access decisions live in people’s heads instead of in a documented workflow, the ITAR exposure is already higher than it looks.

What works in practice

At a small firm, the best approach is simple and disciplined:

  1. Classify the work early. Know whether the program involves ITAR-controlled data.
  2. Identify every role that needs access. Engineers, quality staff, project managers, admins, IT staff, and outside support all count if they can touch the data.
  3. Verify status before access is granted. Not after.
  4. Restrict systems by default. Access should be approved, not inherited.
  5. Tie everything to the CMMC evidence trail. If it cannot be shown in training records, access logs, policies, or onboarding files, assume an assessor will treat it as incomplete.

This is the mindset behind effective ITAR requirements for employees. The employee is not just a risk to manage. The employee is one of the primary control points. Built correctly, the workforce becomes part of the compliance solution.

The core ITAR rule: U.S. persons vs foreign persons

Everything in employee ITAR compliance starts with one distinction: U.S. person versus foreign person.

Under ITAR, access to defense articles and technical data on the USML is limited to U.S. persons. The term includes U.S. citizens, permanent residents, protected persons under 8 U.S.C. §1324b(a)(3), and certain U.S.-incorporated entities or government employees. Foreign persons require a specific export license for access, even when the access happens inside the United States, which ITAR treats as a deemed export. Noncompliance can carry civil fines up to $500,000 per violation, criminal fines up to $1 million, and up to 10 years of imprisonment per violation. The 2018 FLIR Systems settlement, which included $30 million in civil penalties for transferring USML data to dual-national employees without authorization, remains a widely cited reminder that enforcement is real.

Why this distinction drives everything else

Program managers often think of exports as boxes crossing borders. ITAR is broader. If a foreign person inside the office, on the VPN, or on a project call can access controlled technical data without authorization, the law can treat the exposure as an export event. That is why employee screening is not an HR formality. It is a core export control function.

SituationITAR concern
Engineer opens a controlled drawing in a conference roomWho else can see it
Shared folder includes controlled filesWho has permission to enter the folder
Remote user logs in from homeWhether access is authorized and monitored
IT admin supports the platformWhether that admin can view or retrieve controlled data

The question is always the same: did an authorized person access the controlled data, and can the company prove the answer?

The deemed export problem

“Deemed export” trips up new teams because it sounds abstract. In practice, it is straightforward. If ITAR-controlled data is exposed to a foreign person without the required authorization, the government can treat that exposure as though the data was exported. That can happen through:

  • Visible documents left in work areas
  • Misrouted email with attachments
  • Broad file-share permissions
  • Screen sharing during meetings
  • Unreviewed subcontractor access
  • Admin-level system access with no nationality control

Most ITAR employee mistakes do not start with malicious conduct. They start with ordinary business convenience applied to regulated data.

The operational takeaway

If only one rule sticks, this one should: eligibility must be decided before access is possible. Not after the account is created. Not after the kickoff call. Not after a subcontractor signs an NDA. Before access. That single discipline is the foundation for hiring, onboarding, access control, remote work, and CMMC readiness.

ITAR controls for hiring and onboarding

Hiring is where many small contractors create legal risk in two directions at once. They either fail to screen for access eligibility, or they screen clumsily and create discrimination exposure.

The tension is real. Employers cannot use ITAR as a blanket excuse for national origin discrimination. The DOJ and Office of Special Counsel have made clear that companies must consider obtaining export licenses for qualified foreign nationals rather than excluding them outright. Many small contractors create unnecessary litigation risk when they default to broad U.S.-only policies because licensing seems complicated.

What not to do

Weak hiring processes usually sound like one of these:

  • “We only hire U.S. citizens for defense work.”
  • “HR will figure it out after the offer.”
  • “Everyone on this program needs full access anyway.”

The first can create employment law exposure. The second creates preventable access mistakes. The third destroys least privilege before the program even starts.

A workable hiring workflow

Use a role-based process instead of a blanket restriction.

During requisition planning. Decide whether the role actually requires ITAR access. Many jobs support a defense program without needing access to controlled technical data. Segregating duties is often the cleanest answer.

During recruiting and interviews. Ask job-relevant eligibility questions tied to access requirements, not broad national origin questions. The goal is to determine whether the candidate can lawfully access the required data for the position.

Before the start date. Complete the access review before provisioning systems. That review should cover:

  • Employee eligibility. Is the person a U.S. person, or will authorization be required?
  • Role scope. Exactly which systems and data sets the role needs.
  • License path if needed. If a qualified foreign national is a strong fit, assess whether an export license is appropriate instead of rejecting the candidate by default.
  • Documentation. Preserve the record showing why access was or was not granted.

A compliant hiring process does not ask, “Can we keep this person out?” It asks, “What access does this role require, and what lawful path supports that access?”

Onboarding controls that actually help

Once the candidate is hired, onboarding should be staged.

  • Train first. The employee should understand controlled data handling before receiving any.
  • Provision narrowly. Grant access only to approved repositories and tools.
  • Tag the employee correctly in systems. HR status, compliance approval, and system access should line up.
  • Capture acknowledgments. Policy acknowledgment matters when the company later needs to show that employees were informed.
  • Coordinate with program management. Managers should know what the employee can and cannot access from day one.

In a CMMC environment, employee onboarding intersects directly with access control, auditability, and documented policy enforcement. Good onboarding does not slow a contract down. It prevents rework, exposure, and ugly remediation later. For the written-policy layer that sits above onboarding, see CMMC Level 2 access control policies.

Daily responsibilities for handling technical data

Most employee ITAR failures happen in ordinary moments. Someone sends the wrong attachment. A drawing sits in an unrestricted folder. A meeting screen share includes a tab that should not be visible. None of that feels dramatic at the time. It still matters.

ITAR-controlled technical data covers information required for the design, development, production, manufacture, assembly, operation, repair, testing, maintenance, or modification of defense articles. A Technology Control Plan (TCP) should govern how the company manages that data through controls such as role-based access, multi-factor authentication, granular file permissions, and regular vulnerability scanning.

What counts as technical data in real life

Employees often miss technical data because they picture only formal engineering drawings. In practice the category is wider:

  • Blueprints and drawings
  • Design notes and specifications
  • Manufacturing instructions
  • Test plans and test results
  • Repair or maintenance procedures
  • Photos tied to controlled design or production details
  • Software or files used to support controlled defense work
  • Emails or chat messages discussing controlled technical content

If the company also handles regulated but non-ITAR material, understanding how technical data overlaps with broader categories of protected information such as Controlled Unclassified Information helps avoid treating similar data inconsistently.

The digital clean room mindset

The easiest way to train employees is to treat controlled technical data like a digital clean room. If the room is not approved, the data does not enter. If the person is not approved, they do not enter. That translates into daily behavior:

  • Mark files clearly. Use the company’s required notices and naming conventions so employees can identify controlled material quickly.
  • Store only in approved locations. Do not copy files to personal drives, unsanctioned cloud apps, or convenience folders.
  • Share by permission, not by attachment habit. The easiest workflow is not always the compliant one.
  • Check recipients every time. Internal email mistakes still count if unauthorized people can access the data.
  • Keep screens and printouts controlled. Physical visibility is still access.

If a file would not be left open on a monitor in the lobby, it should not be left in a broadly accessible folder either.

What a good TCP feels like to employees

A strong Technology Control Plan is not a binder on a shelf. Employees should feel it in their workflow. A useful TCP answers practical questions:

Daily taskWhat the employee should know
Uploading a fileWhich repository is approved
Creating a project folderWho can be added and who cannot
Inviting someone to a meetingWhether they are authorized for the material discussed
Sending data outside the companyWhether export review is required first
Printing documentsWhere they can be stored and who may see them

If the TCP is too vague to answer those questions, employees will improvise. Improvisation is where violations begin.

A lot of ITAR issues do not happen in the engineering lab. They happen at the front desk, in airports, and in home offices. A visitor arrives for a facility tour. A project lead travels overseas with a company laptop. A remote employee logs in from a location nobody verified. Each situation feels routine until someone asks whether controlled data was exposed.

Visitors inside the facility

Consider a common scene. A foreign national vendor visits the office for a non-technical meeting. The meeting itself is fine, but the route to the conference room passes monitors showing design files, a whiteboard with production notes, and an open workbench binder. That is an avoidable problem.

Visitor control needs habits that are hard to bypass:

  • Pre-approve visits. Know who is coming and why.
  • Limit the route. Do not walk visitors through controlled work areas without a reason.
  • Escort consistently. An escort is not symbolic. The escort is there to prevent access.
  • Clear the environment. Screens, papers, whiteboards, prototypes, and badges all matter.
  • Keep logs. If someone later asks who entered a space and when, an answer has to exist.

Travel with devices and data

Another familiar scenario is the employee who says, “I’m just taking my normal laptop on the trip.” That can become an export control issue fast if the device contains ITAR-controlled data or can connect to it from abroad. International travel involving company systems should be reviewed in advance. The safe approach is to travel with only what is authorized, on devices configured for the trip, with clear restrictions on what can be accessed, downloaded, or discussed. The bad pattern is casual carryover from domestic work habits.

Remote work is a real ITAR control problem

Remote access is where many small contractors are most exposed. The 2021 update to the “regular employee” definition allows certain foreign nationals from allied countries to be bona fide employees, but remote work still requires real controls: geofencing or location verification, continuous nationality verification, auditable access through U.S.-only data residency platforms, and limits on local storage.

Remote work is not just an IT convenience issue. It is a location, identity, and monitoring issue. Remote access without location control is not really controlled access. A practical remote work checklist for a small contractor:

  • Verify where the employee is working from
  • Restrict access by role and approved device
  • Use auditable systems
  • Prevent uncontrolled local storage or forwarding
  • Review dual-national and foreign national access conditions carefully
  • Train managers not to approve exceptions informally

If the remote work process depends on trust alone, it will not hold up under scrutiny.

Reporting violations and understanding consequences

Every ITAR program eventually faces a moment of uncertainty. Someone copied the wrong recipient. A visitor entered the wrong area. An employee realizes a file may have been exposed to someone without authorization. What happens next matters as much as the original mistake. A weak culture tells employees to stay quiet unless they are certain. A strong culture tells them to report fast, preserve facts, and let the company investigate.

Why silence makes things worse

A documented Internal Compliance Program with annual training and clear reporting procedures is essential. Enforcement experience shows that many ITAR violations stem from insider threats or accidental foreign person access, often made worse when people fail to report. A strong program with management support and clear marking policies is a recognized mitigating factor during enforcement. The practical lesson is simple: delay destroys options.

If an employee reports quickly, the company can contain the exposure, review access logs, preserve evidence, assess whether data was accessed, determine whether disclosure obligations exist, and document corrective action. If the employee hides it, guesses, or tries to “fix” it quietly, the facts get harder to reconstruct.

What employees should report immediately

Employees should report more than obvious data leaks. They should also report near misses and suspicious situations:

  • An unauthorized person appears to have seen controlled data
  • A file was sent to the wrong recipient
  • A collaboration folder has overly broad permissions
  • A visitor was unescorted near controlled work
  • A remote employee accessed data from an unapproved location
  • A subcontractor requests access outside the agreed process

If cyber exposure may be involved, the response process should also align with DFARS 72-hour cyber incident reporting. A company can work with a mistake reported in time. It cannot work well with missing facts and delayed notice.

Consequences are real, but reporting still helps

Employees sometimes avoid reporting because they fear discipline. That fear is understandable, but hiding a problem usually creates more risk for both the employee and the company. A no-blame culture does not mean there are never consequences. It means the company distinguishes between an honest error reported quickly, careless behavior, repeated noncompliance, and deliberate concealment. The best firms train employees to escalate first and explain second.

An ITAR checklist for CMMC audits

When a small contractor gets ready for a CMMC assessment, a common mistake is treating ITAR and NIST 800-171 as separate worlds. They overlap heavily in practice. Personnel eligibility, least privilege, audit logging, controlled storage, and training all show up in both conversations. For the security framework context, see what NIST 800-171 requires.

  • Verify personnel classification. Maintain records showing which users are U.S. persons and which require additional review or authorization. HR, compliance, and IT should use the same decision record.
  • Map access to role. Review which jobs need access to controlled technical data. Remove inherited access from shared drives, admin groups, and legacy collaboration spaces.
  • Tie onboarding to approval gates. Do not issue system access until eligibility review, training, and manager approval are complete. Confirm offboarding also removes access promptly.
  • Document the Technology Control Plan. The TCP should reflect actual systems, actual repositories, and actual employee workflows. If staff cannot follow it in daily work, the document is not doing its job.
  • Enforce technical controls. Use MFA, role-based access, granular permissions, and logging where controlled data resides. Review administrative access separately from normal user access.
  • Maintain training evidence. Keep records of annual training, policy acknowledgment, and any role-specific instruction for employees handling controlled data. Managers should receive additional guidance on approvals, visitors, and reporting.
  • Control physical and remote access. Visitor logs, escort procedures, remote access restrictions, and location controls should align with the written policy. Validate that remote work arrangements match what the compliance documents claim.

What assessors usually care about

C3PAOs and internal reviewers tend to focus on consistency. They look for whether the story holds together across systems and records. A useful self-test: pull one employee file and walk through this.

Evidence questionWhat should exist
Why does this person have accessRole definition and approval
Was the person trainedTraining record and acknowledgment
What can the person accessCurrent system permissions
Is access monitoredAudit logs
Could the company reconstruct events laterRetained records and incident procedures

If those questions can be answered cleanly for a sample of users, the contractor is in much better shape than a company with polished policy language and messy execution.

Want the broader CMMC view alongside the ITAR controls above? Get the free CMMC Level 2 readiness checklist. 30 items across 11 control families, with what a C3PAO expects to see for each one.

Common ITAR employee questions

Is a dual citizen automatically disqualified as a U.S. person?

No. Dual citizenship does not automatically disqualify someone. The key issue is whether the person meets the applicable ITAR definition of a U.S. person or whether additional authorization is required for the access involved. Managers should not make that call casually. Compliance and legal review should determine the status and any conditions before access is granted.

What is the practical difference between ITAR and EAR?

For employees, the practical difference is that ITAR applies to defense articles and related technical data on the USML, while EAR governs many dual-use items and technologies under a different export control structure. The daily handling disciplines can look similar, but a single project being export-controlled does not mean every project follows the same rule set. Program managers need item classification and scope clarity early.

Can a company get in trouble for a subcontractor’s employee mistake?

Yes. ITAR obligations flow down through the supply chain. If a subcontractor handles controlled data for a program, the risk does not disappear because another company touched it. Contract language, access boundaries, due diligence, and a clear process for how subcontractor personnel are screened, approved, trained, and monitored are all required. Subcontractor access reviews deserve the same seriousness as internal employee reviews, and often more skepticism, because prime contractors usually have less visibility into subcontractor day-to-day practices.

Does remote work with U.S. cloud services automatically satisfy ITAR?

No. U.S.-hosted infrastructure is necessary but not sufficient. Remote access still requires location verification, identity controls, restrictions on local storage, and monitoring. A cloud service headquartered in the U.S. does not by itself prove that a particular remote session was an authorized access by an eligible person from an approved location.

Get the CMMC Level 2 readiness checklist

30 items across 11 control families, with what a C3PAO expects to see for each one. Subscribers also lock in founding member pricing when IRONKEEP launches.