Export-control readiness

BIS 50% Related Parties Dataset and Screening

Prepare for the BIS Affiliates Rule with ownership-based screening and related-party intelligence built for high-volume compliance workflows.

Rule status

Stayed until Nov. 9, 2026. Reimposition is scheduled for Nov. 10, 2026 unless BIS acts again.

Threat.Digital network relationship graph for related-party risk discovery

Why compliance teams care

The BIS 50% problem is not only a list-screening problem. It is an ownership and related-party discovery problem.

Ownership-based exposure

Relevant risk may sit behind subsidiaries, affiliates, and intermediaries rather than on a named list.

Manual review does not scale

Investigating large customer, vendor, or supplier populations one name at a time is slow and expensive.

Coverage gaps are common

Standard screening tools may not capture all BIS-related parties or ownership-linked entities.

What Threat.Digital provides

A focused BIS 50% data and screening layer for teams that need coverage without replacing their existing compliance stack.

BIS-related party dataset

  • Related parties linked to BIS Entity List and MEU seed entities
  • Ownership, control, and affiliate relationships
  • Structured party and relationship exports
  • Refreshable data as ownership structures change

High-volume standalone screening

  • Screen customers, vendors, suppliers, and counterparties at scale
  • Use it alongside your existing screening provider
  • Targeted BIS 50% coverage without replacing your current stack
  • Reasonable-cost batch screening for large populations

How the dataset is built

Threat.Digital starts from BIS-relevant seed entities, expands ownership and control networks through automated open-source research, and converts findings into structured data for screening and review.

Read the technical post

Seed list expansion

Start from BIS Entity List and MEU seed entities, then map related ownership and control networks.

Relationship extraction

Extract ownership, control, affiliate, intermediary, and related-party connections into a structured ontology.

Entity-resolution QA

Review candidate linkages to reduce bad merges, weak matches, and confusion between similarly named entities.

Workflow-ready outputs

Deliver party files, relationship files, screening results, API outputs, and optional network graphs.

Designed for practical compliance workflows

Use the service for pre-rule exposure review, batch screening, third-party risk triage, and targeted gap coverage.

Exposure assessment

Screen counterparties before the rule returns to understand potential ownership-linked exposure.

Third-party screening

Evaluate customers, vendors, suppliers, portfolio companies, and other counterparties.

Provider gap coverage

Add focused BIS 50% coverage alongside your existing denied-party or sanctions platform.

EDD triage

Prioritize deeper review based on matched entities, relationship context, and source-linked evidence.

Test your population against BIS-related-party data.

Use Threat.Digital as a dedicated BIS 50% screening layer, even if you already use another provider.