
The 50 Percent Rule in Export Controls: A Plain-English Guide
Understand the 50 percent rule with practical ownership calculations, common pitfalls, and how ownership risk should influence visitor screening decisions.
Updated February 2026 · 10-minute read

Visitor screening has moved from a front-desk task to a core export-compliance control. If your facility handles defense articles or technical data, your visitor process is part of your risk surface. Look at what auditors and investigators expect to see in 2026.
ITAR does not publish a single section titled "visitor requirements." Instead, visitor obligations are operationalized from multiple provisions in 22 CFR Parts 120-130. The practical question is whether a visitor can gain access to controlled defense articles or technical data without authorization. If the answer is yes, your visitor program is part of your export-control boundary.
Compliance teams typically start with definitional scope in Part 120, then map licensing and authorization responsibilities across the remaining sections. In physical facilities, that means front-desk controls, escort logic, zone restrictions, and evidence collection must align with export rules, not only building security policy.
Note: Most defense organizations also run EAR controls in parallel. EAR Part 744 denied-party and end-use restrictions are often integrated into the same visitor flow, especially when facilities support mixed programs.
Modern teams treat visitor check-in as a compliance workflow with legal consequences, not a receptionist checklist.
Screening must happen before access, not after entry. Names are screened against OFAC, BIS, and other sources during pre-registration and revalidated at check-in. The best practice is storing the exact list snapshot used for the decision.
These checks are foundational for visitor routing and authorization logic. Programs with foreign-national traffic apply additional review steps and explicit zone constraints. Incomplete identity data must trigger a review rather than a default approval.
Visitor policy must map directly to physical enforcement. Badge type, zone permissions, escort requirements, and sponsor responsibility should be programmatic outputs from screening decisions, not ad hoc human memory.
A compliant process is only as strong as its records. Keep logs of who was screened, what data was used, who approved, and what access was granted. Time-stamped logs with tamper evidence are standard expectations.
Every organization needs explicit playbooks for foreign-national visits involving controlled work: who is notified, what is documented, conditions, and exception protocols. Ambiguity is a frequent source of risk.
Enforcement history consistently shows process breakdowns, not just one-time bad intent. DDTC consent agreements and administrative outcomes frequently cite control failures such as weak access restrictions, poor screening evidence, and incomplete records.
A common failure mode is "paper compliance": the organization has written policies, but front-desk behavior and retained evidence do not match.
High-performing teams map each regulatory expectation to a concrete system action, owner, and evidence artifact. A practical control matrix answers: What triggers it? Who owns it? How is it enforced? What evidence is kept?
| Control Domain | Operational Rule | Evidence Artifact | Owner |
|---|---|---|---|
| Denied-party screening | Pre-screen and check-in rescreen before badge activation | List version + screening result + timestamp | Compliance ops |
| Identity & nationality | Verify identity attributes before zone assignment | Identity log + reviewer action | Front desk + sponsor |
| Access & escort | Zone restrictions enforced from decision state | Badge profile + zone history | Security team |
| Exception handling | No override without approver identity and rationale | Exception record + approver signature | FSO / Export lead |
| Record retention | Immutable log retention per policy and legal hold needs | Hash-verifiable audit export | Governance |
Start with our ITAR Visitor Management System and map your current controls against our four-step automated workflow.
Explore ITAR WorkflowsGet weekly insights on sanctions, export controls, and visitor compliance delivered to your inbox.
No spam. Unsubscribe anytime.
Related posts
More guidance on sanctions, export controls, and visitor management for regulated facilities.

Understand the 50 percent rule with practical ownership calculations, common pitfalls, and how ownership risk should influence visitor screening decisions.

Use our BIS 50 rule calculator to check aggregate ownership, find hidden subsidiaries, and flag minority ownership red flags for Entity List and MEU risk.
Stop calculating BIS 50% rule ownership in spreadsheets. Get sub-second aggregation results, full ownership chain visibility, and timestamped evidence packs. Join the beta.