96-31583. Licensing of Key Escrow Encryption Equipment and Software  

  • [Federal Register Volume 61, Number 241 (Friday, December 13, 1996)]
    [Rules and Regulations]
    [Pages 65462-65467]
    From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
    [FR Doc No: 96-31583]
    
    
    =======================================================================
    -----------------------------------------------------------------------
    
    DEPARTMENT OF COMMERCE
    
    Bureau of Export Administration
    
    15 CFR Parts 734, 740, 742, 762 and 774
    
    [Docket No. 960918265-6296-02]
    RIN 0694-AB09
    
    
    Licensing of Key Escrow Encryption Equipment and Software
    
    AGENCY: Bureau of Export Administration, Commerce.
    
    ACTION: Interim final rule.
    
    -----------------------------------------------------------------------
    
        This interim final rule amends the Export Administration 
    Regulations (EAR) by imposing national security controls on Key escrow 
    information security (encryption) equipment and software transferred 
    from the U.S. Munitions List to the Commerce Control List following a 
    commodity jurisdiction determination by the Department of State.
        This interim final rule also amends the EAR to exclude key escrow 
    items from the de minimis provisions for items exported from abroad and 
    to exclude key escrow encryption software from mass market eligibility. 
    Further, key escrow encryption software is subject to the EAR even when 
    made publicly available.
    
    DATES: Effective date. This rule is effective December 13, 1996. 
    Comment date: Comments, should be submitted on or before January 13, 
    1997.
    
    ADDRESSES: Written comments should be sent to Nancy Crowe, Regulatory 
    Policy Division, Office of Exporter Services, Bureau of Export 
    Administration, Room 2705, 14th Street and Pennsylvania Avenue, N.W., 
    Washington, D.C. 20230.
    
    FOR FURTHER INFORMATION CONTACT: James A. Lewis, Office of Strategic 
    Trade and Foreign Policy Controls, Telephone (202) 482-0092.
    
    SUPPLEMENTARY INFORMATION:
    
    Background
    
        In August 1995 the United States decided to ease export licensing 
    requirements for key escrow encryption software products. As part of 
    this decision to allow the export of these products, draft criteria 
    were developed for key escrow products and for key holders. Products 
    that conform to these criteria will be considered for transfer from the 
    U.S. Munitions List to the Commerce Control List following a case-by-
    case determination by the Department of State through the commodity 
    jurisdiction procedures.
        Once transferred, key escrow encryption items will be controlled 
    for national security reasons. A license will be required from the 
    Department of Commerce to all destinations, except Canada. This is an 
    initial step in liberalizing the treatment of encryption exports.
        The Bureau of Export Administration is preparing regulations to 
    further implement the Administration's encryption policies, which will 
    be published in the Federal Register in the near future. These further 
    measures are based upon the Administration's October 1, 1996 
    announcement of plans to make it easier for Americans to use stronger 
    encryption products to protect their privacy, intellectual property and 
    other valuable information, and the November 15, 1996, Presidential 
    Memorandum and Executive Order 13026 (15 November 1996, 61 FR 58767) 
    (Memorandum) directing that all encryption items controlled on the U.S. 
    Munitions List, except those specifically designed, developed, 
    configured, adapted, or modified for military applications, be 
    transferred to the Commerce Control List. The plan to make it easier 
    for Americans to use stronger encryption products to protect their 
    privacy, intellectual property and other valuable information envisions 
    a worldwide key management infrastructure with the use of key recovery 
    and key escrow encryption items to promote electronic commerce
    
    [[Page 65463]]
    
    and secure communications while protecting national security and public 
    safety. The Memorandum sets forth certain additional provisions with 
    respect to controls on such encryption items to be imposed by the 
    Department of Commerce. The Executive Order also provides for 
    appropriate controls on the export and foreign dissemination of 
    encryption items controlled on the U.S. Munitions List that are placed 
    on the Commerce Control List.
        This interim final rule amends that EAR to reflect the new 
    licensing policy for key escrow encryption items. The Bureau of Export 
    Administration will accept license applications for the export and 
    reexport of key escrow encryption items in unlimited quantities for all 
    destinations except to embargoed destinations and destinations the 
    Secretary of State has determined to support international terrorism. 
    Such applications will receive favorable consideration provided that, 
    prior to the export or reexport, a key holder satisfactory to the 
    Department of Commerce has been identified (see new Supplement No. 5 
    part 742) and procedures for safeguarding the key as described in a 
    Supplement No. 5 to part 742 are established to the satisfaction of the 
    Department of Commerce and are maintained after export or reexport as 
    required by the EAR and any license conditions. In addition, the key 
    escrow system must meet the criteria identified in a new Supplement No. 
    4 to part 742.
        This interim final rule also amends part 734 of the EAR to reflect 
    that key escrow encryption software will be subject to the EAR even 
    when made publicly available, and to exclude key escrow encryption 
    software and items from the de minimis provision for items. Further, 
    this interim final rule amends part 740 of the EAR to exclude key 
    escrow encryption software from the mass market provisions of License 
    Exception TSU, and amends part 762 of the EAR to clarify the additional 
    records that must be kept for compliance with the recordkeeping 
    provisions of the EAR.
        Finally, this interim final rule also amends Supplement No. 1 to 
    part 774 (the Commerce Control List) by clarifying that once 
    transferred from the U.S. Munitions List (USML) to the Commerce Control 
    List (CCL) following a case-by-case determination by the Department of 
    State through the commodity jurisdiction procedures, key escrow 
    encryption items and software are controlled on the CCL under Export 
    Control Classification Numbers 5A002.a and 5D002.c.1 respectively.
        This rule involves no new curtailment of exports, because the 
    transfer or removal of items from the United States Munitions List to 
    the CCL maintains a continuity of controls. Therefore, the provisions 
    regarding the impact of new controls do not apply, and contract 
    sanctity also does not apply to this imposition of controls.
        Although the Export Administration Act (EAA) expired on August 20, 
    1994, the President invoked the International Emergency Economic Powers 
    Act and continued in effect, to the extent permitted by law, the 
    provisions of the EAA and the EAR in Executive Order 12924 of August 
    19, 1994, notice of August 15, 1995 (60 FR 42767), and notice of August 
    14, 1996 (60 FR 42527).
        1. This interim final rule has been determined to be significant 
    for purposes of E.O. 12866.
        2. Notwithstanding any other provision of the law, no person is 
    required to respond to, nor shall any person be subject to a penalty 
    for failure to comply with a collection of information, subject to the 
    requirements of the Paperwork Reduction Act, unless that collection of 
    information displays a currently valid OMB Control Number. This rule 
    involves collections of information subject to the Paper work Reduction 
    Act of 1980 (44 U.S.C. 3501 et seq.). These collections have been 
    approved by the Office of Management and Budget under control number 
    0694-0088.
        3. This rule does not contain policies with Federalism implications 
    sufficient to warrant preparation of a Federalism assessment under 
    Executive Order 12612.
        4. The provisions of the Administrative Procedure Act (5 U.S.C. 
    553) requiring notice of proposed rulemaking, the opportunity for 
    public participation, and a delay in effective date, are inapplicable 
    because this regulation involves a military and foreign affairs 
    functions of the United States (Sec. 5 U.S.C. 553(a)(1)). Further, no 
    other law requires that a notice of proposed rulemaking and an 
    opportunity for public comment be given for this interim final rule. 
    Because a notice of proposed rulemaking and an opportunity for public 
    comment are not required to be given for this rule under 5 U.S.C. or by 
    any other law, the requirements of the Regulatory Flexibility Act (5 
    U.S.C 601 et seq.) are not applicable.
        However, because of the importance of the issues raised by these 
    regulations, this rule is issued in interim final form and comments 
    will be considered in the development of final regulations. 
    Accordingly, the Department encourages interested persons who wish to 
    comment to do so at the earliest possible time to permit the fullest 
    consideration of their views.
        The period for submission of comments will close January 13, 1997. 
    The Department will consider all comments received before the close of 
    the comment period in developing final regulations. Comments received 
    after the end of the comment period will be considered if possible, but 
    their consideration cannot be assured. The Department will not accept 
    public comments accompanied by a request that a part or all of the 
    material be treated confidentially because of its business proprietary 
    nature or for any other reason. The Department will return such 
    comments and materials to the person submitting the comments and will 
    not consider them in the development of final regulations. All public 
    comments on these regulations will be a matter of public record and 
    will be available for public inspection and copying. In the interest of 
    accuracy and completeness, the Department requires comments in written 
    form.
        Oral comments must be followed by written memoranda, which will 
    also be a matter of public record and will be available for public 
    review and copying. Communications from agencies of the United States 
    Government or foreign governments will not be made available for public 
    inspection.
        The public record concerning these regulations will be maintained 
    in the Bureau of Export Administration, Freedom of Information Records 
    Inspection Facility, Room 4525, Department of Commerce, 14th Street and 
    Pennsylvania Avenue, N.W., Washington, DC 20230. Records in this 
    facility, including written public comments and memoranda summarizing 
    the substance of oral communications, may be inspected and copied in 
    accordance with regulations published in Part 4 of Title 15 of the Code 
    of Federal Regulations. Information about the inspection and copying of 
    records at the facility may be obtained from Margaret Cornejo, Bureau 
    of Export Administration, Freedom of Information Officer, at the above 
    address or by calling (202) 482-5653.
    
    List of Subjects
    
    15 CFR Part 734
    
        Administrative practice and procedure, Exports, Foreign trade.
    
    15 CFR Part 740
    
        Administration practice and procedure, Exports, Foreign trade, 
    Reporting and recordkeeping requirements.
    
    [[Page 65464]]
    
    15 CFR Parts 742 and 774
    
        Exports, Foreign trade.
    
    15 CFR Part 762
    
        Administrative practice and procedure, Business and industry, 
    Confidential business information, Export, Foreign trade, Reporting and 
    recordkeeping requirements.
    
        Accordingly, parts 734, 740, 742, 762 and 774 of the Export 
    Administration Regulations (15 CFR Parts 730-799) are amended as 
    follows:
        1. The authority citation for 15 CFR part 734 continues to read as 
    follows:
    
        Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 
    E.O. 12924, 59 FR 43437, 3 CFR, 1994 Comp., p. 917; E.O. 12938, 59 
    FR 59099, 3 CFR, 1994 Comp., p. 950; Executive Order 13026 (November 
    15, 1996, 61 FR 58767); Notice of August 15, 1995 (60 FR 42767, 
    August 17, 1995); and Notice of August 14, 1996 (61 FR 42527).
    
        2. The authority citation for 15 CFR part 740 continues to read as 
    follows:
    
        Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 
    E.O. 12924, 59 FR 43437, 3 CFR, 1994 Comp., p. 917; Executive Order 
    13026 (November 15, 1996, 61 FR 58767); Notice of August 15, 1995 
    (60 FR 42767, August 17, 1995); and Notice of August 14, 1996 (61 FR 
    42527).
    
        3. The authority citation for 15 CFR part 742 continues to read as 
    follows:
    
        Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 
    18 U.S.C. 2510 et seq.; 22 U.S.C. 3201 et seq.; 42 U.S.C. 2139a; 
    E.O. 12058, 43 FR 20947, 3 CFR, 1978 Comp., p. 179; E.O. 12851, 58 
    FR 33181, 3 CFR, 1993 Comp., p. 608; E.O. 12924, 59 FR 43437, 3 CFR, 
    1994 Comp., p. 917; E.O. 12938, 59 FR 59099, 3 CFR, 1994 Comp., p. 
    950; Executive Order 13026 (November 15, 1996, 61 FR 48767); Notice 
    of August 15, 1995 (60 FR 42767, August 17, 1995); and Notice of 
    August 14, 1996 (61 FR 42527).
    
        4. The authority citation for 15 CFR part 762 continues to read as 
    follows:
    
        Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 
    E.O. 12924, 59 FR 43427, 3 CFR, 1994 Comp., p. 917; Executive Order 
    13026 (November 15, 1996, 61 FR 58767); Notice of August 15, 1995 
    (60 FR 42767, August 17, 1995); and Notice of August 14, 1996 (61 FR 
    42527).
    
        5. The authority citation for 15 CFR part 774 continues to read as 
    follows:
    
        Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 
    10 U.S.C. 7420; 10 U.S.C. 7430(e); 18 U.S.C. 2510 et seq.; 22 U.S.C. 
    287c; 22 U.S.C. 3201 et seq.; 22 U.S.C. 6004; Sec. 201, Pub. L. 104-
    58, 109 Stat. 557 (30 U.S.C. 185(s)); 30 U.S.C. 185(u); 42 U.S.C. 
    2139a; 42 U.S.C. 6212; 43 U.S.C. 1354; 46 U.S.C. app. 466c; 50 
    U.S.C. app. 5; E.O. 12924, 59 FR 43437, 3 CFR, 1994 Comp., p. 917; 
    Executive Order 13026 (November 15, 1996, 61 FR 58767); Notice of 
    August 15, 1995 (60 FR 42767, August 17, 1995); and Notice of August 
    14, 1996 (61 FR 42527).
    
    PART 834--[AMENDED]
    
        6. Section 734.3 is amended by redesignating paragraphs (b)(3)(i) 
    through (b)(3)(iv) as paragraphs (b)(3)(i)(A) through (b)(3)(i)(D), and 
    adding a new paragraph (b)(3)(ii) to read as follows:
    
    
    Sec. 734.3  Items subject to the EAR.
    
    * * * * *
        (b) * * *
        (3) * * *
        (ii) Key escrow encryption software controlled under ECCN 5D002.c.1 
    remains subject to the EAR even when made publicly available (see 
    Supplement No. 1 to part 774 of the EAR).
    * * * * *
        7. Section 734.4 is amended by revising paragraph (b) and revising 
    paragraph (h) to read as follows:
    
    
    Sec. 734.4  De minimis U.S. content.
    
    * * * * *
        (b) There is no de minimis level for the reexport of foreign- 
    origin items that incorporate the following:
        (1) Items controlled by ECCN 9A004.a; or
        (2) Key escrow encryption software controlled under ECCN 5D002.c.1 
    or equipment designed or modified to use key escrow encryption items 
    controlled under ECCN 5A002.a. transferred from the U.S. Munitions List 
    following a case-by-case determination by the Department of State 
    through the commodity jurisdiction procedure.
    * * * * *
        (h) Notwithstanding the provisions of paragraphs (c) and (d) of 
    this section, U.S.-origin technology controlled by ECCN 9E003a.1 
    through a.12, and .f, and related controls, and key escrow encryption 
    software controlled under ECCN 5D002.c.1 do not lose their U.S.-origin 
    when redrawn, used, consulted, or otherwise commingled abroad in any 
    respect with other software or technology of any other origin. 
    Therefore, any subsequent or similar software or technology prepared or 
    engineered abroad for the design, construction, operation, or 
    maintenance of any plant or equipment, or part thereof, which is based 
    on or uses any such U.S.-origin software or technology is subject to 
    the EAR.
        8. Section 734.7 is amended by revising paragraph (b) to read as 
    follows:
    
    
    Sec. 734.7  Published information and software.
    
    * * * * *
        (b) Software and information is published when it is available for 
    general distribution either for free or at a price that does not exceed 
    the cost of reproduction and distribution. See Supplement No. 1 to this 
    part, Questions G(1) through G(3). Note that key escrow encryption 
    software controlled under ECCN 5D002.c.1 remains subject to the EAR 
    even when made publicly available (see Supplement No. 1 to part 774 of 
    the EAR).
    
    PART 740--[AMENDED]
    
        9. Section 740.12 is amended by redesignating paragraph (d)(2) as 
    paragraph (d)(3) and adding a new paragraph (d)(2) to read as follows:
    
    
    Sec. 740.12  Technology and software--unrestricted (TSU).
    
    * * * * *
        (d) * * *
        (2) Software not eligible for this License Exception. This License 
    Exception is not available for key escrow encryption software 
    controlled by ECCN 5D002.c.1.
    * * * * *
    
    PART 742--[AMENDED]
    
        10. Part 742 is amended by adding a new Sec. 742.15, and new 
    Supplements 4 and 5 to read as follows:
    
    
    Sec. 742.15  Key escrow encryption items.
    
        (a) License requirements. Licenses are required for all 
    destinations, except Canada, for key escrow encryption software 
    controlled under ECCN 5D002.c.1; and equipment designed or modified to 
    use key escrow encryption items controlled under ECCN 5A002.a
        (b) Licensing policy. BXA will accept license applications for the 
    export and reexport of key escrow encryption software controlled by 
    ECCN 5D002.c.1 and equipment designed or modified to use key escrow 
    encryption software controlled by ECCN 5A002.a in unlimited quantities 
    for all destinations except Country Groups E:1 and E:2 (see Supplement 
    No. 1 to part 742), Iran, Syria, and Sudan. Such applications will 
    receive favorable consideration provided that, prior to the export or 
    reexport, keys are escrowed with a key holder satisfactory to the 
    Department of Commerce (see Supplement No. 5 to this part) and 
    procedures for safeguarding the key as described in Supplement No. 5 to 
    this part are established to the satisfaction of the Department of 
    Commerce and are maintained after export or reexport as required by the 
    EAR and any license conditions. In addition, the key escrow system must 
    meet the criteria identified in Supplement No. 4 to this part. This 
    includes a legally binding arrangement
    
    [[Page 65465]]
    
    between the exporter or reexporter and the key holder, satisfactory to 
    BXA, which ensures that appropriate key escrow safeguard procedures 
    will be carried out by the key holder. If the exporter or reexporter 
    intends to be the key holder, then the exporter or reexporter must meet 
    all of the requirements of a key holder. Continuing compliance by the 
    key holder with the key safeguard procedures shall be made a condition 
    of any license issued. Because BXA will be relying on representations 
    and undertakings of the key holder to make decisions on license 
    applications, the key holder is required to comply with all applicable 
    record requirements in the EAR, including the record retention 
    requirements. In addition, the key holder shall be required to carry 
    out the key holding obligations as approved by BXA, and any violation 
    of any of the key holding obligations shall also constitute a violation 
    of the EAR. Applicants should list in their license applications those 
    countries for which they seek approval to export or reexport, or 
    identify that you seek export or reexport to all destinations except 
    Country Groups E:1 and E:2, Iran, Syria, and Sudan.
        (c) Contract sanctity. Contract sanctity provisions are not 
    available for license applications reviewed under this section.
        (d) [Reserved]
     * * * * *
    
    Supplement No. 4 to Part 742--Key Criteria
    
    Key Recovery Feature
    
        (1) The key(s) required to decrypt the product's key escrow 
    cryptographic functions ciphertext shall be accessible through a key 
    escrow feature.
        (2) The product's key escrow cryptographic functions shall be 
    inoperable until the key is or the keys are escrowed in accordance 
    with the criteria identified in Supplement 5 to this part.
        (3) The product's key escrow cryptographic functions ciphertext 
    shall contain, in an accessible format and with a reasonable 
    frequency, the identity of the key escrow holder(s) and information 
    sufficient for the recovery holder(s) to identify the keys required 
    to decrypt the ciphertext.
        (4) The product's key escrow feature shall allow access to the 
    key(s) needed to decrypt the product's ciphertext regardless of 
    whether the product generated or received the ciphertext.
        (5) The product's key escrow feature shall allow for the 
    recovery of multiple decryption keys during the period of authorized 
    access without requiring repeated presentations of access 
    authorization to the key escrow holder(s).
    
    Key Length Feature
    
        (6) The product's key escrow functions shall use an unclassified 
    encryption algorithm.
    
    Interoperability Feature
    
        (7) The product's cryptographic functions shall interoperate 
    only with other key escrow products that meet these criteria, and 
    shall not interoperate with products whose key escrow feature has 
    been altered, bypassed, disabled, or otherwise rendered inoperative. 
    Key escrow products shall interoperate with non-key escrow products 
    only when the key escrow product permits access to the keys or other 
    escrowed material/information needed to decrypt ciphertext generated 
    or received by the key escrow product.
    
    Design, Implementation and Operational Assurance
    
        (8) The product shall be resistant to efforts to disable or 
    circumvent the attributes described in criteria one through seven.
    
    Supplement No. 5 to Part 742-Key Holder Requirements; Safeguard 
    Procedures; Key Escrow Procedures
    
        This Supplement sets forth criteria that BXA, in consultation 
    with other departments and agencies, will use to approve key holders 
    to support approval of the export or reexport of key escrow 
    encryption items controlled by ECCNs 5A002.a and 5D002.c.1. Any 
    arrangements between the exporter or reexporter and the key holder 
    reflects the provisions contained in this Supplement in a manner 
    satisfactory to BXA. This Supplement also outlines the criteria for 
    employing key holder personnel and key escrow procedures. An 
    applicant for a license to export or reexport key escrow encryption 
    items shall provide, or cause the proposed key holder to provide, to 
    BXA sufficient information concerning any proposed key holder 
    arrangements permit BXA to evaluate the key holder's safeguard 
    procedures, suitability and trustworthiness to maintain the 
    confidentiality of the key and key components, and its key escrow 
    procedures. The key holder may be the applicant for the export or 
    reexport license or another party legally obligated to the applicant 
    to provide recovery services, as approved by BXA. BXA retains the 
    right, in addition to any other remedies, to revoke export or 
    reexport licenses if a key holder no longer meets these criteria. 
    The safeguard procedures, procedures related to the key holder's 
    suitability and trustworthiness, and key escrow procedures of the 
    key holder generally shall be made terms and conditions of the 
    export or reexport license for key escrow encryption software if 
    granted. BXA may require the key holder to provide a representation 
    that it will comply with such terms and conditions.
        (a) Key holder requirements.
        (1) To become a qualified key holder, the key holder's personnel 
    involved in the recovery of keys with access to escrowed keys or key 
    escrow access request information, or in responding to key escrow 
    requests, and persons in control of the key holder with access or 
    authority to obtain access to keys or key components must be 
    suitable and trustworthy as determined by the Bureau of Export 
    Administration prior to export or reexport of the recovery product, 
    and BXA may evaluate and determine the suitability and 
    trustworthiness of such personnel thereafter from time to time. 
    Evidence of an individual's suitability and trustworthiness could 
    include:
        (i) Information indicating the individual(s);
        (A) Have no felony convictions or pending felony charges;
        (B) Are not currently serving a term of probation;
        (C) Have satisfactorily performed any positions of a fiduciary 
    nature, for example have had no violations of surety or performance 
    bonds; and
        (D) Have favorable results of criminal background and credit 
    checks; or
        (ii) Have an active U.S. government security clearance of secret 
    or higher issued or updated within the last five years.
        (2) Suitable evidence of the key holder's corporate viability 
    and financial responsibility (e.g. a certificate of good standing 
    from the state of incorporation, credit reports, and errors/
    omissions insurance) must be submitted with an application to export 
    or reexport key escrow item.
        (3) Key holder operating procedures shall provide for the 
    designation of individual(s) to be responsible as security and 
    operations officers.
        (4) Upon the request of BXA, key holders shall provide to BXA 
    information concerning compliance with or violations of federal, 
    state, and local laws and regulations determined by BXA to be 
    relevant to the evaluation of trustworthiness of the key holders, 
    its personnel, and persons in control of the key holder.
        (5) Policies and procedures shall be designed and implemented to 
    preclude disclosure of keys or key components to additional persons 
    in control not previously authorized by BXA. For purposes of these 
    criteria in this Supplement No. 5, a person in control is each of 
    the following:
        (i) A person with the power, direct or indirect, whether 
    exercised or not exercised, and whether or not exercisable, through 
    the ownership of the key holder's securities, by contractual 
    arrangements or other means, to direct or decide matters affecting 
    the management or operations of the key holder in a manner which may 
    result in the unauthorized disclosure of a key or key component or a 
    breach of the terms and conditions of an export or reexport license;
        (ii) A person with ownership or beneficial ownership, direct or 
    indirect, of 5 percent or more of the key holder's voting 
    securities;
        (iii) A person with ownership or beneficial ownership, direct or 
    indirect, of 25 percent or more of the key holder's non-voting 
    securities;
        (iv) Management positions, such as directors, officers, or 
    executive personnel of the key holder held by non U.S. citizens;
        (v) A person with the power, direct or indirect, to control the 
    election, appointment, or tenure of directors, officers, or 
    executive personnel of the key holder; or
        (vi) A person with a contract, agreement, understanding, or 
    arrangement to manage the key holder.
    
    [[Page 65466]]
    
        (b) Safeguard procedures.
        (1) Key holders must implement safeguard procedures that assure 
    the confidentiality, integrity, and availability of the key to key 
    escrow encryption software or key products.
        (i) Procedures to assure the confidentiality of this information 
    may include:
        (A) Encrypting all keys or key components while in storage, 
    transmission, or transfer; or
        (B) Applying reasonable measures to limit access to the recovery 
    database (e.g. using keyed or combination locks on the entrances to 
    recovery facilities and limiting the personnel with knowledge of or 
    access to the keys/combinations).
        (ii) Procedures to assure the integrity of the recovery database 
    (i.e. assuring the recovered key/key components are protected 
    against unauthorized changes) may include the use of access controls 
    based on an appropriate use of database password controls, digital 
    signatures, system auditing, and physical access restrictions.
        (iii) Procedures to assure the availability of the recovery 
    database (i.e. assuring recovered keys/key components are 
    retrievable at any time) may include system redundance, physical 
    security, and the use of cryptography to control access.
        (2) Policies and procedures shall be designed and implemented so 
    that a failure by a single person, procedures, or mechanism does not 
    compromise key or key component confidentiality, integrity and 
    availability. Such measures could include two person control of 
    access to recoverable keys, split keys, and back-up capabilities.
        (3) Key holders shall implement policies that protect against 
    unauthorized disclosure of information regarding the identity of 
    owners or end users of encryption products whose keys are 
    recoverable, the fact that a key or key component was requested or 
    provided, and the identity of a requester. Procedures to assure the 
    confidentiality of this information could include those described in 
    paragraph (a)(1)(i).
        (4) Policies and procedures shall be designed and implemented to 
    provide notice to BXA of a compromise of the confidentiality of a 
    key or key component, or other safeguards.
        (c) Key escrow procedures.
        (1) In the event the key holder dissolves or otherwise 
    terminates recovery operations, or if BXA determines that there is a 
    risk of such dissolution or termination, or if BXA determines the 
    key holder is no longer suitable or trustworthy, then the key holder 
    must transfer all of its recovery equipment and recovered 
    information to another key holder that is approved by the Bureau of 
    Export Administration.
        (2) Key holders will maintain the ability to make the key 
    available in accordance with appropriate State and Federal legal 
    authority until notified otherwise by BXA. Key holders shall make 
    requested keys and key components available, to the extent required 
    by the request, within two hours from the time they receive a 
    request from a government agency acting under appropriate legal 
    authority that requires or compels the key holder to produce the key 
    or key components. The requesting government agency will be 
    responsible for obtaining the keys or key components from the key 
    holder.
        (3) Key holders shall enter keys and key components into the 
    recovery data base upon receipt of new or replacement keys and key 
    components.
        (4) Key holders must agree to maintain data regarding key 
    requests received, keys and key components released, database 
    changes, system administration access, dates of such events, etc., 
    for purposes of audits by BXA.
    
    PART 762--[AMENDED]
    
        11. Section 762.2 is amended by redesignating paragraphs (b)(6) 
    through (b)(35) as paragraphs (b)(7) through (b)(36) and adding a new 
    paragraph (b)(6) to read as follows:
    
    
    Sec. 762.2  Records to be retained.
    
    * * * * *
        (b) * * *
        (6) Section 742.15;
    * * * * *
    
    PART 774--[AMENDED]
    
        12. In Supplement No. 1 to part 774 (the Commerce Control List), 
    Category 5 (Telecommunications and Information Security), II. 
    Information Security, ECCNs 5A002 and 5D002 are revised to read as 
    follows:
    
    Supplement No. 1 to Part 774--The Commerce Control List
    
    * * * * *
    
    II. Information Security
    
    * * * * *
    
    
    5A002  Systems, equipment, application specific ``electronic 
    assemblies'', modules or integrated circuits for ``information 
    security'', and specially designed components therefor.
    
    License Requirements
    
    Reason for Control: NS, AT, EI
    
    ------------------------------------------------------------------------
                   Control(s)                         Country chart         
    ------------------------------------------------------------------------
    NS applies to entire entry.............  NS Column 1.                   
    AT applies to entire entry.............  AT Column 1.                   
    ------------------------------------------------------------------------
    
    License Exceptions
    
    LVS: N/A
    GBS: N/A
    CIV: CPSC
    
    List of Items Controlled
    
    Unit: value
    Related Controls: N/A
    RElated Definitions: N/A
    Items:
    
        a. Designed or modified to use ``cryptography'' employing digital 
    techniques to ensure ``information security'';
    
        Note: 5A002.a includes controls key escrow encryption items 
    transferred from the U.S. Munitions List following a case-by-case 
    determination by the Department of State through the commodity 
    jurisdiction procedure. (See Sec. 742.15 of the EAR)
    
        b. Designed or modified to perform cryptoanalytic functions;
        c. Designed or modified to use ``cryptography'' employing analog 
    techniques to ensure ``information security'';
    
        Note: 5A002.c does not control the following:
        1. Equipment using ``fixed'' band scrambling not exceeding 8 
    bands and in which the transpositions change not more frequently 
    than once every second;
        2. Equipment using ``fixed'' band scrambling exceeding 8 bands 
    and in which the transpositions change not more frequently than once 
    every ten seconds;
        3. Equipment using ``fixed'' frequency inversion and in which 
    the transpositions change not more frequently than once every 
    second;
        4. Facsimile equipment;
        5. Restricted audience broadcast equipment; and
        6. Civil television equipment.
    
        d. Designed or modified to suppress the compromising emanations of 
    information-bearing signals;
    
        Note: 5A002.d does not control equipment specially designed to 
    suppress emanations for reasons of health and safety.
    
        e. Designed or modified to use cryptographic techniques to generate 
    the spreading code for ``spread spectrum'' or hopping code for 
    ``frequency agility'' systems;
        f. Designed or modified to provide certified or certifiable 
    ``multilevel security'' or user isolation at a level exceeding Class Be 
    of the Trusted Computer System Evaluation Criteria (TCSEC) or 
    equivalent;
        g. Communications cable systems designed or modified using 
    mechanical, electrical or electronic means to detect surreptitious 
    intrusion.
    
        Note: 5A002 does not control:
        a. ``Personalized smart cards'' or specially designed components 
    therefor, with any of the following characteristics:
        1. Not capable of message traffic encryption or encryption of 
    user-supplied data or related key management functions therefor; or
        2. When restricted for use in equipment or systems excluded from 
    control under the note to 5A002.c, or under paragraphs b through h 
    of this note.
        b. Equipment containing ``fixed'' data compression or coding 
    techniques;
        c. Receiving equipment for radio broadcast, pay television or 
    similar restricted audience television of the consumer type, without 
    digital encryption and where digital decryption is limited to the 
    video, audio or management functions;
        d. Portable or mobile radiotelephones for civil use (e.g., for 
    use with commercial civil cellular radiocommunications systems) that 
    are not capable of end-of-end encryption;
    
    [[Page 65467]]
    
        e. Decryption functions specially designed to allow the 
    execution of copy-protected ``software'', provided the decryption 
    functions are not user-accessible;
        f. Access control equipment, such as automatic teller machines, 
    self-service statement printers or point of sale terminals, that 
    protects password or personal identification numbers (PIN) or 
    similar data to prevent unauthorized access to facilities but does 
    not allow for encryption of files or text, except as directly 
    related to the password or PIN protection;
        g. Data authentication equipment that calculates a Message 
    Authentication Code (MAC) or similar result to ensure no alteration 
    of text has taken place, or to authenticate users, but does not 
    allow for encryption of data, text or other media other than that 
    needed for the authentication;
        h. Cryptographic equipment specially designed and limited for 
    use in machines for banking or money transactions, such as automatic 
    teller machines, self-service statement printers or point of sale 
    terminals.
    * * * * *
    
    
    5D002   Information Security Software
    
    License Requirements
    
    Reason for Control: NS, AT
    
    ------------------------------------------------------------------------
                   Control(s)                         Country chart         
    ------------------------------------------------------------------------
    NS applies to entire entry.............  NS Column 1.                   
    AT applies to entire entry.............  AT Column 1.                   
    ------------------------------------------------------------------------
    
        Note: Key escrow encryption software controlled under 5D002.c.1. 
    remains subject to the EAR even when made publicly available in 
    accordance with Sec. 734.7 of the EAR, and it is not eligible for 
    mass market treatment under License Exception TSU for mass market 
    software. See Sec. 742.15(b)(1) of the EAR.
    
    License Exceptions
    
    GBS: N/A
    CIV: N/A
    
    List of Items Controlled
    
    Unit: $ value
    Related Controls: NA
    Related Definitions: N/A
    Items:
        a. ``software'' specially designed or modified for the 
    ``development'', ``production'' or ``use'' of equipment or ``software'' 
    controlled by 5A002, 5B002 or 5D002.
        b. ``Software'' specially designed or modified to support 
    ``technology'' controlled by 5E002.
        c. Specific ``software'' as follows:
        c.1. ``Software'' having the characteristics, or performing or 
    simulating the functions of the equipment controlled by 5A002 or 5B002;
    
        Note: 5D002.c.1 includes controls key escrow encryption software 
    transferred from the U.S. Munitions List following a case-by-case 
    determination by the Department of State through the commodity 
    jurisdiction procedure. See Sec. 742.15 of the EAR.
    
        c.2. ``Software'' to certify ``software'' controlled by 5D002.c.1;
        c.3. ``Software'' designed or modified to protect against malicious 
    computer damage, e.g., viruses;
    
        Note: 5D002 does not control:
        a. ``Software'' required'' for the ``use'' of equipment excluded 
    from control under the Note to 5A002.
        b. ``Software'' providing any of the functions of equipment 
    excluded from control under the Note to 5A002.
    
        13. Supplement No. 2 to Part 774 is amended by revising the 2. 
    General Software Note to read as follows:
    
    Supplement No. 2 to Part 774--General Technology and Software Notes
    
    * * * * *
        2. General Software Note. License Exception TSU (mass market 
    software) is available to all destinations, except Cuba, Iran, 
    Libya, North Korea, Sudan, and Syria, for release of software that 
    is generally available to the public by being:
        a. Sold from stock at retail selling points, without 
    restriction, by means of:
        1. Over the counter transactions;
        2. Mail order transactions; or
        3. Telephone call transactions; and
        b. Designed for installation by the user without further 
    substantial support by the supplier.
    
        Note: License Exception TSU for mass market software does not 
    apply to key escrow encryption software controlled under ECCN 
    5D002.c.1. that has been transferred from the U.S. Munitions list 
    following a commodity jurisdiction determination by the Department 
    of State.
    
        Dated: December 6, 1996.
    Sue E. Eckert,
    Assistant secretary for Export Administration.
    [FR Doc. 96-31583 Filed 12-12-96; 8:45 am]
    BILLING CODE 3510-33-M
    
    
    

Document Information

Published:
12/13/1996
Department:
Export Administration Bureau
Entry Type:
Rule
Action:
Interim final rule.
Document Number:
96-31583
Dates:
Effective date. This rule is effective December 13, 1996.
Pages:
65462-65467 (6 pages)
Docket Numbers:
Docket No. 960918265-6296-02
RINs:
0694-AB09: Transfer of Certain Remote Sensing Satellites From the U.S. Munitions List to the CCL
RIN Links:
https://www.federalregister.gov/regulations/0694-AB09/transfer-of-certain-remote-sensing-satellites-from-the-u-s-munitions-list-to-the-ccl
PDF File:
96-31583.pdf
CFR: (6)
15 CFR 740.12
15 CFR 742.15
15 CFR 762.2
15 CFR 734.3
15 CFR 734.4
More ...