We strongly recommend using ITS-Managed services to implement IT controls specific to your sensitive data requirements.  The guidelines outlined in this webpage are for researchers who have elected to use ITS-Managed services to safeguard export-controlled data. If you choose not to use ITS-Managed services, you will be responsible for ensuring that the requirements listed in the Safeguarding Export-Controlled Technical Data for System Administrators article are met, as well as the requirements listed on this webpage should your contract require this level of security.

Access Controls

  • Do not access export-controlled information from shared, public computers such as kiosk-type computers in libraries, hotels, and business centers, or from computers that have no local access control.

  • Do not post export-controlled information on public websites or websites that rely solely on IP addresses for access control.  Instead, secure access using individually-assigned accounts requiring username/password, user certificates, or other user-specific authentication methods.

  • Protect export-controlled information by at least one physical and one logical barrier (e.g. locked container or room and login and password) when not under direct individual control.

  • Only persons listed in the TCP should have access to the Export-Controlled data.

System Management

  • User-managed devices (as specified in the IT Security Plan) must also adhere to the guidelines and must be available as needed or on schedules to OneIT staff for log analysis/offload, patch assurance, and system vetting.

Transmission of ITAR covered data

  • Do not transmit or email Controlled Information unencrypted. An alternative to email is to put the files in a secure location (e.g. SFTP site) and send an authenticated link in a message to whomever needs access to the file (as specified in the TCP).

  • Wireless network access to Controlled Information must be encrypted using, e.g., WPA2 Enterprise wireless network encryption (Eduroam) or VPN (vpn.uiowa.edu).

  • Transfer controlled information only to subcontractors and collaborators listed in the TCP.

*Please note, before sharing export-controlled data, please contact the Export Control staff.  Export Control will review the contractual language to ensure sharing is allowed.


  • The data must be stored on a University-owned and managed single-user laptop device using whole disk encryption (e.g. FileVault2 for Mac, BitLocker for Windows, LUKS for Linux) with a unique decryption passphrase known only to the device's authorized primary user.

*For more detailed information about using laptops for Export-Controlled data, please refer to the Laptop section of Safeguarding Export-Controlled Technical Data for System Administrators.

Storing ITAR covered data

  • Export-controlled data is stored only on devices listed in the IT Security Plan.

  • If the export-controlled data cannot be encrypted at rest using an electronic barrier, a physical barrier must be implemented (e.g. locked rack, storage safe, etc.).

Please visit DSP Export Control webpage or reach out to export-control@uiowa.edu for more information on Export Control regulations. Questions about technical implementations that support ITAR/EAR compliance can be sent to research-computing@uiowa.edu.

Article number: 
Last updated: 
May 11, 2023