BIS 50% Related Parties Dataset and Screening
Prepare for the BIS Affiliates Rule with ownership-based screening and related-party intelligence built for high-volume compliance workflows.
Rule status
Stayed until Nov. 9, 2026. Reimposition is scheduled for Nov. 10, 2026 unless BIS acts again.
Why compliance teams care
The BIS 50% problem is not only a list-screening problem. It is an ownership and related-party discovery problem.
Ownership-based exposure
Relevant risk may sit behind subsidiaries, affiliates, and intermediaries rather than on a named list.
Manual review does not scale
Investigating large customer, vendor, or supplier populations one name at a time is slow and expensive.
Coverage gaps are common
Standard screening tools may not capture all BIS-related parties or ownership-linked entities.
What Threat.Digital provides
A focused BIS 50% data and screening layer for teams that need coverage without replacing their existing compliance stack.
BIS-related party dataset
- Related parties linked to BIS Entity List and MEU seed entities
- Ownership, control, and affiliate relationships
- Structured party and relationship exports
- Refreshable data as ownership structures change
High-volume standalone screening
- Screen customers, vendors, suppliers, and counterparties at scale
- Use it alongside your existing screening provider
- Targeted BIS 50% coverage without replacing your current stack
- Reasonable-cost batch screening for large populations
How the dataset is built
Threat.Digital starts from BIS-relevant seed entities, expands ownership and control networks through automated open-source research, and converts findings into structured data for screening and review.
Read the technical postSeed list expansion
Start from BIS Entity List and MEU seed entities, then map related ownership and control networks.
Relationship extraction
Extract ownership, control, affiliate, intermediary, and related-party connections into a structured ontology.
Entity-resolution QA
Review candidate linkages to reduce bad merges, weak matches, and confusion between similarly named entities.
Workflow-ready outputs
Deliver party files, relationship files, screening results, API outputs, and optional network graphs.
Designed for practical compliance workflows
Use the service for pre-rule exposure review, batch screening, third-party risk triage, and targeted gap coverage.
Exposure assessment
Screen counterparties before the rule returns to understand potential ownership-linked exposure.
Third-party screening
Evaluate customers, vendors, suppliers, portfolio companies, and other counterparties.
Provider gap coverage
Add focused BIS 50% coverage alongside your existing denied-party or sanctions platform.
EDD triage
Prioritize deeper review based on matched entities, relationship context, and source-linked evidence.
Test your population against BIS-related-party data.
Use Threat.Digital as a dedicated BIS 50% screening layer, even if you already use another provider.