-
Start Preamble
AGENCY:
Bureau of Industry and Security, Commerce.
ACTION:
Interim final rule.
SUMMARY:
This interim final rule amends the Export Administration Regulations (EAR) to make the treatment of encryption items more consistent with the treatment of other items subject to the EAR, as well as to simplify and clarify regulations pertaining to encryption items. The restrictions pertaining to technical assistance by U.S. persons with respect to encryption items are removed, because the current export and reexport restrictions set forth in the EAR for technology already include technical assistance. This rule also removes License Exception KMI as it has become obsolete because of developments in uses of encryption. In addition, this rule removes notification requirements for items classified as 5A992, 5D992, and 5E992. This rule also increases certain parameters under License Exception ENC, which is intended to reflect advances in technology. This rule adds two new review and reporting requirement exclusion paragraphs under License Exception ENC for wireless “personal area network” items and for “ancillary cryptography” items. This rule also adds Bulgaria, Canada, Iceland, Romania, and Turkey to the list of countries that receive favorable treatment under License Exception ENC. Commodities and software pending mass market review may no longer be exported under ECCNs 5A992 and 5D992 using No License Required (NLR). However, once the mass market review has been received by BIS, then such commodities and software may be exported using License Exception ENC under ECCNs 5A002 and 5D002. This rule will reduce the paperwork burden on the public by 9% (annual dollar amount savings of approximately $14,000 to the public and $5,000 to the U.S. Government), because of the removal of certain notification requirements, addition of countries to the list of those receiving favorable treatment under License Exception ENC, and the increase of reporting and review requirement exclusions. The Departments of Commerce, State and Defense will continue to review export control, license review policies, and license exceptions for encryption items in the EAR.
DATES:
Effective Date: This rule is effective October 3, 2008.
ADDRESSES:
Written comments on this interim final rule may be sent by e-mail to publiccomments@bis.doc.gov. Include “Encryption rule” in the subject line of the message. Comments may also be submitted by mail or hand delivery to Sharron Cook, Office of Exporter Services, Regulatory Policy Division, Bureau of Industry and Security, Department of Commerce, 14th St. & Pennsylvania Avenue, NW., Room 2705, Washington, DC 20230, ATTN: Encryption rule; or by fax to (202) 482-3355.
Start Further InfoFOR FURTHER INFORMATION CONTACT:
For questions of a general nature contact Sharron Cook, Office of Exporter Services, Regulatory Policy Division at (202) 482-2440 or E-Mail: scook@bis.doc.gov.
For questions of a technical nature contact: The Information Technology Division, Office of National Security and Technology Transfer Controls at 202-482-0707 or E-Mail: C. Randall Pratt at cpratt@bis.doc.gov.
End Further Info End Preamble Start Supplemental InformationSUPPLEMENTARY INFORMATION:
Background
Steps Regarding Scope of the EAR
This rule revises paragraph 732.2(b) of the EAR, which sets forth instructions on how to determine if your technology or software is publicly available, by adding mass market encryption software with symmetric key length exceeding 64-bits classified under ECCN 5D992. The addition of this phrase harmonizes with the scope of publicly available encryption software that is considered to be subject to the EAR because of the criteria set forth in § 734.3(b)(3) of the EAR. Start Printed Page 57496
Items Subject to the EAR
This rule adds a note to paragraph 734.3(a)(4) of the EAR, which sets forth the items that are subject to the EAR. The note reminds readers that certain foreign-manufactured items are subject to the EAR when developed or produced from U.S.-origin encryption items that were exported pursuant to § 740.17(a) of License Exception ENC.
Clarification of Text
This rule replaces the phrase “encryption software (including source code) transferred from the U.S. Munitions List to the Commerce Control List consistent with E.O. 13026 of November 15, 1996 (61 FR 58767) and pursuant to the Presidential Memorandum of that date” with “software controlled for “EI” reasons under ECCN 5D002 on the Commerce Control List” to clarify which software this sentence is referring to in the introductory paragraph of Supplement No. 1 to part 734 “Questions and Answers—Technology and Software subject to the EAR.”
Determining Whether a License Is Required
This rule clarifies text in § 738.4(a)(1) of the EAR that not all license requirements set forth under the “License Requirements” section of an ECCN refer to the Commerce Country Chart, but in some cases this section will contain references to a specific section in the EAR that contain license requirements for that particular ECCN. In such cases, you could not determine whether a license is required based on the ECCN and Country Chart alone and section § 738.4(a)(1) of the EAR would not apply. For example, “EI” controls are not included in the Country Chart; however licensing requirements for “EI” controlled items are included in § 742.15(a) of the EAR. In addition, this rule removes the reference in § 738.4(a)(2)(ii)(B) to notification requirements described in paragraph 742.15(b) for items classified under ECCNs 5A992, 5D992, and 5E992, because this rule removes notification requirements for these items. This rule also clarifies the reminder about the review requirements for certain mass market encryption items under ECCNs 5A992 and 5D992, by removing the reference to 5E992 and harmonizing the citation reference with the changes in this rule.
License Exception LVS
This rule revises § 740.3(d)(5) to clarify that not only exports, but reexports of encryption components or spare parts are subject to the special restriction in this paragraph. In addition, the term “item” has been replaced by correct terminology.
License Exception KMI
This rule removes § 740.8 of the EAR “License Exception KMI” as it has become obsolete because of the developments in the use of encryption. A consequential revision is also made to § 746.3(c) of the EAR, where License Exception KMI was listed. Products previously eligible for License Exception KMI will be accorded equivalent treatment under license or license exception. As a result of this change, this rule also removes Supplement No. 4 to part 742 “Key Escrow or Key Recovery Products Criteria.”
License Exception TSU
In § 740.13(d) of the EAR, this rule removes the quotation marks around the term “mass market” in the title to paragraph (d), paragraph (d)(1), footnote 1, paragraph (d)(3)(i) and paragraph (d)(3)(ii), because in the EAR double quotation marks around a term indicate that the word is defined in part 772 of the EAR, and mass market is not a defined term in part 772 of the EAR.
License Exception ENC
This rule revises § 740.17 of the EAR by reformatting paragraphs, removing redundant text, and clarifying text as needed. This rule revises the title of this section to indicate that this license exception also authorizes technology. The introductory paragraph to § 740.17 of the EAR is condensed to set forth the scope of § 740.17 of the EAR and include information not found elsewhere in § 740.17 of the EAR.
While this rule reformats the paragraphs in § 740.17 of the EAR, it was BIS's goal to minimize revisions to the enumeration of paragraphs used to classify encryption items in the past, so as to alleviate confusion about previous classifications provided by BIS that reference specific paragraphs and to reduce the number of revisions to industry's current product matrices. That being said, the paragraph titles have been revised to reflect review request requirements instead of destinations, end-uses, or types of end-users.
This rule removes paragraphs 740.17(a)(2) and (b)(2)(i) that exempted commodities and software from review requirements based on a previous review by the U.S. Government prior to October 19, 2000. These commodities and software remain exempt from review requirements, and BIS did not see the necessity of retaining such text in the Export Administration Regulations.
Paragraph 740.17(a) now describes exports and reexports authorized by License Exception ENC that do not require prior government review or post export reporting. The former paragraph (a)(2) “Items previously reviewed by the U.S. Government” is removed by this rule, as this paragraph is no longer necessary because of the passage of time. Former paragraph (a)(3) for end-uses other than internal development is moved to new paragraph (b)(1), because a review request submission is required for eligibility under this paragraph. Former paragraph (b)(1) for U.S. subsidiaries is moved to (a)(2), because authorization under this paragraph does not require prior review. In addition, this rule amends former paragraph (b)(4)(i)(A) (exempting encryption items not exceeding certain key lengths from the 30 day waiting period) by moving it to (b)(1)(ii)(A).
Section 740.17(a)(1)
This rule removes references in paragraph § 740.17(a)(1) to “technical assistance described in § 744.9 of the EAR,” because this rule removes 744.9, see explanation set forth below under “§ 744.9.” This rule clarifies text in paragraph (a)(1) so that it is understood that License Exception ENC can be used for not only internal development, but also internal production of new products.
Section 740.17(a)(2)
Paragraph 740.17(a)(2) is former paragraph (b)(1).
Section 740.17(b)
Paragraph 740.17(b) now sets forth those items authorized under License Exception ENC that require prior review by the U.S. Government. This paragraph also sets forth the “open cryptographic interface” restriction that applies to all paragraphs in 740.17(b), except for paragraph § 740.17(b)(1)(i). This introductory paragraph also sets forth the restriction to export or reexport cryptanalytic items to any “government end-user.” There is also a reference in this paragraph to paragraph (e) “reporting requirements” for exports and reexports under § 740.17(b).
Section 740.17(b)(1)
The new paragraph 740.17(b)(1) of the EAR authorizes exports and reexports under License Exception ENC that require prior government review, but allows the export or reexport to take place immediately upon registration of the review request with BIS. Start Printed Page 57497
Paragraph (b)(1)(i) authorizes the export and reexport of encryption items, including EI controlled commodities or software (excluding source code) that are pending review for mass market treatment (under § 742.15(b) of the EAR), to “government end-users” and non-“government end-users” located in the countries listed in Supplement 3 of part 740, as well as to foreign subsidiaries or offices of firms, organizations and governments headquartered in countries listed in Supplement 3 of part 740. This rule adds authorization under License Exception ENC for items pending mass market review, because it was not logical to temporarily classify commodities and software under ECCNs 5A992 or 5D992 that were pending mass market review under paragraph 742.15(b) and authorize export or reexport under the designation of “No License Required (NLR)” when the possible outcome of the BIS classification of the commodities and software could be ECCN 5A002 or 5D002.
New paragraph 740.17(b)(1)(ii) authorizes exports and reexports of specified encryption commodities and software to countries not listed in Supplement No. 3 to part 740. This rule revises the format of the parameters in this section from a range to an upper limit in paragraph (b)(1)(ii)(A), former paragraph (b)(4)(i)(A). In addition, the upper limit for symmetric algorithms has been raised from “key lengths not exceeding 64 bits” to “key lengths not exceeding 80 bits.” After review has been completed on these commodities or software, BIS will issue a CCATS that will indicate authorization is under paragraph (b)(2) or (b)(3) of § 740.17 of the EAR, whichever paragraph is appropriate.
Paragraph (b)(1)(ii)(B), former paragraph (b)(4)(i)(B), authorizes exports and reexports of encryption source code that would not be eligible for export or reexport under License Exception TSU, provided that a copy of the source code is included in the review request, to non-“government end-users” located in any country except a country listed in Country Group E:1 of Supplement No. 1 to part 740 of the EAR. After the review has been completed, BIS will issue a CCATS that will indicate authorization is under paragraph 740.17(b)(2) of the EAR. The text is clarified by replacing the phrase “considered publicly available” with “eligible” in order to avoid confusion about the scope of encryption source code eligible under this paragraph.
Section 740.17(b)(2)
Paragraph (b)(2) of License Exception ENC authorizes exports and reexports to non-“government end-users” located in a country not listed in Supplement No. 3 to this part or Country Group E:1 that require a prior review and 30 day waiting period. Pursuant to the new scope paragraph 740.17(b), this rule expands the scope of (b)(2) to include ECCN 5B002 to be consistent with commodities and software eligible for License Exception ENC under paragraphs (b)(1) and (b)(3) of the EAR. In addition, former paragraph (b)(2)(i) concerning transactions previously reviewed prior to October 19, 2000 by the U.S. Government is removed as the passage of time has made this paragraph unnecessary. Former paragraph (b)(2)(ii) that set forth the review request requirement is removed, as the review request requirement has been moved to the introductory text of paragraph (b)(2). Former paragraph (b)(2)(iii) is replaced by the introductory text of paragraph (b)(2).
This rule revises new paragraph (b)(2)(i), (Network infrastructure software and commodities) by adding “digital packet telephony/media (voice/video/data) over internet protocol” to the list of capabilities described.
Also in this new paragraph (b)(2)(i), the former paragraph (b)(2)(iii)(A) reference to “64 bits for symmetric algorithms” is changed to “80 bits for symmetric algorithms”, commensurate with the key length change in new paragraph (b)(1)(ii)(B). (Note: Regarding key length with respect to the authorizations and restrictions set forth in both the current and former versions of License Exception ENC § 740.17(b)(2), only `network infrastructure' commodities and software (sub-paragraph (i) in this rule) are distinguished by key length. All encryption commodities and software now enumerated in sub-paragraphs (ii)-(vi) (former sub-paragraphs (iiii)(B)-(iii)(F)) of License Exception ENC paragraph (b)(2) are controlled to “government end-users” as described, regardless of key length.)
Former paragraph (b)(2)(iii)(A)(1), new paragraph § 740.17(b)(2)(i)(A) is clarified by this rule to add quotes around the term “government end-user(s)” and now reads as follows, “Been designed, modified, adapted or customized for “government end-user(s)” or government end-use (e.g., to secure police, state security, or emergency response communications).”
This rule further revises former paragraph (b)(2)(iii)(A)(1), new paragraph (b)(2)(i)(A), which addresses aggregate encrypted WAN, MAN, VPN or backhaul throughput, by increasing the parameter from 44 Mbps to 90 Mbps.
This rule further revises former paragraph (b)(2)(iii)(A)(2), new paragraph (b)(2)(i)(B). The Wire (line), cable or fiber optic WAN, MAN or VPN single-channel input data rate is revised from “44 Mbps” to “154 Mbps.”
These revisions are not expected to result in a decrease in the number of license applications submitted for exports and reexports of items described in paragraph (b)(2) to government end-users. Most network infrastructure items currently being exported to government end-uses exceed these performance parameters. However, BIS has determined that the parameters should be adjusted in recognition of technology advances, and to avoid maintaining controls on legacy systems.
This rule replaces the “Maximum number of concurrent encrypted data tunnels or channels * * *” parameter in former paragraph (b)(2)(iii)(A)(3), new paragraph (b)(2)(i)(C) with “Media (voice/video/data) encryption or centralized key management supporting more than 250 concurrent encrypted data channels, or encrypted signaling to more than 1,000 endpoints, for digital packet telephony/media (voice/video/data) over internet protocol communications.” These amendments update these provisions of License Exception ENC to reflect advances in encryption technology. Specifically, these amendments address cryptographic developments in Datagram Transport Layer Security (DTLS)—Secure Real-Time Transport Protocol (SRTP), and encrypted communications signaling, for large Voice over Internet Protocol (VoIP) network infrastructures.
This rule also revises former paragraph (b)(2)(iii)(A)(4)(i), new paragraph (b)(2)(i)(D)(1), which addresses Air-interface coverage capabilities, by changing “maximum data rates” to “maximum transmission data rates” and changing the parameter from “5 Mbps” to “10 Mbps.” By limiting this License Exception ENC provision to the transmit (upstream) data rates and doubling the licensing threshold, these amendments reflect technology developments for certain satellite and other long-range wireless devices.
Former paragraph (b)(2)(iii)(B) that addressed encryption source code that would not be eligible for export or reexport under License Exception TSU is moved to new paragraph (b)(2)(ii), but also appears in new paragraph (b)(1)(ii)(B) for review requests that include a copy of the source code, and Start Printed Page 57498may be exported or reexported without a waiting period under License Exception ENC when the review request is registered with BIS.
Former paragraph (b)(2)(iii)(C), new paragraph (b)(2)(iii) is revised by removing the reference to the open cryptographic interface restriction, because this restriction is now placed in the introductory text of paragraph 740.17(b).
Former paragraph (b)(2)(iii)(C)(1), new paragraph (b)(2)(iii)(A) is amended by revising the phrase “Been modified or customized for” to read “been designed, modified, adapted or customized for.” Quotes have been added around the term “government end-user(s)” to indicate that this term is defined in part 772 of the EAR.
This rule also revises the phrase “to secure departmental, police, state security, or emergency response communications” to read “to secure police, state, security, or emergency response communications, including encryption commodities and software for external Security Operations Center (SOC)/Network Operations Center (NOC) command and infrastructure, and digital forensics/computer forensics.” With this clarification, this rule provides examples of three such systems that are controlled for their inherent government end-use: External Security Operations Center (SOC)/Network Operations Center (NOC) command and infrastructure; public safety radio (e.g., implementing Terrestrial Trunked Radio (TETRA) and/or Association of Public-Safety Communications Officials International (APCO) Project 25 (P25) standards); and digital forensics/computer forensics.
Note:
Regarding the use of encryption by a computer forensics/digital forensics commodity or software (e.g., for securing the collection, examination, and/or reporting of data or metadata on an investigated computer), such digital/computer forensics tools would not be considered “cryptanalytic items” if the only use of “cryptography” is for encryption. However, such tools that also perform “cryptanalysis” (e.g., cracking passwords or employing other cryptanalytic techniques to derive user-encrypted data or metadata from a computer or network) would be controlled as “cryptanalytic items.”
Former paragraph (b)(2)(iii)(E), new paragraph (b)(2)(v) is revised by adding a clarifying phrase after the term “quantum cryptography” to read “as defined in ECCN 5A002 of the Commerce Control List.”
Former paragraph (b)(2)(iii)(F), new paragraph (b)(2)(vi) is revised by replacing the term “controlled” with “classified under” to clarify the scope of computers in this paragraph.
Section 740.17(b)(3)
This rule revises paragraph § 740.17(b)(3) of the EAR for export or reexport of commodities and software not listed in § 740.17(b)(2) of the EAR by both “government end-users” and non-“government end-users” by removing the redundant former paragraph (b)(3)(ii)(B) that explained the review procedures and instead inserting a reference to paragraph § 740.17(d) that sets forth these procedures. In addition, former paragraph (b)(3)(ii)(A) concerning transactions previously reviewed by the U.S. Government is removed as the passage of time has made this paragraph unnecessary. Former paragraph (b)(3)(i)(A) that set forth the ineligibility of commodities and software that provide an “open cryptographic interface” is removed because this restriction is set forth in the introductory text of paragraph 740.17(b). This rule adds text that clarifies the eligible locations of the end-users, because 740.17(a) addresses all exports to Supplement No. 3 countries. This rule relocates the restriction in former paragraph (f)(1) concerning “cryptanalytic items” to the introductory text of paragraph (b)(3).
Section 740.17(b)(4)
Former paragraph 740.17(b)(4)(i), setting forth commodities and software that are eligible for export immediately upon registration of a review request, is moved to new paragraph (b)(1)(ii). In addition, previous paragraph 740.17(b)(4)(ii), setting forth exclusions from review requirements for certain items, is reformatted as paragraph 740.17(b)(4).
Former paragraph (b)(4)(ii)(A) for short-range wireless encryption is now in new paragraph (b)(4)(i). This rule adds examples to this paragraph of short-range wireless commodities and software. An informative sentence is also added to notify the reader that certain items excluded by this paragraph may also be excluded from review under (b)(4)(iii) (personal area networks) or (b)(4)(iv) (commodities and software that provide “ancillary cryptography”).
Former paragraph (b)(4)(ii)(B) is replaced by the third, fourth, and fifth sentences of former paragraph (c), which pertains to foreign products developed with or incorporating U.S.-origin encryption source code, components, or toolkits.
This rule adds two new review requirement exclusion paragraphs. The first new paragraph (b)(4)(iii) is for wireless “personal area network” items. This rule adds the term “personal area network” and definition, as well as examples to part 772. The other new exclusion paragraph (b)(4)(iv) is for “ancillary cryptography,” which is also a newly added term/definition in part 772. The term/definition includes examples of “ancillary cryptography.” The U.S. Government has determined that it is not necessary to review the encryption functionality of such items.
Reexports and Transfers
This rule clarifies the second sentence in § 740.17(c) of the EAR (restricted transfers) by adding quotes around the term “government end-users” for consistency. The third and fourth sentences in this section concerning foreign products developed with or incorporating U.S.-origin encryption products are moved to new paragraph (b)(4)(ii), because it was misplaced and redundant to text already included in another paragraph of License Exception ENC.
Review Request Procedures
This rule removes former paragraph (d)(1) “Instructions for requesting review” because these instructions were redundant and inconsistent with the instructions for submissions on Form BIS-748P (Multipurpose Application) found in Part 748 of the EAR. Instructions for such submissions belong in Part 748 of the EAR.
This rule reformats former paragraph (d)(2) “Action by BIS” because this paragraph was entirely too long and needed to be divided by subject matter. The new subparagraph titles are: (i) Notification; (ii) After 30 days; and (iii) Hold Without Action (HWA).
This rule moves former paragraph (d)(3), “key length increases,” to the reporting requirement section under new paragraph (e)(2), because this requirement is in actuality a reporting requirement and not a review requirement. This report is required for commodities and software that, after having been reviewed and authorized for License Exception ENC by BIS, are modified only to upgrade the key length used for confidentiality or key exchange algorithms. This rule also makes the new key length a required element of the report.
Reporting Requirements
The reporting requirements for License Exception ENC are now split into two sections: Semiannual reporting requirement and reporting key length increases. This rule clarifies that the Commodity Classification Automated Tracking System (CCATS) number is a required element of the report. This rule removes former paragraph (e)(2)(iv), Start Printed Page 57499which required a report for exports of ECCN 5E002 items to be used for technical assistance that are not released by 744.9, because this rule removed section 744.9 of the EAR. This rule also clarifies the purpose and scope of paragraph (e)(3), regarding reportable information on foreign manufacturers and products that use encryption items in countries not listed in Supplement No. 3 to part 740.
Reporting Exclusions
This rule revises the exclusion set forth in former paragraph (e)(4)(i), new paragraph (e)(1)(iii)(A), by removing the reference to paragraph (b)(1), because (b)(1) did not require prior review or post export reporting, therefore this rule moved (b)(1) to new paragraph (a)(2).
In new paragraph (e)(1)(iii)(F), this rule expands the exclusion that was in former paragraph (e)(4)(vi) for components limited to providing short-range wireless encryption functions, by making the reporting exclusion apply to all of the items in the new paragraph (b)(4), which are those items that are excluded from review requirements (certain commodities and software that provide short-range wireless; foreign products developed with or incorporating U.S.-origin encryption source code (that have not entered United States for subsequent export), components, or toolkits; wireless “personal area network” items; and “ancillary cryptography” commodities and software).
Lastly, in new paragraph (e)(1)(iii)(J), this rule adds a new provision to exclude from reporting requirements exports of items that have been determined, on a case-by-case basis do not require the burden of semi-annual reporting. Certain exports of items that do not qualify for mass market treatment, but are authorized under License Exception ENC are not of interest for national security reasons, therefore do not warrant reporting requirements. Exporters will be notified of this exclusion on issued Commodity Classification Automated Tracking System (CCATS) documents.
Restrictions
Former paragraph § 740.17(f) “Restrictions” is removed, because the restrictions that were in this paragraph are integrated into the introductory paragraph to § 740.17 or specific paragraphs for which they apply.
Supplement No. 3 to Part 740
This rule revises the title of Supplement No. 3 to part 740 to read “License Exception ENC Favorable Treatment Countries,” because the former title of “Countries Eligible for the Provisions of § 740.17(a)” is no longer correct, as these countries are now eligible for provisions of § 740.17(b)(1) of the EAR. This rule adds Bulgaria, Canada, Iceland, Romania, and Turkey to the list of countries in Supplement No. 3 to part 740 of the EAR. Bulgaria and Romania joined the European Union by accession on January 1, 2007. The addition of Canada is simply for clarity, as licenses are not required to Canada for Encryption Items (pursuant to § 742.15(a)(1)) and License Exception ENC has been available for subsidiaries and offices of the Canadian government and private-sector end-users (along with the previous Supplement No. 3 to part 740 list of countries). Turkey and Iceland are added because they are members of the North Atlantic Treaty Organization (NATO). This will increase eligibility under License Exception ENC under new paragraphs § 740.17(a)(1) and (b)(1) of the EAR, which will decrease the necessity for submitting license applications, review requests, and semiannual reports.
This revision will reduce the number of license applications submitted to BIS for the export or reexport of encryption products classified under ECCNs 5A002 and 5D002 to Bulgaria, Iceland, Romania, and Turkey by 95 percent (approximately $37 million in exports and reexports for CY 2007). This revision will not change the amount of license applications received by BIS for the export or reexport of encryption products to Canada, because Canada, while not included in the list of countries that received favorable treatment under License Exception ENC, already received such benefits.
Section 742.15 “Encryption Items”
Paragraph 742.15(a) is revised by more specifically describing what is EI controlled under ECCNs 5A002, 5D002, and 5E002. This revision harmonizes with changes this rule makes to the license requirements paragraphs of these ECCNs. In addition, a sentence is added that advises exporters to review License Exception ENC prior to submitting a license to BIS. Also, the phrase “on a computer system” is removed from the introductory text of § 742.15 in order to be more consistent with the first Note in the License Requirement section of ECCN 5D002.
Section 742.15(a)(2) License Requirements and Review Policy for ECCNS 5A992, 5D992, and 5E992
This rule removes former paragraph 742.15(a)(2), which explained license requirements and review policy for items classified under ECCNS 5A992, 5D992, and 5E992, because the purpose of § 742.15 is to set forth the license requirements and review policies for items controlled for encryption item (EI) reasons and these items are controlled for anti-terrorism (AT) reasons only. The license requirements and review policy for these items are found under appropriate anti-terrorism sections of part 742.
This rule removes the second sentence of 742.15(a)(2), because the indefinite language did not add to the transparency of licensing policy. The sentence stated, “Exports and reexports of encryption items to governments, or to Internet and telecommunications service providers for the provision of services specific to governments, may be favorably considered.” This rule removes the extraneous phrase “including those which authorize exports and reexports of encryption technology to strategic partners (as defined in § 772.1 of the EAR) of U.S. companies.” To be more transparent, this rule adds the phrase “or pre-shipment notification” to explain that ELAs may require pre-shipment notification. This rule adds a note to paragraph (a)(2) to remind exporters that once mass market encryption commodities and software have been reviewed by BIS and the ENC Encryption Request Coordinator (Ft. Meade, MD) and released from “EI” and “NS” controls pursuant to § 742.15(b) of the EAR, they are classified under ECCN 5A992 and 5D992 respectively, and are thereafter outside the scope of this section.
This rule removes the notification and review requirements for items classified under ECCNs 5A992, 5D992, and 5E992, which were set forth in former paragraphs § 742.15(b) introductory paragraph and § 742.15 (b)(1) of the EAR.
This rule adds a reference to the ENC Encryption Request Coordinator (FT. Meade, MD) with regard to the requirement for review of mass market encryption commodities and software.
Specific instructions for how to fill out form 748P (multipurpose application) for submission of a review request has been removed, because these instructions were redundant and inconsistent with the instructions found in paragraph (r) of Supplement No. 2 to part 748 of the EAR. Instead, a reference to this paragraph (r) is added to new paragraph 742.15(b)(1) “Procedures for requesting review.”
This rule removes former paragraph (b)(2)(iii) that provided authorization under the designation of “no license required (NLR)” for exports and reexports of encryption commodities Start Printed Page 57500and software pending mass market treatment review by BIS to government and non-government end-users located in countries listed in Supp. No. 3 to part 740 of the EAR or for internal use of foreign subsidiaries or offices of firms, organizations and governments headquartered in Canada or in countries listed in Supp. No. 3 to part 740 of the EAR. This authorization was based on a temporary classification under ECCNs 5A992 and 5D992, which is inconsistent with the way other items are classified in the EAR, therefore this provision is removed. Instead, encryption commodities and software will remain under the classification of ECCN 5A002 and 5D002 until 30 days have passed since registration of the submitted review request or BIS issues a classification under ECCN 5A992 or 5D992. However, this rule creates a new authorization under License Exception ENC for such commodities and software pending a decision by BIS concerning mass market treatment under new paragraph 740.17(b)(1) of the EAR. This rule adds explanatory text about this new procedure in (b)(2) “Action by BIS.”
Section 742.15(b)(3) Exclusions for Notification and Review Requirements
This rule removes the former exclusion paragraphs, because it is no longer applicable and is replaced by new exclusion paragraphs from mass market review requirements under § 742.15(b). There are three new exclusions: Certain short range wireless commodities and software, wireless “personal area network” items, and “ancillary cryptography” commodities and software.
Section 742.15(b)(4) Dormant Encryption and Enabling Software and Commodities
This rule condenses this paragraph to remove text that pertained to ECCNs 5A992 and 5D992.
Section 742.15(b)(5) Examples of Mass Market Software
The phrase “designed for, bundled with, or pre-loaded on single CPU computes” is revised to read “designed for computers classified as ECCN 4A994 or EAR99.” This phrase was changed to remove outdated and confusing text related to computers. This rule also removes the last phrase “and commodities and software exported via free or anonymous downloads.” This phrase was removed because it confused the public, in that it led people to believe that if they incorporated free encryption software or open source encryption into their products that it was not subject to the EAR, which is not the case.
Supplement No. 6 to Part 742 “Guidelines for Submitting Review Requests for Encryption Items”
The option to fax support documents is removed, because that method has been replaced by either e-mailing the document in PDF or sending the document by mail. A requirement to obtain express mail certification of the mailing of support documentation is added for those that intend to rely on the 30 day registration provisions of the EAR.
Paragraph (a) is divided into 5 subparagraphs that clarify existing review requirements and procedures. Former paragraph (a) is now new subparagraph (a)(1), and is revised to add a requirement to include a brief non-technical description of the type of product being submitted, e.g., routers, disk drives, cell phones, chips, etc. Part of the introductory paragraph to Supp. No. 6 that addressed prior reviews is moved to a new subparagraph (a)(2), and is revised to add a requirement, for products with minor changes in encryption functionality, to include a cover sheet with complete reference to the previous review (CCATS#, Application Control Number (ACN), ECCN, authorization paragraph) along with a clear description of the changes. New subparagraph (a)(3) requires a description of how encryption is used in the product and the categories of encrypted data (i.e., stored data, communications, management data, internal data, etc.). New subparagraph (a)(4) requires, for mass market reviews, a specific description of who will be receiving the product and how the product is being marketed, as well as how this method of marketing and other relevant information (e.g., cost of product and volume of sales) is described by the Cryptography Note (Note 3 to Category 5, Part 2). New subparagraph (a)(5) clarifies information about any encryption source code being used.
Subparagraph (c)(1) is amended by adding the phrase “including relevant parameters, inputs and settings” to the end of the first sentence. Subparagraph (c)(6) is amended by adding more examples of communication and cryptographic functions, as well as replacing the term “encryption protocols” with a more accurate term “cryptographic protocols and methods.” An additional requirement is added to (c)(6) to describe how the protocols that are supported are used. The text of (c)(11) is revised to more clearly describe the information that would assist BIS.
The introductory text for paragraphs (d) and (e) is clarified.
Section 744.9 “Restrictions on Technical Assistance by U.S. Persons With Respect to Encryption Items”
This rule removes § 744.9 of the EAR that required authorization from BIS for U.S. persons to provide technical assistance (including training) to foreign persons with the intent to aid a foreign person in the development or manufacture outside the United States of encryption commodities or software that, if of U.S.-origin, would be “EI” controlled under ECCNs 5A002 or 5D002. Section 744.9 was added to the EAR in 1996 when jurisdiction over dual-use encryption items was transferred from the Department of State to the Department of Commerce. Technical assistance is treated differently under the International Trade in Arms Regulations (ITAR) than it is in EAR. Technical assistance is considered a form of “technology” under the definition of “technology” in section 772.1 of the EAR. The EAR states that technical assistance “may take forms such as instruction, skills training, working knowledge, consulting services” and that it “may involve transfer of ‘technical data.’ ” When a person performs technical assistance, which draws upon “development,” “production,” or “use” “technology” obtained in the United States or that is of U.S.-origin, then a release of “technology” takes place, which is considered an export or reexport and may require authorization under the EAR. BIS has observed that there is rarely an application for a license submitted under the requirements of section 744.9; however, requests for authorization under section 744.9 are often included in license applications for export of ECCN 5E002 Technology. This has led BIS to conclude that people are submitting license applications for technology exports and reexports when involved in technical assistance. Therefore, to harmonize the understanding of technical assistance as it is understood in the EAR with the practical application of it by the public, BIS is removing section 744.9. This removal does not remove any license requirements for controlled encryption technology released while performing technical assistance. This amendment does not affect the scope of the note in former 744.9 in that the mere teaching or discussion of information about cryptography, including, for example, in an academic setting or in the work of groups or bodies engaged in standards Start Printed Page 57501development, by itself would not establish a license requirement under ECCN 5E002, even where foreign persons are present. Section 744.9 is replaced by a “license requirement” note in ECCN 5E002 on the Commerce Control List.
Supplement No. 2 to Part 748 “Unique Application and Submission Requirements”
This rule adds a sentence instructing applicants to place an “X” in the box marked “classification request” in Block 5 (Type of Application) of Form BIS-748P or select “Commodity Classification” if filing electronically, because neither the electronic nor paper forms provide a separate Block to check for submission of encryption review requests.
Section 750.3 Review of License Application by BIS and Other Government Agencies and Departments
This rule makes an editorial correction by removing paragraph (b)(2)(iv) and redesignating (b)(2)(v) as (b)(2)(iv). This paragraph referred to the Arms Control and Disarmament Agency (ACDA), which no longer exists. However, ACDA's personnel and functions were absorbed by the Department of State in 1999. Therefore, this rule revises paragraph (b)(2)(iii) by adding national security and nuclear nonproliferation to the description of State Department's concerns. Missile technology is also added as a State Department concern because the State Department chairs the Missile Technology Export control interagency working group.
Section 750.7 Issuance of Licenses
This rule removes paragraph (c)(2), which explained how to amend your Encryption License Agreement (ELA) by letter. BIS has observed a trend that industry has been submitting license applications for replacement or new ELAs when they want a change. In addition, it is more efficient for applicants to apply and track applications than letters, because of BIS' electronic application system. It is also easier for BIS to process and track submissions of applications than letters for the same reason. Therefore, this provision is removed.
This rule removes the third and fourth sentences in the introductory text of paragraph (d) that pertain to the responsibilities of a licensee with regard to ELAs. These sentences are removed, because a licensee may not transfer its license responsibilities.
Section 762.2 Records To Be Retained
This rule removes paragraph (b)(8), which referred to records related to key escrow encryption items under License Exception KMI. This rule removes License Exception KMI and Supplement No. 4 to part 742 “Key Escrow or Key Recovery Products Criteria,” therefore this recordkeeping requirement no longer exists.
Section 770.2 Item Interpretations
This rule moves paragraph (n) “Interpretation 14: Encryption commodity and software reviews,” to a new note under paragraphs 740.17(b) and 742.15(b), so that exporters do not miss this important information about when to submit a new product review when a change has occurred in the encryption product. The text of this paragraph is also revised for clarity. The note explains that a new product review is not required when a change involves: the subsequent bundling, patches, upgrades or releases of a product; name changes; or changes to a previously reviewed encryption product limited to updates in an encryption software component (e.g., version updates of an encryption library that is called by a product to provide encryption functionality where the encryption library has either already been reviewed or did not require prior review.)
Section 772.1 Definition of terms as used in the Export Administration Regulations (EAR)
This rule removes the definition of “strategic partner” as this term is not used in the control or licensing of encryption items. This rule also adds definitions for two new terms “ancillary cryptography” and “personal area network,” which are associated with new review and reporting exclusions in License Exception ENC.
Commerce Control List—Supplement No. 1 to Part 774
This rule revises the Nota Bene to the Cryptography Note at the beginning of Category 5 Part 2 in order to harmonize it with the revisions in this rule.
This rule clarifies what is controlled for “EI” reasons in ECCNs 5A002, 5D002, and 5E002 by replacing the text “EI applies to encryption items transferred from the U.S. Munitions List to the Commerce Control List consistent with E.O.13026 of November 15, 1996 (61 FR 58767) and pursuant to the Presidential Memorandum of that date. Refer to § 742.15 of this subchapter.” with appropriate text that refers to specific paragraphs within those ECCNs for which EI applies. For ECCN 5A002, the new EI control reads “EI applies to 5A002.a.1, a.2, a.5, a.6 and a.9. Refer to § 742.15 of the EAR.” For ECCN 5D002, the new EI control reads, “EI applies to “software” in 5D002.a or c.1 for equipment controlled for EI reasons in ECCN 5A002. Refer to § 742.15 of the EAR.” For ECCN 5E002, the new EI control reads, “EI applies to “technology” for the “development,” “production,” or “use” of commodities or “software” controlled for EI reasons in ECCNs 5A002 or 5D002. Refer to § 742.15 of the EAR.” In addition, License Exception ENC is added to the License Exception section of each of these ECCNs, because it is the principal license exception for EI controlled items.
ECCN 5A002
This rule removes the license requirement notes section from ECCN 5A002, because there is no Wassenaar reporting requirement for this ECCN. In addition, this rule makes editorial corrections to the Related Controls paragraph by replacing the use of the term “items” with commodities when referring to ECCN 5A002 and 5A992. Moreover, this rule clarifies that if commodities are listed in paragraphs (a) through (f) in the Note to 5A002, and therefore the commodities are classified under ECCN 5A992, then the related software and technology are classified under ECCNs 5D992 and 5E992, respectively. This rule also revises Related Controls note 2 to be consistent with the mass market review procedures of § 742.15 of the EAR. This note now reads “2) After a review and classification by BIS, mass market encryption commodities that meet eligibility requirements are released from “EI” and “NS” controls. These commodities are classified under ECCN 5A992.c. See § 742.15(b) of the EAR.”
ECCN 5A992
This rule revises the anti-terrorism (AT) controls for ECCN 5A992, by placing the entire entry under AT Column 1 controls, for ease of understanding and compliance. This rule adds a new paragraph 5A992.c. This new paragraph clarifies that a mass market commodity is classified under ECCN 5A992 upon completion of Government review of a commodity in accordance with paragraph 742.15(b) of the EAR, when that review determines that the commodity meets the requirements for mass market treatment. Encryption items are no longer presumed eligible for mass market treatment while pending Government review. Start Printed Page 57502
ECCN 5D002
This rule removes the third note in the License Requirement section, because the information in it does not harmonize with the revision made in this rule. In addition, this rule adds another note to the Related Controls paragraph to inform the public about the review and classification of mass market software.
ECCN 5D992
This rule revises the anti-terrorism (AT) controls for ECCN 5D992, by placing the entire entry under AT Column 1 controls, for ease of understanding and compliance. Paragraphs 5D992.a.1 and a.2, and 5D992.b.1 and b.2, are combined as 5D992.a and 5D992.b, respectively, in order to simplify the entry. This rule also removes paragraph 5D992.c (“software” designed or modified to protect against malicious computer damage, e.g., viruses) from ECCN 5D992, while adding a note in the Related Control stating, “This entry does not control “software” designed or modified to protect against malicious computer damage, e.g., viruses, where the use of “cryptography” is limited to authentication, digital signature and/or the decryption of data or files.” Certain software for protection against malicious damage that meet the criteria of the Related Control note are thus now decontrolled and classified as EAR99, unless the software performs functions that are controlled under other ECCNs (whether under Category 5, part 2 or elsewhere in the Commerce Control List). Such software remains subject to the EAR and may be classified under ECCN 5D002 or 5D992 if it performs cryptographic functionality controlled by these Category 5, part 2 ECCNs (e.g., data or file encryption, including of user or system data under Secure Socket Layer (SSL) encryption, even if the cryptographic functionality is not directly user accessible.) Examples of software decontrolled by this change include certain firewall and other software for the screening of digital content and the detection and removal of viruses, spyware and unsolicited commercial e-mail.
This rule also adds a new paragraph 5D992.c. This paragraph clarifies that mass market software is classified under ECCN 5D992.c upon completion of Government review of the software in accord with § 742.15 of the EAR when that review determines that the software meets the requirements for mass market treatment. Encryption software is no longer presumed eligible for mass market treatment.
ECCN 5E002
This rule adds a License Requirement Note to remind people to consider the possibility of the release of technology when performing technical assistance; the note reads, “When a person performs or provides technical assistance that incorporates, or otherwise draws upon, “technology” that was either obtained in the United States or is of U.S.-origin, then a release of the “technology” takes place. Such technical assistance, when rendered with the intent to aid in the “development” or “production” of encryption commodities or software that would be controlled for “EI” reasons under ECCN 5A002 or 5D002, may require authorization under the EAR even if the underlying encryption algorithm to be implemented is from the public domain or is not of U.S. origin.” In addition, in order to harmonize with the revisions in this rule and for consistency, this rule adds text to the Related Controls paragraph of the List of Items Controlled section to read “This entry does not control “technology” “required” for the “use” of equipment excluded from control under the Related Controls paragraph or the Technical Notes in ECCN 5A002 or “technology” related to equipment excluded from control under ECCN 5A002. This “technology” is classified as ECCN 5E992.”
ECCN 5E992
This rule revises the anti-terrorism (AT) controls for ECCN 5E992, by placing the entire entry under AT Column 1 controls, for ease of understanding and compliance. This rule revises the references in 5E992.a and .b to conform to revisions included in this rule.
Although the Export Administration Act expired on August 20, 2001, the President, through Executive Order 13222 of August 17, 2001, 3 CFR, 2001 Comp., p. 783 (2002), as extended by the Notice of July 23, 2008, 73 FR 43603 (July 25, 2008), has continued the Export Administration Regulations in effect under the International Emergency Economic Powers Act.
Rulemaking Requirements
1. This interim final rule has been determined to be not significant for purposes of Executive Order 12866.
2. Notwithstanding any other provision of law, no person is required to respond to, nor shall any person be subject to a penalty for failure to comply with a collection of information subject to the requirements of the Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et. seq.) (PRA), unless that collection of information displays a currently valid Office of Management and Budget (OMB) Control Number. This rule involves two collections of information subject to the PRA. One of the collections has been approved by OMB under control number 0694-0088, “Multi Purpose Application,” and carries a burden hour estimate of 58 minutes for a manual or electronic submission. The other collection has been approved by OMB under control number 0694-0104, “Commercial Encryption Items Under the Jurisdiction of the Department of Commerce,” and carries a burden hour estimate of 7 hours for a manual or electronic submission. Send comments regarding these burden estimates or any other aspect of these collections of information, including suggestions for reducing the burden, to Jasmeet Seehra, OMB Desk Officer, by e-mail at jseehra@omb.eop.gov or by fax to (202) 395-7285; and to the Office of Administration, Bureau of Industry and Security, Department of Commerce, 14th and Pennsylvania Avenue, NW., Room 6622, Washington, DC 20230.
3. This rule does not contain policies with Federalism implications as that term is defined under Executive Order 13132.
4. The provisions of the Administrative Procedure Act (5 U.S.C. 553) requiring notice of proposed rulemaking, the opportunity for public participation, and a delay in effective date, are inapplicable because this regulation involves a military and foreign affairs function of the United States (5 U.S.C. 553(a)(1)). Further, no other law requires that a notice of proposed rulemaking and an opportunity for public comment be given for this interim final rule. Because a notice of proposed rulemaking and an opportunity for public comment are not required to be given for this rule under the Administrative Procedure Act or by any other law, the analytical requirements of the Regulatory Flexibility Act (5 U.S.C. 601 et. seq.) are not applicable. Therefore, this regulation is issued in interim final form. Although there is no formal comment period, public comments on this regulation are welcome on a continuing basis. Comments should be submitted to Sharron Cook, Office of Exporter Services, Bureau of Industry and Security, Department of Commerce, 14th and Pennsylvania Ave., NW., Room 2705, Washington, DC 20230.
Start List of Subjects Start Printed Page 57503List of Subjects
15 CFR Parts 732, 740, 748 and 750
- Administrative practice and procedure
- Exports
- Reporting and recordkeeping requirements
15 CFR Parts 738, 770 and 772
- Exports
15 CFR Part 744
- Exports
- Reporting and recordkeeping requirements
- Terrorism
15 CFR Part 742
- Exports
- Terrorism
15 CFR Part 746
- Exports
- Reporting and recordkeeping requirements
15 CFR Part 762
- Administrative practice and procedure
- Business and industry
- Confidential business information
- Exports
- Reporting and recordkeeping requirements
15 CFR Part 774
- Exports
- Reporting and recordkeeping requirements
Accordingly, parts 732, 734, 738, 740, 742, 744, 746, 748, 750, 762, 770, 772 and 774 of the Export Administration Regulations (15 CFR parts 730-774) are amended as follows:
End Amendment Part Start PartPART 732—[AMENDED]
End Part Start Amendment Part1. The authority citation for part 732 is revised to read as follows:
End Amendment Part Start Amendment Part2. Section 732.2 is amended by revising paragraph (b) to read as follows:
End Amendment PartSteps Regarding Scope of the EAR* * * * *(b) Step 2: Publicly available technology and software. This step is relevant for both exports and reexports. Determine if your technology or software is publicly available as defined and explained at part 734 of the EAR. Supplement No. 1 to part 734 of the EAR contains several practical examples describing publicly available technology and software that are outside the scope of the EAR. The examples are illustrative, not comprehensive. Note that encryption software controlled for EI reasons under ECCN 5D002 on the Commerce Control List (refer to Supplement No.1 to Part 774 of the EAR) and mass market encryption software with symmetric key length exceeding 64-bits classified under ECCN 5D992 shall be subject to the EAR even if publicly available. Accordingly, the provisions of the EAR concerning the public availability of items are not applicable to encryption items controlled for “EI” reasons under ECCN 5D002 and mass market encryption software with symmetric key length exceeding 64-bits classified under ECCN 5D992.
* * * * *PART 734—[AMENDED]
End Part Start Amendment Part3. The authority citation for part 734 is revised to read as follows:
End Amendment Part Start Amendment Part4. Section 734.3 is amended by adding a note to paragraph (a)(4) to read as follows:
End Amendment PartItems Subject to the EAR(a) * * *
(4) * * *
Note to paragraph (a)(4):
Certain foreign-manufactured items developed or produced from U.S.-origin encryption items exported pursuant to License Exception ENC are subject to the EAR. See sections 740.17(a) and 740.17(b)(4)(ii) of the EAR.
5. Supplement No. 1 to part 734 is amended by revising the introductory paragraph to read as follows:
End Amendment PartSupplement No. 1 to Part 734—Questions and Answers—Technology and Software Subject to the EAR
This Supplement No. 1 contains explanatory questions and answers relating to technology and software that is subject to the EAR. It is intended to give the public guidance in understanding how BIS interprets this part, but is only illustrative, not comprehensive. In addition, facts or circumstances that differ in any material way from those set forth in the questions or answers will be considered under the applicable provisions of the EAR. Exporters should note that the provisions of this supplement do not apply to encryption software classified under ECCN 5D002 for “EI” reasons on the Commerce Control List or to mass market encryption software with symmetric key length exceeding 64-bits classified under ECCN 5D992. This Supplement is divided into nine sections according to topic as follows:
* * * * *Start PartPART 738—[AMENDED]
End Part Start Amendment Part6. The authority citation for part 738 continues to read as follows:
End Amendment Part Start Amendment Part7. Section 738.4 is amended by revising paragraphs (a)(1) and (a)(2)(ii)(B) to read as follows:
End Amendment PartDetermining Whether a License Is Required(a) * * *
(1) Overview. Once you have determined that your item is classified under a specific ECCN, you must use information contained in the “License Requirements” section of that ECCN in combination with the Country Chart to decide whether a license is required. Note that not all license requirements set forth under the “License Requirements” section of an ECCN refer you to the Commerce Country Chart, but in some cases this section will contain references to a specific section in the EAR for license requirements. In such cases, this section would not apply.
(2) * * *
(ii) * * *
(B) If no, a license is not required based on the particular Reason for Control and destination. Provided that General Prohibitions Four through Ten do not apply to your proposed transaction and that any applicable review requirements described in § 742.15(b) of the EAR have been met for certain mass market encryption items controlled under ECCNs 5A992 or 5D992, you may effect your shipment using the symbol “NLR.” Proceed to parts 758 and 762 of the EAR for information on export clearance procedures and recordkeeping requirements. Note that although you may stop after determining a license is required based on the first Reason for Control, it is best to work through each applicable Reason for Control. A full analysis of every possible licensing requirement based on each applicable Reason for Control is required to determine the most advantageous License Exception available for your particular transaction and, if a license is Start Printed Page 57504required, ascertain the scope of review conducted by BIS on your license application.
* * * * *PART 740—[AMENDED]
End Part Start Amendment Part8. The authority citation for part 740 continues to read as follows:
End Amendment Part Start Amendment Part9. Section 740.3 is amended by revising paragraph (d)(5) to read as follows:
End Amendment PartShipments of Limited Value (LVS)* * * * *(d) * * *
(5) Exports and reexports of encryption components or spare parts. For components or spare parts controlled for “EI” reasons under ECCN 5A002, exports and reexports under this License Exception must be destined to support a commodity previously authorized for export or reexport.
* * * * *[Removed]10. Remove and reserve § 740.8.
End Amendment Part[Amended]11. Section 740.13 is amended by removing the quotation marks around the term “mass market” in paragraph (d) heading, paragraph (d)(1), footnote 1, paragraph (d)(3)(i) and paragraph (d)(3)(ii).
End Amendment Part Start Amendment Part12. Section 740.17 is revised to read as follows:
End Amendment PartEncryption Commodities, Software and Technology (ENC).License Exception ENC authorizes export and reexport of software and commodities and components therefor that are classified under ECCNs 5A002.a.1, a.2, a.5, a.6 or a.9, 5B002, 5D002, and technology that is classified under ECCN 5E002. This License Exception ENC does not authorize export or reexport to, or provision of any service in any country listed in Country Group E:1 in Supplement No. 1 to part 740 of the EAR, or release of source code or technology to any national of a country listed in Country Group E:1. Reexports and transfers under License Exception ENC are subject to the criteria set forth in paragraph (c) of this section. Paragraph (d) of this section sets forth information about review requests required by this section. Paragraph (e) sets forth reporting required by this section.
(a) No prior review or post export reporting required—(1) Internal “development” or “production” of new products. License Exception ENC authorizes exports and reexports of items described in paragraph (a)(1)(i) of this section, to end-users described in paragraph (a)(1)(ii) of this section, for the intended end-use described in paragraph (a)(1)(iii) of this section without prior review by the U.S. Government.
(i) Eligible items. Eligible items are those classified under ECCNs 5A002.a.1, .a.2, .a.5, .a.6, or .a.9, 5B002, 5D002, or 5E002.
(ii) Eligible end-users. Eligible end-users are “private sector end-users” wherever located, except to countries listed in Country Group E:1 (see Supplement No. 1 to part 740 of the EAR) that are headquartered in a country listed in Supplement No. 3 of this part.
Note to paragraph (a)(1)(ii): A “private sector end-user” is:
(1) An individual who is not acting on behalf of any foreign government; or
(2) A commercial firm (including its subsidiary and parent firms, and other subsidiaries of the same parent) that is not wholly owned by, or otherwise controlled by or acting on behalf of, any foreign government.
(iii) Eligible end-use. The eligible end-use is internal “development” or “production” of new products by those end-users.
Note to paragraph (a)(1)(iii): All items produced or developed with items exported or reexported under this paragraph (a)(1) are subject to the EAR. These items may require review and authorization before sale, reexport or transfer, unless otherwise authorized by license or license exception.
(2) Exports and reexports to “U.S. Subsidiaries.” License Exception ENC authorizes export and reexport of items classified under ECCNs 5A002.a.1, .a.2, .a.5, .a.6, or .a.9, 5B002, 5D002, or 5E002 to any “U.S. subsidiary,” wherever located, except to countries listed in Country Group E:1 (see Supplement No. 1 to part 740 of the EAR), without prior review by the U.S. Government. License Exception ENC also authorizes export or reexport of such items by a U.S. company and its subsidiaries to foreign nationals who are employees, contractors or interns of a U.S. company or its subsidiaries if the items are for internal company use, including the “development” or “production” of new products, without prior review by the U.S. Government.
Note to paragraph (a)(2): All items produced or developed with items exported or reexported under this paragraph (a)(2) are subject to the EAR. These items may require review and authorization before sale, reexport or transfer, unless otherwise authorized by license or license exception.
(b) Prior review required. License Exception ENC authorizes the export and reexport of commodities and software that require a license under ECCNs 5A002.a.1, a.2, a.5, a.6, or a.9, 5B002, or 5D002. Paragraph (b)(1)(i) of this section also authorizes the export and reexport of “technology” controlled for EI reasons under ECCN 5E002 to the end-users indicated in paragraph (b)(1)(i). Exports and reexports authorized under this paragraph (b) of License Exception ENC require submission of a review request in accordance with paragraph (d) of this section. License Exception ENC does not authorize the export or reexport of cryptanalytic items to any “government end-user”. Export or reexport of items that provide an “open cryptographic interface” is only authorized under paragraph (b)(1)(i) of this section. Exports and reexports authorized under paragraph (b) of this section are subject to reporting requirements in accordance with paragraph (e) of this section.
(1) Review required without waiting period. Once your review request is registered with BIS in accordance with paragraph (d) of this section, License Exception ENC authorizes the exports or reexports (except to countries listed in Country Group E:1 of Supplement No. 1 to part 740 of the EAR) to the following destinations:
(i) Export and reexport to countries listed in Supplement No. 3 of this part. License Exception ENC authorizes the export and reexport of encryption items, including EI controlled commodities or software (excluding source code) that are pending review for mass market treatment (under § 742.15(b) of the EAR), to “government end-users” and non-“government end-users” located in countries listed in Supplement 3 of this part, as well as to foreign subsidiaries or offices of firms, organizations and governments headquartered in countries listed in Supplement 3 of this part.
(ii) Export and reexport to countries not listed in Supplement No. 3 of this part. License Exception ENC authorizes the export and reexport of the following commodities and software:
(A) Encryption commodities and software (including key management products), as follows: for symmetric algorithms with key lengths not exceeding 80 bits; for asymmetric algorithms with key lengths not exceeding 1,024 bits; and for elliptic curve algorithms with key lengths not exceeding 160 bits. (After review has been completed, the issued Commodity Classification Automated Tracking Start Printed Page 57505System (CCATS) document will indicate authorization is under paragraph (b)(2) or (b)(3) of this section, whichever paragraph is appropriate.)
(B) Encryption source code that would not be eligible for export or reexport under License Exception TSU, provided that a copy of the source code is included in the review request, to non-”government end-users” located in any country except a country listed in Country Group E:1 of Supplement No. 1 to part 740 of the EAR. (After the review has been completed, the issued Commodity Classification Automated Tracking System (CCATS) document will indicate authorization is under paragraph (b)(2) of this section.)
(2) Review required with 30 day wait (non-“government end-users” only). Thirty days after your review request is registered with BIS in accordance with paragraph (d) of this section and subject to the reporting requirements in paragraph (e) of this section, License Exception ENC authorizes the export or reexport of the following commodities and software to non-“government end-users” located in a country not listed in Supplement No. 3 to this part or Country Group E:1 of Supplement No. 1 to part 740 of the EAR:
(i) Network infrastructure software and commodities and components thereof (including commodities and software necessary to activate or enable cryptographic functionality in network infrastructure products) providing secure Wide Area Network (WAN), Metropolitan Area Network (MAN), Virtual Private Network (VPN), satellite, digital packet telephony/media (voice, video, data) over internet protocol, cellular or trunked communications meeting any of the following with key lengths exceeding 80-bits for symmetric algorithms:
(A) Aggregate encrypted WAN, MAN, VPN or backhaul throughput (includes communications through wireless network elements such as gateways, mobile switches, controllers, etc) greater than 90 Mbps;
(B) Wire (line), cable or fiber-optic WAN, MAN or VPN single-channel input data rate exceeding 154 Mbps;
(C) Media (voice/video/data) encryption or centralized key management supporting more than 250 concurrent encrypted data channels, or encrypted signaling to more than 1,000 endpoints, for digital packet telephony/media (voice/video/data) over internet protocol communications; or
(D) Air-interface coverage (e.g., through base stations, access points to mesh networks, bridges, etc.) exceeding 1,000 meters, where any of the following applies:
(1) Maximum transmission data rates exceeding 10 Mbps (at operating ranges beyond 1,000 meters);
(2) Maximum number of concurrent full-duplex voice channels exceeding 30; or
(3) Substantial support is required for installation or use;
(ii) Encryption source code that would not be eligible for export or reexport under License Exception TSU because it is not publicly available as that term is used in § 740.13(e)(1) of the EAR, and the export or reexport of the encryption source code that is not otherwise eligible for License Exception ENC under paragraph (b)(1)(ii)(B) of this section;
(iii) Encryption software, commodities or components therefor, that have any of the following:
(A) Been designed, modified, adapted or customized for “government end-user(s)” or government end-use (e.g., to secure police, state security, or emergency response communications), including encryption commodities and software for external security operations center (SOC)/network operations center (NOC) command and infrastructure, public safety radio, and digital forensics/computer forensics;
(B) Cryptographic functionality that has been modified or customized to customer specification; or
(C) Cryptographic functionality or “encryption component” (except encryption software that would be considered publicly available, as that term is used in § 740.13(e)(1) of the EAR) that is user-accessible and can be easily changed by the user;
(iv) “Cryptanalytic items”;
(v) Encryption commodities and software that provide functions necessary for quantum cryptography, as defined in ECCN 5A002 of the Commerce Control List;
(vi) Encryption commodities and software that have been modified or customized for computers classified under ECCN 4A003.
(3) Review required with 30 day waiting period (“government end-users” or non-“government end-users”). Thirty days after your review request is registered with BIS in accordance with paragraph (d) of this section, License Exception ENC authorizes the export and reexport of software and commodities and components not listed in paragraph (b)(2) of this section to either “government end-users” or non-“government end-users” located in a country not listed in Supplement No. 3 to this part or Country Group E:1 of Supplement No. 1 to part 740 of the EAR.
(4) Items excluded from review requirements—(i) Short-range wireless encryption functions. Commodities and software not otherwise controlled in Category 5, but that are classified under ECCN 5A002, 5B002 or 5D002 only because they incorporate components or software that provide short-range wireless encryption functions (e.g., with a nominal operating range not exceeding 100 meters according to the manufacturer's specifications). Commodities and software included in this description include those designed to comply with the Institute of Electrical and Electronic Engineers (IEEE) 802.11 wireless LAN standard (35 meters) for short-range use and those designed to comply with the IEEE 802.15.1 standard that provide only the short-range wireless encryption functionality, and would not be classified under Category 5, part 1 of the CCL (telecommunications) absent this encryption functionality. Certain items excluded from review by this paragraph may also be excluded from review under paragraph (b)(4)(iii) of this section (personal area networks) or paragraph (b)(4)(iv) of this section (commodities and software that provide “ancillary cryptography”).
(ii) Foreign products developed with or incorporating U.S.-origin encryption source code, components, or toolkits. Foreign products developed with or incorporating U.S.-origin encryption source code, components or toolkits that are subject to the EAR, provided that the U.S.-origin encryption items have previously been reviewed and authorized by BIS and the cryptographic functionality has not been changed. Such products include foreign-developed products that are designed to operate with U.S. products through a cryptographic interface.
(iii) Wireless “personal area network” items. Wireless “personal area network” items that implement only published or commercial cryptographic standards and where the cryptographic capability is limited to a nominal operating range not exceeding 30 meters according to the manufacturer's specifications. See Nota Bene of the definition for “personal area network” in § 772.1 of the EAR.
(iv) “Ancillary cryptography.” Commodities and software that perform “ancillary cryptography.” See Nota Bene of definition of “ancillary cryptography” in § 772.1 of the EAR.
Note to paragraph (b): A new product review is required if a change is made to the cryptographic functionality (e.g., algorithms) or other technical characteristics affecting License Exception ENC eligibility (e.g., encrypted throughput) of the originally Start Printed Page 57506reviewed product. However, a new product review is not required when a change involves: The subsequent bundling, patches, upgrades or releases of a product; name changes; or changes to a previously reviewed encryption product where the change is limited to updates of encryption software components where the product is otherwise unchanged.
(c) Reexport and transfer. U.S. or foreign distributors, resellers or other entities who are not original manufacturers of encryption commodities and software are permitted to use License Exception ENC only in instances where the export or reexport meets the applicable terms and conditions of this section. Transfers of encryption items listed in paragraph (b)(2) of this section to “government end-users,” or for government end-uses, within the same country are prohibited, unless otherwise authorized by license or license exception.
(d) Review request procedures—(1) Submission. To request review of your encryption items under License Exception ENC, you must submit to BIS and to the ENC Encryption Request Coordinator form BIS-748P (Multipurpose Application), or its electronic equivalent in accordance with the instructions in paragraph (r) of Supplement No. 2 to part 748 “Unique Application and Submission Requirements” and the applicable information described in paragraphs (a) through (e) of Supplement No. 6 to part 742 of the EAR (Guidelines for Submitting Review Requests for Encryption Items). Failure to properly complete these items may delay consideration of your review request.
(2) Action by BIS—(i) Notification. Upon completion of its review, BIS will send you written notice of the provisions of this section, if any, under which your items may be exported or reexported.
(ii) After 30 days. If BIS has not, within 30 days of registration of a complete review request from you, informed you that your item is not authorized for License Exception ENC, you may export or reexport under the applicable provisions of License Exception ENC.
(iii) Hold Without Action (HWA). BIS may hold your review request without action if necessary to obtain additional information or for any other reason necessary to ensure an accurate determination with respect to ENC eligibility. Time on such “hold without action” status shall not be counted towards fulfilling the 30 day waiting period specified in this paragraph and in paragraphs (b)(2) and (b)(3) of this section. BIS may require you to supply additional relevant technical information about your encryption item(s) or information that pertains to their eligibility for License Exception ENC at any time, before or after the expiration of the 30 day waiting period specified in this paragraph and in paragraphs (b)(2) and (b)(3) of this section. If you do not supply such information within 14 days after receiving a request for it from BIS, BIS may return your review request(s) without action or otherwise suspend or revoke your eligibility to use License Exception ENC for that item(s). At your request, BIS may grant you up to an additional 14 days to provide the requested information. Any request for such an additional number of days must be made prior to the date by which the information was otherwise due to be provided to BIS, and may be approved if BIS concludes that additional time is necessary.
(e) Reporting requirements—(1) Semi-annual reporting requirement. Semi-annual reporting is required for exports to all destinations other than Canada, and for reexports from Canada, under this license exception. Certain encryption items and transactions are excluded from this reporting requirement, see paragraph (e)(1)(iii) of this section. For information about what must be included in the report and submission requirements, see paragraphs (e)(1)(i) and (e)(1)(ii) of this section respectively.
(i) Information required. Exporters must include for each item, the Commodity Classification Automated Tracking System (CCATS) number and the name of the item(s) exported (or reexported from Canada), and the following information in their reports:
(A) Distributors or resellers. For items exported (or reexported from Canada) to a distributor or other reseller, including subsidiaries of U.S. firms, the name and address of the distributor or reseller, the item and the quantity exported or reexported and, if collected by the exporter as part of the distribution process, the end-user's name and address;
(B) Individual consumers. For items exported (or reexported from Canada) to individual consumers through direct sale, the name and address of the recipient, the item, and the quantity exported; or
(C) Foreign manufacturers and products that use encryption items. For exports (i.e., from the United States) or direct transfers (e.g. by a “U.S. subsidiary” located outside the United States) of encryption components, source code, general purpose toolkits, equipment controlled under ECCN 5B002, technology, or items that provide an “open cryptographic interface” exported to a foreign developer or manufacturer headquartered in a country not listed in Supplement No. 3 to this part when intended for use in foreign products developed for commercial sale, the names and addresses of the manufacturers using these encryption items and, if known, when the product is made available for commercial sale, a non-proprietary technical description of the foreign products for which these encryption items are being used (e.g., brochures, other documentation, descriptions or other identifiers of the final foreign product; the algorithm and key lengths used; general programming interfaces to the product, if known; any standards or protocols that the foreign product adheres to; and source code, if available).
(ii) Submission requirements. For exports occurring between January 1 and June 30, a report is due no later than August 1 of that year. For exports occurring between July 1 and December 31, a report is due no later than February 1 the following year. These reports must be provided in electronic form. Recommended file formats for electronic submission include spreadsheets, tabular text or structured text. Exporters may request other reporting arrangements with BIS to better reflect their business models. Reports may be sent electronically to BIS at crypt@bis.doc.gov and to the ENC Encryption Request Coordinator at enc@nsa.gov, or disks and CDs containing the reports may be sent to the following addresses:
(A) Department of Commerce, Bureau of Industry and Security, Office of National Security and Technology Transfer Controls, 14th Street and Pennsylvania Ave., NW., Room 2705, Washington, DC 20230, Attn: Encryption Reports, and
(B) Attn: ENC Encryption Request Coordinator, 9800 Savage Road, Suite 6940, Ft. Meade, MD 20755-6000.
(iii) Exclusions from reporting requirement. Reporting is not required for the following items and transactions:
(A) Any encryption item exported (or reexported from Canada) under paragraph (a) of this section;
(B) Encryption commodities or software with a symmetric key length not exceeding 64 bits;
(C) Encryption commodities or software authorized under paragraph (b)(3) of this section, exported (or reexported from Canada) to individual consumers; Start Printed Page 57507
(D) Encryption items exported (or reexported from Canada) via free and anonymous download;
(E) Encryption items from or to a U.S. bank, financial institution or its subsidiaries, affiliates, customers or contractors for banking or financial operations;
(F) Items listed in (b)(4) of this section, unless it is a foreign item described in (b)(4)(ii) that has entered the United States;
(G) Foreign products developed by bundling or compiling of source code;
(H) General purpose operating systems, or desktop applications (e.g., e-mail, browsers, games, word processing, data base, financial applications or utilities) authorized under paragraph (b)(3) of this section;
(I) Client Internet appliance and client wireless LAN cards; or
(J) Other items as determined on a case-by-case basis.
(2) Reporting key length increases. Reporting is required for commodities and software that, after having been reviewed and authorized for License Exception ENC by BIS, are modified only to upgrade the key length used for confidentiality or key exchange algorithms. Such items may be exported or reexported under the previously authorized provision of License Exception ENC without further review.
(i) Information required. (A) A certification that no change to the encryption functionality has been made other than to upgrade the key length for confidentiality or key exchange algorithms.
(B) The original Commodity Classification Automated Tracking System (CCATS) authorization number issued by BIS and the date of issuance.
(C) The new key length.
(ii) Submission requirements. (A) The report must be received by BIS and the ENC Encryption Request Coordinator before the export or reexport of the upgraded product; and
(B) The report is e-mailed to crypt@bis.doc.gov and enc@nsa.gov.
Supplement No. 3 to Part 740 [Amended]
Start Amendment Part13. Supplement No. 3 is amended by:
End Amendment Part Start Amendment Parta. Revising the heading to read “License Exception ENC Favorable Treatment Countries”; and
End Amendment Part Start Amendment Partb. Adding Bulgaria, Canada, Iceland, Romania, and Turkey in alphabetic order.
End Amendment Part Start PartPART 742—[AMENDED]
End Part Start Amendment Part14. The authority citation for part 742 continues to read as follows:
End Amendment Part Start Amendment Part15. Section 742.15 is revised to read as follows:
End Amendment PartEncryption items.Encryption items can be used to maintain the secrecy of information, and thereby may be used by persons abroad to harm U.S. national security, foreign policy and law enforcement interests. The United States has a critical interest in ensuring that important and sensitive information of the public and private sector is protected. Consistent with our international obligations as a member of the Wassenaar Arrangement, the United States has a responsibility to maintain control over the export and reexport of encryption items. As the President indicated in Executive Order 13026 and in his Memorandum of November 15, 1996, exports and reexports of encryption software, like exports and reexports of encryption hardware, are controlled because of this functional capacity to encrypt information, and not because of any informational or theoretical value that such software may reflect, contain, or represent, or that its export or reexport may convey to others abroad. For this reason, export controls on encryption software are distinguished from controls on other software regulated under the EAR.
(a) Licensing requirements and policy—(1) Licensing requirements. A license is required to export or reexport encryption items (“EI”) classified under ECCN 5A002.a.1, a.2, a.5, a.6 and a.9; 5D002.a or c.1 for equipment controlled for EI reasons in ECCN 5A002; or 5E002 for “technology” for the “development,” “production,” or “use” of commodities or “software” controlled for EI reasons in ECCNs 5A002 or 5D002 to all destinations, except Canada. Refer to part 740 of the EAR for license exceptions that apply to certain encryption items, and to § 772.1 of the EAR for definitions of encryption items and terms. Most encryption items may be exported under the provisions of License Exception ENC set forth in § 740.17 of the EAR. Before submitting a license application, please review License Exception ENC to determine whether this license exception is available for your item or transaction. For exports and reexports of encryption items that are not eligible for a license exception, exporters must submit an application to obtain authorization under a license or an Encryption Licensing Arrangement.
(2) Licensing policy. Applications will be reviewed on a case-by-case basis by BIS, in conjunction with other agencies, to determine whether the export or reexport is consistent with U.S. national security and foreign policy interests. Encryption Licensing Arrangements (ELAs) may be authorized for exports and reexports of unlimited quantities of encryption commodities and software to national or federal government bureaucratic agencies for civil use, and to state, provincial or local governments, in all destinations, except countries listed in Country Group E:1 of Supplement No. 1 to part 740. ELAs are valid for four years and may require post-export reporting or pre-shipment notification. Applicants seeking authorization for Encryption Licensing Arrangements must specify the sales territory and class of end-user on their license applications.
Note to paragraph (a): Pursuant to Note 3 to Category 5 Part 2 of the Commerce Control List in Supplement No. 1 to part 774, once mass market encryption commodities and software have been reviewed by BIS and the ENC Encryption Request Coordinator (Ft. Meade, MD) and released from “EI” and “NS” controls pursuant to § 742.15(b) of the EAR, they are classified under ECCN 5A992 and 5D992 respectively, and are thereafter outside the scope of this section.
(b) Review requirement for mass market encryption commodities and software exceeding 64 bits: Mass market encryption commodities and software employing a key length greater than 64 bits for the symmetric algorithm (including such products previously reviewed by BIS and exported under ECCN 5A002 or 5D002) are subject to the EAR and require review by BIS and the ENC Encryption Request Coordinator (Ft. Meade, MD), prior to export or reexport. Encryption commodities and software that are described in § 740.17(b)(2) of the EAR do not qualify for mass market treatment. A new product review is required if a change is made to the cryptographic functionality (e.g., algorithms) or other technical characteristics affecting mass market eligibility (e.g., performance enhancements to provide network infrastructure services, or customizations to end-user specifications) of the originally reviewed product. However, a new product review is not required when a change involves: The subsequent Start Printed Page 57508bundling, patches, upgrades or releases of a product; name changes; or changes to a previously reviewed encryption product where the change is limited to updates of encryption software components where the product is otherwise unchanged.
(1) Procedures for requesting review. To request review of your mass market encryption products, you must submit to BIS and the ENC Encryption Request Coordinator the information described in paragraphs (a) through (e) of Supplement No. 6 to this part 742, and you must include specific information describing how your products qualify for mass market treatment under the criteria in the Cryptography Note (Note 3) of Category 5, Part 2 (“Information Security”), of the Commerce Control List (Supplement No. 1 to part 774 of the EAR). Review requests must be submitted on Form BIS-748P (Multipurpose Application), or its electronic equivalent, as described in § 748.3 of the EAR. See paragraph (r) of Supplement No. 2 to Part 748 of the EAR for special instructions about this submission. Review requests that are not submitted electronically to BIS should be mailed to the address indicated in § 748.2(c) of the EAR. Submissions to the ENC Encryption Request Coordinator should be directed to the mailing address indicated in § 740.17(e)(1)(ii) of the EAR. BIS will notify you if there are any questions concerning your request for review (e.g., because of missing or incompatible support documentation).
(2) Action by BIS. Once BIS has completed its review, you will receive written confirmation concerning the eligibility of your items for export or reexport as mass market encryption commodities or software classified under ECCN 5A992 or 5D992. If, during the course of its review, BIS determines that your encryption items do not qualify for mass market treatment under the EAR, or are otherwise classified under ECCN 5A002, 5B002, 5D002 or 5E002, BIS will notify you and will review your commodities or software for eligibility under License Exception ENC (see § 740.17 of the EAR for review and reporting requirements for encryption items under License Exception ENC). BIS reserves the right to suspend your eligibility to export and reexport under the provisions of this paragraph (b) and to return review requests, without action, if the requirements for review have not been met. Thirty days after BIS registers your review request, you may export or reexport these mass market encryption products, without a license, to government and non-government end-users located in most destinations outside the countries listed in Supplement No. 3 to part 740 of the EAR (certain destinations and persons may require a license for anti-terrorism (AT) reasons or for reasons specified elsewhere in the EAR), unless otherwise notified by BIS (e.g., because of missing or incomplete support documentation or conversion to License Exception ENC review.) The thirty days does not include any time that your review request is on hold without action.
(3) Exclusions from review requirements. The following commodities and software do not require review prior to export or reexport as mass market products.
(i) Short-range wireless encryption functions. Commodities and software not otherwise controlled in Category 5, but that are classified under ECCN 5A992 or 5D992 only because they incorporate components or software that provide short-range wireless encryption functions (e.g., with a nominal operating range not exceeding 100 meters according to the manufacturer's specifications). Commodities and software included in this description include those designed to comply with the Institute of Electrical and Electronic Engineers (IEEE) 802.11 wireless LAN standard (35 meters) for short-range use and those designed to comply with the IEEE 802.15.1 standard that provide only the short-range wireless encryption functionality, and would not be classified under Category 5, part 1 of the CCL (telecommunications) absent this encryption functionality. Certain items excluded from review by this paragraph may also be excluded from review under paragraph (b)(3)(ii) of this section (personal area networks) or paragraph (b)(3)(iii) of this section (commodities and software that provide “ancillary cryptography”).
(ii) Wireless “personal area network” items. Wireless “personal area network” items that implement only published or commercial cryptographic standards and where the cryptographic capability is limited to a nominal operating range not exceeding 30 meters according to the manufacturer's specifications. See Nota Bene of the definition for “personal area network” in § 772.1 of the EAR.
(iii) “Ancillary cryptography”. Commodities and software that perform “ancillary cryptography.” See Nota Bene of definition of “ancillary cryptography” in § 772.1 of the EAR.
(4) Commodities and software that activate or enable cryptographic functionality. Commodities, software, and components that allow the end-user to activate or enable cryptographic functionality in encryption products which would otherwise remain disabled, are controlled according to the functionality of the activated encryption product.
(5) Examples of mass market encryption products. Subject to the requirements of the Cryptography Note (Note 3) in Category 5, Part 2, of the Commerce Control List, mass market encryption products include, but are not limited to, general purpose operating systems and desktop applications (e.g., e-mail, browsers, games, word processing, database, financial applications or utilities) designed for use with computers classified as ECCN 4A994 or EAR99, laptops, or hand-held devices; commodities and software for client Internet appliances and client wireless LAN devices; home use networking commodities and software (e.g., personal firewalls, cable modems for personal computers, and consumer set top boxes); and portable or mobile civil telecommunications commodities and software (e.g., personal data assistants (PDAs), radios, or cellular products).
Supplement No. 4 to Part 742 [Removed]
16. Supplement No. 4 to Part 742 is removed and reserved.
End Amendment Part Start Amendment Part17. Supplement No. 6 to Part 742 is amended by:
End Amendment Part Start Amendment Parta. Revising the introductory paragraph;
End Amendment Part Start Amendment Partb. Revising paragraph (a);
End Amendment Part Start Amendment Partc. Revising paragraphs (c)(1), (c)(6), and (c)(11);
End Amendment Part Start Amendment Parte. Revising the introductory paragraphs of (d) and (e), to read as follows:
End Amendment PartSupplement No. 6 to Part 742—Guidelines for Submitting Review Requests for Encryption Items
Review requests for encryption items must be submitted on Form BIS-748P (Multipurpose Application), or its electronic equivalent, and supported by the documentation described in this Supplement, in accordance with the procedures described in § 748.3 of the EAR. To ensure that your review request is properly routed, insert the phrase “Mass market encryption” or “License Exception ENC” (whichever is applicable) in Block 9 (Special Purpose) of the application form and place an “X” in the box marked “Classification Request” in Block 5 (Type of Application)—Block 5 does not provide a separate item to check for the submission of encryption review requests. Failure to properly complete these items may delay consideration of your review request. BIS recommends that review requests be delivered via courier service or be sent to: Bureau of Industry and Security, U.S. Department of Commerce, 14th Street and Pennsylvania Ave., NW., Room 2705, Washington, DC 20230. Start Printed Page 57509
For electronic submissions via SNAP-R, support documents not readily attached in PDF format must be sent to: Bureau of Industry and Security, Information Technology Controls Division, Room 2093, 14th Street and Pennsylvania Ave., NW., Washington, DC 20230.
In addition, you must send a copy of your review request and all support documents to: Attn: ENC Encryption Request Coordinator, 9800 Savage Road, Suite 6940, Fort Meade, MD 20755-6000.
If you intend to rely on the 30 day registration provisions of the regulations, express mail certification of these documents is needed.
(a)(1) State the name(s) of each product being submitted for review and provide a brief non-technical description of the type of product (e.g., routers, disk drives, cell phones, chips, etc.) being submitted.
(2) Indicate whether there have been any prior reviews of the product(s), if such reviews are applicable to the current submission. For products with minor changes in encryption functionality, you must include a cover sheet with complete reference to the previous review (Commodity Classification Automated Tracking System (CCATS) number, Application Control Number (ACN), Export Control Classification Number (ECCN), authorization paragraph) along with a clear description of the changes.
(3) Describe how encryption is used in the product and the categories of encrypted data (e.g., stored data, communications, management data, internal data, etc.).
(4) For mass market review requests, describe specifically to whom and how the product is being marketed and state how this method of marketing and other relevant information (e.g., cost of product and volume of sales) are described by the Cryptography Note (Note 3 to Category 5, Part 2).
(5) Is any “encryption source code” being provided (shipped or bundled) as part of this offering? If yes, is this source code publicly available source code, unchanged from the code obtained from an open source web site, or is it proprietary “encryption source code?”
* * * * *(c) * * *
(1) Description of all the symmetric and asymmetric encryption algorithms and key lengths and how the algorithms are used, including relevant parameters, inputs and settings. Specify which encryption modes are supported (e.g., cipher feedback mode or cipher block chaining mode).
* * * * *(6) State all communication protocols (e.g., X.25, Telnet, TCP, IEEE 802.11, IEEE 802.16, SIP * * *) and cryptographic protocols and methods (e.g., SSL, TLS, SSH, IPSEC, IKE, SRTP, ECCN, MD5, SHA, X.509, PKCS standards * * *) that are supported and describe how they are used.
* * * * *(11) License Exception ENC ‘Restricted’ commodities and software described by the criteria in § 740.17(b)(2) require licenses to certain “government end-users.” Describe whether the product(s) meet any of the § 740.17(b)(2) criteria. Provide specific data for each of the parameters listed, as applicable (e.g., maximum aggregate encrypted user data throughput, maximum number of concurrent encrypted channels, and operating range for wireless products). If the § 740.17(b)(2) parameters are not applicable to the commodity or software, clearly explain why (e.g., by providing specific data evaluated against the § 740.17(b)(2) thresholds.)
(d) For review requests for hardware or software “encryption components” other than source code (i.e., chips, toolkits, executable or linkable modules intended for use in or production of another encryption item) provide the following additional information:
* * * * *(e) For review requests for “encryption source code” provide the following information:
* * * * *Start PartPART 744—[AMENDED]
End Part Start Amendment Part18. The authority citation for part 744 continues to read as follows:
End Amendment Part[Removed]19. Remove and reserve § 744.9.
End Amendment Part Start PartPART 746—[AMENDED]
End Part Start Amendment Part20. The authority citation for part 746 is revised to read as follows:
End Amendment Part[Amended]21. Section 746.3 is amended in paragraph (c) by revising the phrase “License Exceptions: CIV, APP, TMP, RPL, GOV, GFT, TSU, BAG, AVS, ENC or KMI.” to read “License Exceptions: CIV, APP, TMP, RPL, GOV, GFT, TSU, BAG, AVS, or ENC.”
End Amendment Part Start PartPART 748—[AMENDED]
End Part Start Amendment Part22. The authority citation for part 748 continues to read as follows:
End Amendment Part Start Amendment Part23. Supplement No. 2 to part 748 is amended by revising paragraph (r) to read as follows:
End Amendment PartSupplement No. 2 to Part 748—Unique Application and Submission Requirements
* * * * *(r) Encryption review requests. Enter, in Block 9 (Special Purpose) of the BIS-748P, “License Exception ENC” if you are submitting an encryption review request for License Exception ENC (§ 740.17 of the EAR) or “mass market encryption” if you are submitting an encryption review request under the mass market encryption provisions (§ 742.15(b) of the EAR). If you seek an encryption review for another reason, enter “encryption—other”. Neither the electronic nor paper forms provide a separate Block to check for the submission of encryption review requests, therefore you must also, place an “X” in the box marked “Classification Request” in Block 5 (Type of Application) of Form BIS-748P or select “Commodity Classification” if filing electronically. Failure to properly complete these items may delay consideration of your review request.
* * * * *Start PartPART 750—[AMENDED]
End Part Start Amendment Part24. The authority citation for part 750 continues to read as follows:
End Amendment Part Start Amendment Part25. Section 750.3 is amended by:
End Amendment Part Start Amendment Parta. Removing paragraph (b)(2)(iv) and redesignating paragraph (b)(2)(v) as (b)(2)(iv); and
End Amendment Part Start Amendment Partb. Revising (b)(2)(iii) to read as follows:
End Amendment PartReview of License Applications by BIS and Other Government Agencies and Departments.* * * * *(b) * * *
(2) * * *
(iii) The Department of State is concerned primarily with items controlled for national security, nuclear nonproliferation, missile technology, Start Printed Page 57510regional stability, anti-terrorism, crime control reasons, and sanctions; and
* * * * *[Amended]26. Section 750.7 is amended by:
End Amendment Part Start Amendment Parta. Removing and reserving paragraph (c)(2); and
End Amendment Part Start Amendment Partb. Removing the third and fourth sentences in the introductory text of paragraph (d).
End Amendment Part Start PartPART 762—[AMENDED]
End Part Start Amendment Part27. The authority citation for part 762 is revised to read as follows:
End Amendment Part[Amended]28. Section 762.2 is amended by removing and reserving paragraph (b)(8).
End Amendment Part Start PartPART 770—[AMENDED]
End Part Start Amendment Part29. The authority citation for part 770 is revised to read as follows:
End Amendment Part[Amended]30. Section 770.2 is amended by removing paragraph (n).
End Amendment Part Start PartPART 772—[AMENDED]
End Part Start Amendment Part31. The authority citation for part 772 continues to read as follows:
End Amendment Part Start Amendment Part32. Section 772.1 is amended by:
End Amendment Part Start Amendment Parta. Removing the term and definition “strategic partners (of a U.S. company)”; and
End Amendment Part Start Amendment Partb. Adding the terms and definitions for “ancillary cryptography” and “personal area network” in alphabetic order, to read as follows:
End Amendment PartDefinitions of terms as used in the Export Administration Regulations (EAR).* * * * *Ancillary cryptography. The incorporation or application of “cryptography” by items that are not primarily useful for computing (including the operation of “digital computers”), communications, networking (includes operation, administration, management and provisioning) or “information security”.
N.B. Commodities and software that perform “ancillary cryptography” (e.g., are specially designed and limited to: piracy and theft prevention for software, music, etc.; games and gaming; household utilities and appliances; printing, reproduction, imaging and video recording or playback (but not videoconferencing); business process modeling and automation (e.g., supply chain management, inventory, scheduling and delivery); industrial, manufacturing or mechanical systems (including robotics, other factory or heavy equipment, facilities systems controllers including fire alarms and HVAC); automotive, aviation and other transportation systems). Commodities and software included in this description are not limited to wireless communication and are not limited by range or key length.
* * * * *Personal area network. A data communication system having all of the following characteristics:
(a) Allows an arbitrary number of independent or interconnected ‘data devices” to communicate directly with each other; and
(b) Is confined to the communication between devices within the immediate vicinity of an individual person or device controller (e.g., single room, office, or automobile).
Technical Note: `Data device' means equipment capable of transmitting or receiving sequences of digital information.
N.B. “Personal area network” items include but are not limited to items designed to comply with the Institute of Electrical and Electronic Engineers (IEEE) 802.15.1 standard, class 2 (10 meters) and class 3 (1 meter), but not class 1 (100 meters) items. This includes most home networking devices, but not long-range enterprise equipment or components that can be used in long-range equipment. IEEE 802.15.1 class 2 and class 3 devices include hands-free headsets, wireless networking between personal computers, wireless mice, keyboards and printers, Global Positioning Systems (GPS) receivers, bar code scanners and game console wireless controllers, as well as data-capable wireless telephones and devices or software for transfer of files between devices using Object Exchange (OBEX).
* * * * *PART 774—[AMENDED]
End Part Start Amendment Part33. The authority citation for part 774 continues to read as follows:
End Amendment PartSupplement No. 1 to Part 774—[Amended]
Start Amendment Part34. In Supplement No. 1 to Part 774 (the Commerce Control List), Category 5 Telecommunications and “Information Security”, Part 2 Information Security is amended by revising the Nota Bene to Cryptography Note, to read as follows:
End Amendment PartCATEGORY 5—TELECOMMUNICATIONS AND “INFORMATION SECURITY”
* * * * *II. “Information Security”
* * * * *N.B. to Cryptography Note: Mass market encryption commodities and software eligible for the Cryptography Note employing a key length greater than 64 bits for the symmetric algorithm must be reviewed in accordance with the requirements of § 742.15(b) of the EAR in order to be released from the “EI” and “NS” controls of ECCN 5A002 or 5D002.
Start Amendment Part35. In Supplement No. 1 to Part 774 (the Commerce Control List), Category 5 Telecommunications and “Information Security”, Part 2 Information Security, Export Control Classification Number (ECCN) 5A002 is amended by
End Amendment Part Start Amendment Parta. Revising the EI paragraph of the License Requirements section;
End Amendment Part Start Amendment Partb. Removing the License Requirements Notes from the License Requirements section;
End Amendment Part Start Amendment Partc. Adding a license exception paragraph to the License Exception section; and
End Amendment Part Start Amendment Partd. Revising the Related Controls paragraph of the List of Items Controlled section, to read as follows:
End Amendment Part5A002 Systems, equipment, application specific “electronic assemblies”, modules and integrated circuits for “information security”, as follows (see List of Items Controlled), and other specially designed components therefor.
License Requirements
* * * * *Control(s) Country chart * * * * *EI applies to 5A002.a.1, a.2, a.5, a.6 and a.9. Refer to § 742.15 of the EAR.
License Exceptions
* * * * *ENC: Yes for certain EI controlled commodities, see § 740.17 of the EAR for eligibility. Start Printed Page 57511
List of Items Controlled
Unit: * * *
Related Controls: (1) 5A002 does not control the commodities listed in paragraphs (a) through (f) in the Note in the items paragraph of this entry. These commodities are instead classified under ECCN 5A992, and related software and technology are classified under ECCNs 5D992 and 5E992 respectively. (2) After a review and classification by BIS, mass market encryption commodities that meet eligibility requirements are released from “EI” and “NS” controls. These commodities are classified under ECCN 5A992.c. See § 742.15(b) of the EAR.
Related Definitions: * * *
Items: * * *
Start Amendment Part36. In Supplement No. 1 to Part 774 (the Commerce Control List), Category 5 Telecommunications and “Information Security”, Part 2 Information Security, Export Control Classification Number (ECCN) 5A992 is amended by revising the License Requirements section and paragraph c in the items paragraph of the List of Items Controlled section, to read as follows:
End Amendment Part5A992 Equipment not controlled by 5A002.
License Requirements
* * * * *Control(s) Country chart AT applies to entire entry AT Column 1. * * * * *List of Items Controlled
* * * * *Items:
* * * * *c. Commodities that have been reviewed and determined to be mass market encryption commodities in accordance with § 742.15(b) of the EAR.
Start Amendment Part37. In Supplement No. 1 to Part 774 (the Commerce Control List), Category 5 Telecommunications and “Information Security”, Part 2 “Information Security”, Export Control Classification Number (ECCN) 5D002 is amended by:
End Amendment Part Start Amendment Parta. Revising the EI paragraph of the License Requirements section;
End Amendment Part Start Amendment Partb. Adding a new license exception to the License Exception section;
End Amendment Part Start Amendment Partc. Removing the third Note in the License Requirements section; and
End Amendment Part Start Amendment Partd. Revising the Related Controls paragraph in the List of Items Controlled section, to read as follows:
End Amendment Part5D002 Information Security—“Software”.
License Requirements
* * * * *Control(s) Country chart * * * * *EI applies to “software” in 5D002.a or c.1 for equipment controlled for EI reasons in ECCN 5A002. Refer to § 742.15 of the EAR.
* * * * *License Exceptions
* * * * *ENC: Yes for certain EI controlled software, see § 740.17 of the EAR for eligibility.
List of Items Controlled
Unit: $ value
Related Controls: (1) This entry does not control “software” “required” for the “use” of equipment excluded from control under the Related Controls paragraph or the Technical Notes in ECCN 5A002 or “software” providing any of the functions of equipment excluded from control under ECCN 5A002. This software is classified as ECCN 5D992. (2) After a review and classification by BIS, mass market encryption software that meet eligibility requirements are released from “EI” and “NS” controls. This software is classified under ECCN 5D992.c. See § 742.15(b) of the EAR.
Related Definitions: * * *
Items: * * *
Start Amendment Part38. In Supplement No. 1 to Part 774 (the Commerce Control List), Category 5 Telecommunications and “Information Security”, Part 2 Information Security, Export Control Classification Number (ECCN) 5D992 is amended by:
End Amendment Part Start Amendment Parta. Revising the License Requirements section;
End Amendment Part Start Amendment Partb. Revising the Related Controls paragraph of the List of Items Controlled section; and
End Amendment Part Start Amendment Partc. Revising the Items paragraph of the List of Items Controlled section, to read as follows:
End Amendment Part5D992 “Information Security” “software” not controlled by 5D002.
License Requirements.
* * * * *Control(s) Country chart AT applies to entire entry AT Column 1. * * * * *List of Items Controlled
Unit: * * *
Related Controls: This entry does not control “software” designed or modified to protect against malicious computer damage, e.g., viruses, where the use of “cryptography” is limited to authentication, digital signature and/or the decryption of data or files.
Related Definitions: * * *
Items:
a. “Software” specially designed or modified for the “development,” “production,” or “use” of equipment controlled by ECCN 5A992.a or 5A992.b.
b. “Software” having the characteristics, or performing or simulating the functions of the equipment controlled by ECCN 5A992.a or 5A992.b.
c. “Software” that has been reviewed and determined to be mass market encryption software in accordance with § 742.15(b) of the EAR.
Start Amendment Part39. In Supplement No. 1 to Part 774 (the Commerce Control List), Category 5 Telecommunications and “Information Security”, Part 2 Information Security, Export Control Classification Number (ECCN) 5E002 is amended by:
End Amendment Part Start Amendment Parta. Revising the EI paragraph and adding a License Requirement Note in the License Requirements section; and
End Amendment Part Start Amendment Partb. Revising the Related Control paragraph of the List of Items Controlled section, to read as follows:
End Amendment Part5E002 “Technology” according to the General Technology Note for the “development”, “production” or “use” of equipment controlled by 5A002 or 5B002 or “software” controlled by 5D002.
License Requirements
* * * * *Control(s) Country chart * * * * *EI applies to “technology” for the “development,” “production,” or “use” of commodities or “software” controlled for EI reasons in ECCNs 5A002 or 5D002. Refer to § 742.15 of the EAR.
License Requirement Note: When a person performs or provides technical assistance that incorporates, or otherwise draws upon, “technology” that was either obtained in the United States or is of US-origin, then a release of the “technology” takes place. Such technical assistance, when rendered with the intent to aid in the “development” or “production” of encryption commodities or software that would be controlled for “EI” reasons under ECCN 5A002 or 5D002, may require authorization under the EAR even if the underlying encryption algorithm to be implemented is from the public domain or is not of U.S. origin.
* * * * *List of Items Controlled
* * * * *Related Controls: See also 5E992. This entry does not control “technology” “required” for the “use” of equipment excluded from control under the Related Controls paragraph or the Technical Notes in ECCN 5A002 or “technology” related to equipment excluded from control under ECCN 5A002. This “technology” is classified as ECCN 5E992.
* * * * *Start Amendment Part40. In Supplement No. 1 to Part 774 (the Commerce Control List), Category 5 Start Printed Page 57512Telecommunications and “Information Security”, Part 2 Information Security, Export Control Classification Number (ECCN) 5E992 is amended by revising the License Requirements section and the List of Items Controlled section, to read as follows:
End Amendment Part5E992 “Information Security” “technology”, not controlled by 5E002.
License Requirements
* * * * *Control(s) Country chart AT applies to entire entry AT Column 1. * * * * *List of Items Controlled
* * * * *Items:
a. “Technology” n.e.s., for the “development”, “production” or “use” of equipment controlled by 5A992.a, “information security”or cryptologic equipment controlled by 5A992.b or “software” controlled by 5D992.a or b.
b. “Technology”, n.e.s., for the “use” of mass market commodities controlled by 5A992.c or mass market “software” controlled by 5D992.c.
Start SignatureDated: September 26, 2008.
Christopher R. Wall,
Assistant Secretary for Export Administration.
[FR Doc. E8-23201 Filed 10-2-08; 8:45 am]
BILLING CODE 3510-33-P
Document Information
- Comments Received:
- 0 Comments
- Published:
- 10/03/2008
- Department:
- Industry and Security Bureau
- Entry Type:
- Rule
- Action:
- Interim final rule.
- Document Number:
- E8-23201
- Pages:
- 57495-57512 (18 pages)
- Docket Numbers:
- Docket No. 080211163-81224-01
- RINs:
- 0694-AE18: Encryption Simplification: Correction
- RIN Links:
- https://www.federalregister.gov/regulations/0694-AE18/encryption-simplification-correction
- Topics:
- Administrative practice and procedure, Business and industry, Confidential business information, Exports, Reporting and recordkeeping requirements, Terrorism
- PDF File:
- e8-23201.pdf
- CFR: (15)
- 15 CFR 732.2
- 15 CFR 734.3
- 15 CFR 738.4
- 15 CFR 740.3
- 15 CFR 740.8
- More ...