iLobby® + ITAR Compliance

INTERNATIONAL TRAFFIC IN ARMS REGULATIONS (ITAR) COMPLIANCE

ITAR compliance is required for any company that provides US defense-related products, services, or technology, and it impacts any organization that manufactures, sells, or distributes these products. In order to safeguard US national security, companies need to protect and prevent the exposure of certain technical data to foreigners.

Companies are required to have an established security policy for both physical security and information security that addresses how data is stored and accessed. In addition, it requires a detailed Incident Response Plan in the event of a breach. iLobby can help you meet these requirements with our data security, physical security, and access control processes.

Here are a few of the ways iLobby® helps with your ITAR compliance, and fits into your incident response plan:

  • US-specific servers and processes ensure that processing and storage of data is restricted and prevented from being transmitted outside US borders
  • Service Level Agreements (SLAs) ensure that there are established expectations for data security and availability
  • iLobby keeps up to date with industry standards, has stringent data security measures in place, and is audited on a regular basis to ensure that it follows its established information security processes and systems internally for safeguarding sensitive information
  • Active monitoring can be performed through real-time notifications and dashboard overviews
  • Schedule automated reports such as End of Day reports that show who has been in the building and who hasn’t signed out yet
  • Automate visitor sign-in to ensure guests sign NDAs, waivers, and other legal documents upon arrival, and that the documents and digital signatures are stored securely, and available for download during audits
  • Keep a paper trail of every person who has entered and left during any given time period
  • Verify visitor identity with photo capture or ID/passport scanning
  • Visually identify guests by printing photo badges, which are color-coded to specify the reason for being on site
  • Sensitive data and personally identifiable information (PII) does not leave the iLobby environment and measures are in place to ensure the secure transmission of customer information
  • Deny access to unauthorized persons using deny lists
  • Kiosks are tamper-proof, physically locked down, and confined to the iLobby environment
Compliance@x

Compliance

iLobby already meets most compliance standards for data security and on-premise monitoring, and can be configured to meet your unique needs.

Legal@x

Legal

Automate legal documents and digital signatures for NDAs, liability waivers, and more for each visitor type. Securely store legal documents all in one place, and easily download them when you need.

Reporting@x

Reporting

Easily create or schedule custom reports with just a few clicks. Simply filter the data types and timeframe you need, and view it in the dashboard or export the information.

Aduits@x

Audits

Always be audit-ready by maintaining a full paper trail of all data and signed documents collected, and easily export what you need in order to prepare for an audit in seconds.

Discover how iLobby® can meet your compliance needs

iLobby can meet most compliance standards for data security and on-premise monitoring, and can be configured
to meet your unique needs. See what iLobby can do for your organization.