Three Ways EAR Exposure Hides in Plain Sight
You know EAR applies broadly, but here's where most companies discover — too late — that they've been in violation all along:
EAR Penalties Are No Longer "Manageable"
For years, EAR penalties were modest compared to other regulatory regimes. That era is over. BIS has removed penalty caps, hired its first Chief of Corporate Enforcement, and is applying the "high probability" knowledge standard; meaning you can be held liable even without actual knowledge of violations.
Enforcement Isn't Hypothetical
Real companies. Real penalties. Real consequences.
File-Level Enforcement for EAR-Controlled Data
Theodosian's data-centric architecture protects controlled technical data at the source. Instead of relying on network perimeters or user training to prevent violations, every file enforces its own access policy - regardless of where it travels.
Policies and Training Can't Prevent Violations - Technical Enforcement Can
The "status quo" approach to EAR compliance relies on people doing the right thing. But policies don't encrypt files, and training doesn't stop an engineer from sharing a controlled design with a foreign colleague over chat. Here's what actually happens - with and without technical enforcement at the file level.
Theodosian Directly Supports Your EAR Compliance Program
The EAR contains specific provisions that demand technical controls most organizations currently lack. Theodosian provides the enforcement layer that turns your compliance policies into verifiable, auditable controls.
EAR Compliance That Deploys in Weeks, Not Months
While other organizations spend months assembling separate encryption, access control, and audit tools to build an export control program, Theodosian deploys in days with no data migration and no workflow disruption.
Also Subject to ITAR?
Many organizations handle both EAR-controlled dual-use items and ITAR-controlled defense articles. Theodosian enforces both regimes from a single platform - same encryption, same access policies, same audit trail. One solution for your entire export control program.
See our ITAR Compliance SolutionSee How Theodosian Makes EAR Compliance Enforceable
Book a technical deep-dive to see file-level export control enforcement in action, or start a 2-week proof of concept in your environment.
If your company develops, manufactures, or distributes technology, software, or products that have both commercial and potential military or national security applications, the EAR likely applies to you.
This includes semiconductors, encryption software, advanced sensors, telecommunications equipment, AI/ML models, specialty chemicals, and much more.
The Commerce Control List (CCL) covers 10 broad categories. Even items not on the CCL (classified as EAR99) are still subject to the EAR and may require a license depending on the destination, end-user, or end-use. When in doubt, consult with an export compliance professional or contact BIS directly.
A "deemed export" occurs when controlled technology or source code is released to a foreign national in the United States. Under the EAR, this is legally treated the same as physically shipping the item to that person's home country. If your engineering team includes foreign nationals who have access to controlled technical data - through shared drives, repositories, email, or even verbal discussions - you may be making unlicensed deemed exports without realizing it. Theodosian helps prevent this by enforcing access policies that evaluate the user's citizenship and authorization status before granting access to controlled files.
EAR § 734.18 provides that storing encrypted technical data in the cloud is not an "export" if the encryption meets certain standards and decryption keys aren't shared with foreign persons. Theodosian uses FIPS 140-3 validated AES-256 encryption on a per-file basis, with a zero-knowledge key management architecture. This means your cloud provider cannot decrypt your files, and decryption keys are never shared with unauthorized parties. This directly supports the encryption safe harbor, allowing you to use commercial cloud storage (SharePoint, Google Drive, Dropbox, etc.) for EAR-controlled data with confidence.
Absolutely! In fact, this is one of Theodosian's most valuable capabilities for EAR compliance. You can define file-level access policies that evaluate user attributes, including citizenship, residency status, and export license status. Authorized employees access files normally. When a foreign national attempts to access a file that would require an export license they don't have, the file remains encrypted and access is denied automatically. The attempt is logged for your records. This lets you maintain a diverse, global workforce while ensuring compliance at every file interaction.
ITAR (International Traffic in Arms Regulations) covers defense articles and services on the U.S. Munitions List, administered by the State Department. EAR covers commercial and dual-use items on the Commerce Control List, administered by the Commerce Department's Bureau of Industry and Security (BIS). Items can't fall under both simultaneously, but many organizations - especially in aerospace, technology, and advanced manufacturing - handle items subject to both regimes. Theodosian enforces both from a single platform: same encryption, same policy engine, same audit trail. You don't need separate tools for each regulation.
No. Theodosian connects to your existing SharePoint, Google Drive, Dropbox, network drives, and endpoints via API. There's no data migration required, no cloud platform change, and no workflow disruption. Protection is applied where your data already lives. Most organizations are operational within 2–3 weeks.
Yes. Theodosian logs access attempts with full context: user identity, nationality, application, device, location, timestamp, and policy outcome. You can generate compliance reports showing exactly who accessed controlled data, when, from where, and whether the access was properly authorized. This meets EAR Part 762 recordkeeping requirements (5-year retention) and provides the kind of evidence that demonstrates a robust, functioning export control program - not just a paper policy.
Theodosian treats AI systems as non-human identities subject to the same access policies as human users. You can block all AI tools from accessing controlled files, or selectively authorize trusted AI providers (such as an on-premises model or approved enterprise copilot) to access specific, non-controlled datasets. This is increasingly important as AI copilots and agents gain access to corporate repositories where controlled data may reside.