Who needs SMC
G-code derived from ITAR-controlled drawings is controlled technical data. The path from CAM to controller is where most shops are exposed.
Who this is for
Aerospace manufacturers and machine shops that handle ITAR-controlled technical data — including G-code, NC programs, and manufacturing instructions derived from controlled drawings. These shops produce parts for defense and aerospace primes under ITAR obligations.
The challenge
ITAR requires demonstrable control over technical data — including manufacturing instructions derived from controlled drawings
G-code containing controlled geometry and manufacturing parameters is technical data under ITAR
No audit trail proving who accessed which programs, when, and on which machine
State Department DDTC audits of manufacturers are increasing
"Our ITAR compliance officer says we need to track every program transfer."
"We got a corrective action about data handling on the shop floor."
"We can't prove that only authorized persons accessed the controlled programs."
How SMC helps
Every G-code file is tracked from programming through machine delivery — timestamps, operator identity, and cryptographic hash at every step.
Only authorized programmers can send files to specific machines. Only authorized operators can load programs. The boundary enforces the access policy.
Exportable compliance reports showing every transfer, every access, and every change — organized and ready if a DDTC review occurs.
Technical data is encrypted from programmer workstation to CNC controller. Files are decrypted only in RAM at the point of use.
See how SMC provides the chain of custody and access control ITAR requires.