We are experiencing technical difficulties with the Commission’s DropBox application. We are using the secure Box application for you to upload your questionnaires and investigation-related documents. Please select the "Upload Files" link for the Investigation you are responding to.


Investigation Title Investigation # Questionnaire Box
Adequacy Phase Reviews Use the following link to submit your response to the Adequacy Purchaser Questionnaire Upload Files
All Responses to Notices of Institutions for 5 year reviews Upload Files
Brass Rod from Brazil, India, Israel, Mexico, South Africa, and South Korea 701-TA-686-688 and 731-TA-1612-1617 (Final) Upload Files
Frozen Warmwater Shrimp from Ecuador, India, Indonesia, and Vietnam 701-TA-699-702 and 731-TA-1659-1660 (Final) Upload Files
Lost Sales-Lost Revenues Upload Files

If you do not see the Investigation you are looking for, please contact the Investigator on your questionnaire for additional instructions.


You are accessing a U.S. government information system, which includes (1) this U.S. government computer network, (2) all U.S. government computers connected to this network, and (3) all U.S. government devices and storage media attached to this network or to a U.S. government computer on this network. This information system is provided for the following U.S. government-authorized use only: to provide questionnaire responses, follow-up submissions, and other information to the U.S. International Trade Commission.

Unauthorized or improper use of this system is prohibited and may result in civil and criminal penalties.

By using this information system, you understand and consent to the following:

  • The U.S. government, acting directly or through its contractors, routinely monitors communications occurring on this information system for traffic indicating known or suspected malicious cyber activity. Use of this information system constitutes consent to monitoring for such cybersecurity purposes only.
  • For the sole purpose of detecting, preventing, analyzing, investigating, responding to, and reporting on known or suspected malicious cyber activity, at any time, the U.S. government – acting directly or through its contractors – may monitor, intercept, record, audit, search, seize, use, and disclose to other U.S. government entities any communication or information stored on, transmitted or traveling to or from, or transiting this information system.

By clicking the links above, you acknowledge and agree to this disclaimer.