Encryption Simplification, 57495-57512 [E8-23201]
Download as PDF
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
SDB contracting opportunity or
preference will be subject to the
penalties imposed by section 16(d) of
the Small Business Act, 15 U.S.C.
645(d), as well as any other penalty
authorized by law.
(b)(1) A representation of SDB status
on a federal prime contract will be
deemed a misrepresentation of SDB
status if the firm does not meet the
requirements of § 124.1001(b).
(2) A representation of SDB status on
a subcontract to a federal prime contract
will be deemed a misrepresentation of
SDB status if the firm does not have a
good faith belief that it is owned and
controlled by one or more socially and
economically disadvantaged
individuals. Any certification by a firm
that SBA found not to qualify as an SDB
in connection with an SDB protest or
otherwise will be deemed a
misrepresentation of SDB status if the
firm has not overcome the reason(s) for
the negative determination.
(3) Any representation of SDB status
by a firm that SBA has found not to
qualify as an SDB in connection with a
protest or SBA-initiated SDB
determination will be deemed a
misrepresentation of SDB status if the
firm has not overcome the reason(s) set
forth in SBA’s written decision.
§ 124.1005 How long does an SDB
certification last?
(a) A firm that is certified to be an
SDB will generally be certified for a
period of three years from the date of
the certification.
(b) A firm’s SDB certification will
extend beyond three years where SBA
finds the firm to be an SDB:
(1) In connection with a protest
challenging the firm’s SDB status (see
§ 124.1013(h)(2));
(2) In connection with an SBAinitiated SDB determination (see
§ 124.1006); or
(3) As part of an 8(a) BD annual
review.
(c) A firm that completes its nine-year
program term in the 8(a) BD program
will continue to be deemed a certified
SDB firm for a period of three years
from the date of its last 8(a) annual
review.
jlentini on PROD1PC65 with RULES
§ 124.1006 Can SBA initiate a review of the
SDB status of a firm claiming to be an SDB?
SBA may initiate an SDB
determination on any firm that has been
certified to be an SDB by a procuring
agency or that has represented itself to
be an SDB on a subcontract to a federal
prime contract whenever it receives
credible information calling into
question the SDB status of the firm.
Upon its completion of an SDB
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
determination, SBA will issue a written
decision regarding the SDB status of the
questioned firm. If SBA finds that the
firm continues to qualify as an SDB, the
determination remains in effect for three
years from the date of the decision.
■ 3. Remove §§ 124.1007 through
124.1016 and redesignate §§ 124.1017
through 124.1024 as §§ 124.1007
through 124.1014, respectively.
Sandy K. Baruah,
Acting Administrator.
[FR Doc. E8–23472 Filed 10–2–08; 8:45 am]
BILLING CODE 8025–01–P
DEPARTMENT OF COMMERCE
Bureau of Industry and Security
15 CFR Parts 732, 734, 738, 740, 742,
744, 746, 748, 750, 762, 770, 772, and
774
[Docket No. 080211163–81224–01]
RIN 0694–AE18
Encryption Simplification
Bureau of Industry and
Security, Commerce.
ACTION: Interim final rule.
AGENCY:
SUMMARY: This interim final rule
amends the Export Administration
Regulations (EAR) to make the treatment
of encryption items more consistent
with the treatment of other items subject
to the EAR, as well as to simplify and
clarify regulations pertaining to
encryption items. The restrictions
pertaining to technical assistance by
U.S. persons with respect to encryption
items are removed, because the current
export and reexport restrictions set forth
in the EAR for technology already
include technical assistance. This rule
also removes License Exception KMI as
it has become obsolete because of
developments in uses of encryption. In
addition, this rule removes notification
requirements for items classified as
5A992, 5D992, and 5E992. This rule
also increases certain parameters under
License Exception ENC, which is
intended to reflect advances in
technology. This rule adds two new
review and reporting requirement
exclusion paragraphs under License
Exception ENC for wireless ‘‘personal
area network’’ items and for ‘‘ancillary
cryptography’’ items. This rule also
adds Bulgaria, Canada, Iceland,
Romania, and Turkey to the list of
countries that receive favorable
treatment under License Exception ENC.
Commodities and software pending
mass market review may no longer be
PO 00000
Frm 00011
Fmt 4700
Sfmt 4700
57495
exported under ECCNs 5A992 and
5D992 using No License Required
(NLR). However, once the mass market
review has been received by BIS, then
such commodities and software may be
exported using License Exception ENC
under ECCNs 5A002 and 5D002. This
rule will reduce the paperwork burden
on the public by 9% (annual dollar
amount savings of approximately
$14,000 to the public and $5,000 to the
U.S. Government), because of the
removal of certain notification
requirements, addition of countries to
the list of those receiving favorable
treatment under License Exception ENC,
and the increase of reporting and review
requirement exclusions. The
Departments of Commerce, State and
Defense will continue to review export
control, license review policies, and
license exceptions for encryption items
in the EAR.
DATES: Effective Date: This rule is
effective October 3, 2008.
ADDRESSES: Written comments on this
interim final rule may be sent by e-mail
to publiccomments@bis.doc.gov.
Include ‘‘Encryption rule’’ in the subject
line of the message. Comments may also
be submitted by mail or hand delivery
to Sharron Cook, Office of Exporter
Services, Regulatory Policy Division,
Bureau of Industry and Security,
Department of Commerce, 14th St. &
Pennsylvania Avenue, NW., Room 2705,
Washington, DC 20230, ATTN:
Encryption rule; or by fax to (202) 482–
3355.
FOR FURTHER INFORMATION CONTACT: For
questions of a general nature contact
Sharron Cook, Office of Exporter
Services, Regulatory Policy Division at
(202) 482–2440 or E-Mail:
scook@bis.doc.gov.
For questions of a technical nature
contact: The Information Technology
Division, Office of National Security
and Technology Transfer Controls at
202–482–0707 or E-Mail: C. Randall
Pratt at cpratt@bis.doc.gov.
SUPPLEMENTARY INFORMATION:
Background
Steps Regarding Scope of the EAR
This rule revises paragraph 732.2(b) of
the EAR, which sets forth instructions
on how to determine if your technology
or software is publicly available, by
adding mass market encryption software
with symmetric key length exceeding
64-bits classified under ECCN 5D992.
The addition of this phrase harmonizes
with the scope of publicly available
encryption software that is considered
to be subject to the EAR because of the
criteria set forth in § 734.3(b)(3) of the
EAR.
E:\FR\FM\03OCR1.SGM
03OCR1
57496
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
Items Subject to the EAR
This rule adds a note to paragraph
734.3(a)(4) of the EAR, which sets forth
the items that are subject to the EAR.
The note reminds readers that certain
foreign-manufactured items are subject
to the EAR when developed or
produced from U.S.-origin encryption
items that were exported pursuant to
§ 740.17(a) of License Exception ENC.
Clarification of Text
This rule replaces the phrase
‘‘encryption software (including source
code) transferred from the U.S.
Munitions List to the Commerce Control
List consistent with E.O. 13026 of
November 15, 1996 (61 FR 58767) and
pursuant to the Presidential
Memorandum of that date’’ with
‘‘software controlled for ‘‘EI’’ reasons
under ECCN 5D002 on the Commerce
Control List’’ to clarify which software
this sentence is referring to in the
introductory paragraph of Supplement
No. 1 to part 734 ‘‘Questions and
Answers—Technology and Software
subject to the EAR.’’
jlentini on PROD1PC65 with RULES
Determining Whether a License Is
Required
This rule clarifies text in § 738.4(a)(1)
of the EAR that not all license
requirements set forth under the
‘‘License Requirements’’ section of an
ECCN refer to the Commerce Country
Chart, but in some cases this section
will contain references to a specific
section in the EAR that contain license
requirements for that particular ECCN.
In such cases, you could not determine
whether a license is required based on
the ECCN and Country Chart alone and
section § 738.4(a)(1) of the EAR would
not apply. For example, ‘‘EI’’ controls
are not included in the Country Chart;
however licensing requirements for ‘‘EI’’
controlled items are included in
§ 742.15(a) of the EAR. In addition, this
rule removes the reference in
§ 738.4(a)(2)(ii)(B) to notification
requirements described in paragraph
742.15(b) for items classified under
ECCNs 5A992, 5D992, and 5E992,
because this rule removes notification
requirements for these items. This rule
also clarifies the reminder about the
review requirements for certain mass
market encryption items under ECCNs
5A992 and 5D992, by removing the
reference to 5E992 and harmonizing the
citation reference with the changes in
this rule.
License Exception LVS
This rule revises § 740.3(d)(5) to
clarify that not only exports, but
reexports of encryption components or
spare parts are subject to the special
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
restriction in this paragraph. In
addition, the term ‘‘item’’ has been
replaced by correct terminology.
License Exception KMI
This rule removes § 740.8 of the EAR
‘‘License Exception KMI’’ as it has
become obsolete because of the
developments in the use of encryption.
A consequential revision is also made to
§ 746.3(c) of the EAR, where License
Exception KMI was listed. Products
previously eligible for License
Exception KMI will be accorded
equivalent treatment under license or
license exception. As a result of this
change, this rule also removes
Supplement No. 4 to part 742 ‘‘Key
Escrow or Key Recovery Products
Criteria.’’
License Exception TSU
In § 740.13(d) of the EAR, this rule
removes the quotation marks around the
term ‘‘mass market’’ in the title to
paragraph (d), paragraph (d)(1), footnote
1, paragraph (d)(3)(i) and paragraph
(d)(3)(ii), because in the EAR double
quotation marks around a term indicate
that the word is defined in part 772 of
the EAR, and mass market is not a
defined term in part 772 of the EAR.
License Exception ENC
This rule revises § 740.17 of the EAR
by reformatting paragraphs, removing
redundant text, and clarifying text as
needed. This rule revises the title of this
section to indicate that this license
exception also authorizes technology.
The introductory paragraph to § 740.17
of the EAR is condensed to set forth the
scope of § 740.17 of the EAR and
include information not found
elsewhere in § 740.17 of the EAR.
While this rule reformats the
paragraphs in § 740.17 of the EAR, it
was BIS’s goal to minimize revisions to
the enumeration of paragraphs used to
classify encryption items in the past, so
as to alleviate confusion about previous
classifications provided by BIS that
reference specific paragraphs and to
reduce the number of revisions to
industry’s current product matrices.
That being said, the paragraph titles
have been revised to reflect review
request requirements instead of
destinations, end-uses, or types of endusers.
This rule removes paragraphs
740.17(a)(2) and (b)(2)(i) that exempted
commodities and software from review
requirements based on a previous
review by the U.S. Government prior to
October 19, 2000. These commodities
and software remain exempt from
review requirements, and BIS did not
see the necessity of retaining such text
PO 00000
Frm 00012
Fmt 4700
Sfmt 4700
in the Export Administration
Regulations.
Paragraph 740.17(a) now describes
exports and reexports authorized by
License Exception ENC that do not
require prior government review or post
export reporting. The former paragraph
(a)(2) ‘‘Items previously reviewed by the
U.S. Government’’ is removed by this
rule, as this paragraph is no longer
necessary because of the passage of
time. Former paragraph (a)(3) for enduses other than internal development is
moved to new paragraph (b)(1), because
a review request submission is required
for eligibility under this paragraph.
Former paragraph (b)(1) for U.S.
subsidiaries is moved to (a)(2), because
authorization under this paragraph does
not require prior review. In addition,
this rule amends former paragraph
(b)(4)(i)(A) (exempting encryption items
not exceeding certain key lengths from
the 30 day waiting period) by moving it
to (b)(1)(ii)(A).
Section 740.17(a)(1)
This rule removes references in
paragraph § 740.17(a)(1) to ‘‘technical
assistance described in § 744.9 of the
EAR,’’ because this rule removes 744.9,
see explanation set forth below under
‘‘§ 744.9.’’ This rule clarifies text in
paragraph (a)(1) so that it is understood
that License Exception ENC can be used
for not only internal development, but
also internal production of new
products.
Section 740.17(a)(2)
Paragraph 740.17(a)(2) is former
paragraph (b)(1).
Section 740.17(b)
Paragraph 740.17(b) now sets forth
those items authorized under License
Exception ENC that require prior review
by the U.S. Government. This paragraph
also sets forth the ‘‘open cryptographic
interface’’ restriction that applies to all
paragraphs in 740.17(b), except for
paragraph § 740.17(b)(1)(i). This
introductory paragraph also sets forth
the restriction to export or reexport
cryptanalytic items to any ‘‘government
end-user.’’ There is also a reference in
this paragraph to paragraph (e)
‘‘reporting requirements’’ for exports
and reexports under § 740.17(b).
Section 740.17(b)(1)
The new paragraph 740.17(b)(1) of the
EAR authorizes exports and reexports
under License Exception ENC that
require prior government review, but
allows the export or reexport to take
place immediately upon registration of
the review request with BIS.
E:\FR\FM\03OCR1.SGM
03OCR1
jlentini on PROD1PC65 with RULES
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
Paragraph (b)(1)(i) authorizes the
export and reexport of encryption items,
including EI controlled commodities or
software (excluding source code) that
are pending review for mass market
treatment (under § 742.15(b) of the
EAR), to ‘‘government end-users’’ and
non-‘‘government end-users’’ located in
the countries listed in Supplement 3 of
part 740, as well as to foreign
subsidiaries or offices of firms,
organizations and governments
headquartered in countries listed in
Supplement 3 of part 740. This rule
adds authorization under License
Exception ENC for items pending mass
market review, because it was not
logical to temporarily classify
commodities and software under ECCNs
5A992 or 5D992 that were pending mass
market review under paragraph
742.15(b) and authorize export or
reexport under the designation of ‘‘No
License Required (NLR)’’ when the
possible outcome of the BIS
classification of the commodities and
software could be ECCN 5A002 or
5D002.
New paragraph 740.17(b)(1)(ii)
authorizes exports and reexports of
specified encryption commodities and
software to countries not listed in
Supplement No. 3 to part 740. This rule
revises the format of the parameters in
this section from a range to an upper
limit in paragraph (b)(1)(ii)(A), former
paragraph (b)(4)(i)(A). In addition, the
upper limit for symmetric algorithms
has been raised from ‘‘key lengths not
exceeding 64 bits’’ to ‘‘key lengths not
exceeding 80 bits.’’ After review has
been completed on these commodities
or software, BIS will issue a CCATS that
will indicate authorization is under
paragraph (b)(2) or (b)(3) of § 740.17 of
the EAR, whichever paragraph is
appropriate.
Paragraph (b)(1)(ii)(B), former
paragraph (b)(4)(i)(B), authorizes exports
and reexports of encryption source code
that would not be eligible for export or
reexport under License Exception TSU,
provided that a copy of the source code
is included in the review request, to
non-‘‘government end-users’’ located in
any country except a country listed in
Country Group E:1 of Supplement No. 1
to part 740 of the EAR. After the review
has been completed, BIS will issue a
CCATS that will indicate authorization
is under paragraph 740.17(b)(2) of the
EAR. The text is clarified by replacing
the phrase ‘‘considered publicly
available’’ with ‘‘eligible’’ in order to
avoid confusion about the scope of
encryption source code eligible under
this paragraph.
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
Section 740.17(b)(2)
Paragraph (b)(2) of License Exception
ENC authorizes exports and reexports to
non-‘‘government end-users’’ located in
a country not listed in Supplement No.
3 to this part or Country Group E:1 that
require a prior review and 30 day
waiting period. Pursuant to the new
scope paragraph 740.17(b), this rule
expands the scope of (b)(2) to include
ECCN 5B002 to be consistent with
commodities and software eligible for
License Exception ENC under
paragraphs (b)(1) and (b)(3) of the EAR.
In addition, former paragraph (b)(2)(i)
concerning transactions previously
reviewed prior to October 19, 2000 by
the U.S. Government is removed as the
passage of time has made this paragraph
unnecessary. Former paragraph (b)(2)(ii)
that set forth the review request
requirement is removed, as the review
request requirement has been moved to
the introductory text of paragraph (b)(2).
Former paragraph (b)(2)(iii) is replaced
by the introductory text of paragraph
(b)(2).
This rule revises new paragraph
(b)(2)(i), (Network infrastructure
software and commodities) by adding
‘‘digital packet telephony/media (voice/
video/data) over internet protocol’’ to
the list of capabilities described.
Also in this new paragraph (b)(2)(i),
the former paragraph (b)(2)(iii)(A)
reference to ‘‘64 bits for symmetric
algorithms’’ is changed to ‘‘80 bits for
symmetric algorithms’’, commensurate
with the key length change in new
paragraph (b)(1)(ii)(B). (Note: Regarding
key length with respect to the
authorizations and restrictions set forth
in both the current and former versions
of License Exception ENC § 740.17(b)(2),
only ‘network infrastructure’
commodities and software (subparagraph (i) in this rule) are
distinguished by key length. All
encryption commodities and software
now enumerated in sub-paragraphs (ii)–
(vi) (former sub-paragraphs (iiii)(B)–
(iii)(F)) of License Exception ENC
paragraph (b)(2) are controlled to
‘‘government end-users’’ as described,
regardless of key length.)
Former paragraph (b)(2)(iii)(A)(1),
new paragraph § 740.17(b)(2)(i)(A) is
clarified by this rule to add quotes
around the term ‘‘government enduser(s)’’ and now reads as follows,
‘‘Been designed, modified, adapted or
customized for ‘‘government enduser(s)’’ or government end-use (e.g., to
secure police, state security, or
emergency response communications).’’
This rule further revises former
paragraph (b)(2)(iii)(A)(1), new
paragraph (b)(2)(i)(A), which addresses
PO 00000
Frm 00013
Fmt 4700
Sfmt 4700
57497
aggregate encrypted WAN, MAN, VPN
or backhaul throughput, by increasing
the parameter from 44 Mbps to 90 Mbps.
This rule further revises former
paragraph (b)(2)(iii)(A)(2), new
paragraph (b)(2)(i)(B). The Wire (line),
cable or fiber optic WAN, MAN or VPN
single-channel input data rate is revised
from ‘‘44 Mbps’’ to ‘‘154 Mbps.’’
These revisions are not expected to
result in a decrease in the number of
license applications submitted for
exports and reexports of items described
in paragraph (b)(2) to government endusers. Most network infrastructure items
currently being exported to government
end-uses exceed these performance
parameters. However, BIS has
determined that the parameters should
be adjusted in recognition of technology
advances, and to avoid maintaining
controls on legacy systems.
This rule replaces the ‘‘Maximum
number of concurrent encrypted data
tunnels or channels * * *’’ parameter
in former paragraph (b)(2)(iii)(A)(3),
new paragraph (b)(2)(i)(C) with ‘‘Media
(voice/video/data) encryption or
centralized key management supporting
more than 250 concurrent encrypted
data channels, or encrypted signaling to
more than 1,000 endpoints, for digital
packet telephony/media (voice/video/
data) over internet protocol
communications.’’ These amendments
update these provisions of License
Exception ENC to reflect advances in
encryption technology. Specifically,
these amendments address
cryptographic developments in
Datagram Transport Layer Security
(DTLS)—Secure Real-Time Transport
Protocol (SRTP), and encrypted
communications signaling, for large
Voice over Internet Protocol (VoIP)
network infrastructures.
This rule also revises former
paragraph (b)(2)(iii)(A)(4)(i), new
paragraph (b)(2)(i)(D)(1), which
addresses Air-interface coverage
capabilities, by changing ‘‘maximum
data rates’’ to ‘‘maximum transmission
data rates’’ and changing the parameter
from ‘‘5 Mbps’’ to ‘‘10 Mbps.’’ By
limiting this License Exception ENC
provision to the transmit (upstream)
data rates and doubling the licensing
threshold, these amendments reflect
technology developments for certain
satellite and other long-range wireless
devices.
Former paragraph (b)(2)(iii)(B) that
addressed encryption source code that
would not be eligible for export or
reexport under License Exception TSU
is moved to new paragraph (b)(2)(ii), but
also appears in new paragraph
(b)(1)(ii)(B) for review requests that
include a copy of the source code, and
E:\FR\FM\03OCR1.SGM
03OCR1
57498
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
may be exported or reexported without
a waiting period under License
Exception ENC when the review request
is registered with BIS.
Former paragraph (b)(2)(iii)(C), new
paragraph (b)(2)(iii) is revised by
removing the reference to the open
cryptographic interface restriction,
because this restriction is now placed in
the introductory text of paragraph
740.17(b).
Former paragraph (b)(2)(iii)(C)(1), new
paragraph (b)(2)(iii)(A) is amended by
revising the phrase ‘‘Been modified or
customized for’’ to read ‘‘been designed,
modified, adapted or customized for.’’
Quotes have been added around the
term ‘‘government end-user(s)’’ to
indicate that this term is defined in part
772 of the EAR.
This rule also revises the phrase ‘‘to
secure departmental, police, state
security, or emergency response
communications’’ to read ‘‘to secure
police, state, security, or emergency
response communications, including
encryption commodities and software
for external Security Operations Center
(SOC)/Network Operations Center
(NOC) command and infrastructure, and
digital forensics/computer forensics.’’
With this clarification, this rule
provides examples of three such
systems that are controlled for their
inherent government end-use: External
Security Operations Center (SOC)/
Network Operations Center (NOC)
command and infrastructure; public
safety radio (e.g., implementing
Terrestrial Trunked Radio (TETRA) and/
or Association of Public-Safety
Communications Officials International
(APCO) Project 25 (P25) standards); and
digital forensics/computer forensics.
jlentini on PROD1PC65 with RULES
Note: Regarding the use of encryption by
a computer forensics/digital forensics
commodity or software (e.g., for securing the
collection, examination, and/or reporting of
data or metadata on an investigated
computer), such digital/computer forensics
tools would not be considered ‘‘cryptanalytic
items’’ if the only use of ‘‘cryptography’’ is
for encryption. However, such tools that also
perform ‘‘cryptanalysis’’ (e.g., cracking
passwords or employing other cryptanalytic
techniques to derive user-encrypted data or
metadata from a computer or network) would
be controlled as ‘‘cryptanalytic items.’’
Former paragraph (b)(2)(iii)(E), new
paragraph (b)(2)(v) is revised by adding
a clarifying phrase after the term
‘‘quantum cryptography’’ to read ‘‘as
defined in ECCN 5A002 of the
Commerce Control List.’’
Former paragraph (b)(2)(iii)(F), new
paragraph (b)(2)(vi) is revised by
replacing the term ‘‘controlled’’ with
‘‘classified under’’ to clarify the scope of
computers in this paragraph.
VerDate Aug<31>2005
18:36 Oct 02, 2008
Jkt 217001
Section 740.17(b)(3)
This rule revises paragraph
§ 740.17(b)(3) of the EAR for export or
reexport of commodities and software
not listed in § 740.17(b)(2) of the EAR by
both ‘‘government end-users’’ and non‘‘government end-users’’ by removing
the redundant former paragraph
(b)(3)(ii)(B) that explained the review
procedures and instead inserting a
reference to paragraph § 740.17(d) that
sets forth these procedures. In addition,
former paragraph (b)(3)(ii)(A)
concerning transactions previously
reviewed by the U.S. Government is
removed as the passage of time has
made this paragraph unnecessary.
Former paragraph (b)(3)(i)(A) that set
forth the ineligibility of commodities
and software that provide an ‘‘open
cryptographic interface’’ is removed
because this restriction is set forth in the
introductory text of paragraph 740.17(b).
This rule adds text that clarifies the
eligible locations of the end-users,
because 740.17(a) addresses all exports
to Supplement No. 3 countries. This
rule relocates the restriction in former
paragraph (f)(1) concerning
‘‘cryptanalytic items’’ to the
introductory text of paragraph (b)(3).
Section 740.17(b)(4)
Former paragraph 740.17(b)(4)(i),
setting forth commodities and software
that are eligible for export immediately
upon registration of a review request, is
moved to new paragraph (b)(1)(ii). In
addition, previous paragraph
740.17(b)(4)(ii), setting forth exclusions
from review requirements for certain
items, is reformatted as paragraph
740.17(b)(4).
Former paragraph (b)(4)(ii)(A) for
short-range wireless encryption is now
in new paragraph (b)(4)(i). This rule
adds examples to this paragraph of
short-range wireless commodities and
software. An informative sentence is
also added to notify the reader that
certain items excluded by this
paragraph may also be excluded from
review under (b)(4)(iii) (personal area
networks) or (b)(4)(iv) (commodities and
software that provide ‘‘ancillary
cryptography’’).
Former paragraph (b)(4)(ii)(B) is
replaced by the third, fourth, and fifth
sentences of former paragraph (c),
which pertains to foreign products
developed with or incorporating U.S.origin encryption source code,
components, or toolkits.
This rule adds two new review
requirement exclusion paragraphs. The
first new paragraph (b)(4)(iii) is for
wireless ‘‘personal area network’’ items.
This rule adds the term ‘‘personal area
PO 00000
Frm 00014
Fmt 4700
Sfmt 4700
network’’ and definition, as well as
examples to part 772. The other new
exclusion paragraph (b)(4)(iv) is for
‘‘ancillary cryptography,’’ which is also
a newly added term/definition in part
772. The term/definition includes
examples of ‘‘ancillary cryptography.’’
The U.S. Government has determined
that it is not necessary to review the
encryption functionality of such items.
Reexports and Transfers
This rule clarifies the second sentence
in § 740.17(c) of the EAR (restricted
transfers) by adding quotes around the
term ‘‘government end-users’’ for
consistency. The third and fourth
sentences in this section concerning
foreign products developed with or
incorporating U.S.-origin encryption
products are moved to new paragraph
(b)(4)(ii), because it was misplaced and
redundant to text already included in
another paragraph of License Exception
ENC.
Review Request Procedures
This rule removes former paragraph
(d)(1) ‘‘Instructions for requesting
review’’ because these instructions were
redundant and inconsistent with the
instructions for submissions on Form
BIS–748P (Multipurpose Application)
found in Part 748 of the EAR.
Instructions for such submissions
belong in Part 748 of the EAR.
This rule reformats former paragraph
(d)(2) ‘‘Action by BIS’’ because this
paragraph was entirely too long and
needed to be divided by subject matter.
The new subparagraph titles are: (i)
Notification; (ii) After 30 days; and (iii)
Hold Without Action (HWA).
This rule moves former paragraph
(d)(3), ‘‘key length increases,’’ to the
reporting requirement section under
new paragraph (e)(2), because this
requirement is in actuality a reporting
requirement and not a review
requirement. This report is required for
commodities and software that, after
having been reviewed and authorized
for License Exception ENC by BIS, are
modified only to upgrade the key length
used for confidentiality or key exchange
algorithms. This rule also makes the
new key length a required element of
the report.
Reporting Requirements
The reporting requirements for
License Exception ENC are now split
into two sections: Semiannual reporting
requirement and reporting key length
increases. This rule clarifies that the
Commodity Classification Automated
Tracking System (CCATS) number is a
required element of the report. This rule
removes former paragraph (e)(2)(iv),
E:\FR\FM\03OCR1.SGM
03OCR1
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
which required a report for exports of
ECCN 5E002 items to be used for
technical assistance that are not released
by 744.9, because this rule removed
section 744.9 of the EAR. This rule also
clarifies the purpose and scope of
paragraph (e)(3), regarding reportable
information on foreign manufacturers
and products that use encryption items
in countries not listed in Supplement
No. 3 to part 740.
Reporting Exclusions
This rule revises the exclusion set
forth in former paragraph (e)(4)(i), new
paragraph (e)(1)(iii)(A), by removing the
reference to paragraph (b)(1), because
(b)(1) did not require prior review or
post export reporting, therefore this rule
moved (b)(1) to new paragraph (a)(2).
In new paragraph (e)(1)(iii)(F), this
rule expands the exclusion that was in
former paragraph (e)(4)(vi) for
components limited to providing shortrange wireless encryption functions, by
making the reporting exclusion apply to
all of the items in the new paragraph
(b)(4), which are those items that are
excluded from review requirements
(certain commodities and software that
provide short-range wireless; foreign
products developed with or
incorporating U.S.-origin encryption
source code (that have not entered
United States for subsequent export),
components, or toolkits; wireless
‘‘personal area network’’ items; and
‘‘ancillary cryptography’’ commodities
and software).
Lastly, in new paragraph (e)(1)(iii)(J),
this rule adds a new provision to
exclude from reporting requirements
exports of items that have been
determined, on a case-by-case basis do
not require the burden of semi-annual
reporting. Certain exports of items that
do not qualify for mass market
treatment, but are authorized under
License Exception ENC are not of
interest for national security reasons,
therefore do not warrant reporting
requirements. Exporters will be notified
of this exclusion on issued Commodity
Classification Automated Tracking
System (CCATS) documents.
jlentini on PROD1PC65 with RULES
Restrictions
Former paragraph § 740.17(f)
‘‘Restrictions’’ is removed, because the
restrictions that were in this paragraph
are integrated into the introductory
paragraph to § 740.17 or specific
paragraphs for which they apply.
Supplement No. 3 to Part 740
This rule revises the title of
Supplement No. 3 to part 740 to read
‘‘License Exception ENC Favorable
Treatment Countries,’’ because the
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
former title of ‘‘Countries Eligible for the
Provisions of § 740.17(a)’’ is no longer
correct, as these countries are now
eligible for provisions of § 740.17(b)(1)
of the EAR. This rule adds Bulgaria,
Canada, Iceland, Romania, and Turkey
to the list of countries in Supplement
No. 3 to part 740 of the EAR. Bulgaria
and Romania joined the European
Union by accession on January 1, 2007.
The addition of Canada is simply for
clarity, as licenses are not required to
Canada for Encryption Items (pursuant
to § 742.15(a)(1)) and License Exception
ENC has been available for subsidiaries
and offices of the Canadian government
and private-sector end-users (along with
the previous Supplement No. 3 to part
740 list of countries). Turkey and
Iceland are added because they are
members of the North Atlantic Treaty
Organization (NATO). This will increase
eligibility under License Exception ENC
under new paragraphs § 740.17(a)(1)
and (b)(1) of the EAR, which will
decrease the necessity for submitting
license applications, review requests,
and semiannual reports.
This revision will reduce the number
of license applications submitted to BIS
for the export or reexport of encryption
products classified under ECCNs 5A002
and 5D002 to Bulgaria, Iceland,
Romania, and Turkey by 95 percent
(approximately $37 million in exports
and reexports for CY 2007). This
revision will not change the amount of
license applications received by BIS for
the export or reexport of encryption
products to Canada, because Canada,
while not included in the list of
countries that received favorable
treatment under License Exception ENC,
already received such benefits.
Section 742.15 ‘‘Encryption Items’’
Paragraph 742.15(a) is revised by
more specifically describing what is EI
controlled under ECCNs 5A002, 5D002,
and 5E002. This revision harmonizes
with changes this rule makes to the
license requirements paragraphs of
these ECCNs. In addition, a sentence is
added that advises exporters to review
License Exception ENC prior to
submitting a license to BIS. Also, the
phrase ‘‘on a computer system’’ is
removed from the introductory text of
§ 742.15 in order to be more consistent
with the first Note in the License
Requirement section of ECCN 5D002.
Section 742.15(a)(2) License
Requirements and Review Policy for
ECCNS 5A992, 5D992, and 5E992
This rule removes former paragraph
742.15(a)(2), which explained license
requirements and review policy for
items classified under ECCNS 5A992,
PO 00000
Frm 00015
Fmt 4700
Sfmt 4700
57499
5D992, and 5E992, because the purpose
of § 742.15 is to set forth the license
requirements and review policies for
items controlled for encryption item (EI)
reasons and these items are controlled
for anti-terrorism (AT) reasons only. The
license requirements and review policy
for these items are found under
appropriate anti-terrorism sections of
part 742.
This rule removes the second
sentence of 742.15(a)(2), because the
indefinite language did not add to the
transparency of licensing policy. The
sentence stated, ‘‘Exports and reexports
of encryption items to governments, or
to Internet and telecommunications
service providers for the provision of
services specific to governments, may be
favorably considered.’’ This rule
removes the extraneous phrase
‘‘including those which authorize
exports and reexports of encryption
technology to strategic partners (as
defined in § 772.1 of the EAR) of U.S.
companies.’’ To be more transparent,
this rule adds the phrase ‘‘or preshipment notification’’ to explain that
ELAs may require pre-shipment
notification. This rule adds a note to
paragraph (a)(2) to remind exporters that
once mass market encryption
commodities and software have been
reviewed by BIS and the ENC
Encryption Request Coordinator (Ft.
Meade, MD) and released from ‘‘EI’’ and
‘‘NS’’ controls pursuant to § 742.15(b) of
the EAR, they are classified under ECCN
5A992 and 5D992 respectively, and are
thereafter outside the scope of this
section.
This rule removes the notification and
review requirements for items classified
under ECCNs 5A992, 5D992, and 5E992,
which were set forth in former
paragraphs § 742.15(b) introductory
paragraph and § 742.15 (b)(1) of the
EAR.
This rule adds a reference to the ENC
Encryption Request Coordinator (FT.
Meade, MD) with regard to the
requirement for review of mass market
encryption commodities and software.
Specific instructions for how to fill
out form 748P (multipurpose
application) for submission of a review
request has been removed, because
these instructions were redundant and
inconsistent with the instructions found
in paragraph (r) of Supplement No. 2 to
part 748 of the EAR. Instead, a reference
to this paragraph (r) is added to new
paragraph 742.15(b)(1) ‘‘Procedures for
requesting review.’’
This rule removes former paragraph
(b)(2)(iii) that provided authorization
under the designation of ‘‘no license
required (NLR)’’ for exports and
reexports of encryption commodities
E:\FR\FM\03OCR1.SGM
03OCR1
57500
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
and software pending mass market
treatment review by BIS to government
and non-government end-users located
in countries listed in Supp. No. 3 to part
740 of the EAR or for internal use of
foreign subsidiaries or offices of firms,
organizations and governments
headquartered in Canada or in countries
listed in Supp. No. 3 to part 740 of the
EAR. This authorization was based on a
temporary classification under ECCNs
5A992 and 5D992, which is inconsistent
with the way other items are classified
in the EAR, therefore this provision is
removed. Instead, encryption
commodities and software will remain
under the classification of ECCN 5A002
and 5D002 until 30 days have passed
since registration of the submitted
review request or BIS issues a
classification under ECCN 5A992 or
5D992. However, this rule creates a new
authorization under License Exception
ENC for such commodities and software
pending a decision by BIS concerning
mass market treatment under new
paragraph 740.17(b)(1) of the EAR. This
rule adds explanatory text about this
new procedure in (b)(2) ‘‘Action by
BIS.’’
Section 742.15(b)(3) Exclusions for
Notification and Review Requirements
This rule removes the former
exclusion paragraphs, because it is no
longer applicable and is replaced by
new exclusion paragraphs from mass
market review requirements under
§ 742.15(b). There are three new
exclusions: Certain short range wireless
commodities and software, wireless
‘‘personal area network’’ items, and
‘‘ancillary cryptography’’ commodities
and software.
jlentini on PROD1PC65 with RULES
Section 742.15(b)(4) Dormant
Encryption and Enabling Software and
Commodities
This rule condenses this paragraph to
remove text that pertained to ECCNs
5A992 and 5D992.
Section 742.15(b)(5) Examples of Mass
Market Software
The phrase ‘‘designed for, bundled
with, or pre-loaded on single CPU
computes’’ is revised to read ‘‘designed
for computers classified as ECCN 4A994
or EAR99.’’ This phrase was changed to
remove outdated and confusing text
related to computers. This rule also
removes the last phrase ‘‘and
commodities and software exported via
free or anonymous downloads.’’ This
phrase was removed because it confused
the public, in that it led people to
believe that if they incorporated free
encryption software or open source
encryption into their products that it
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
was not subject to the EAR, which is not
the case.
Supplement No. 6 to Part 742
‘‘Guidelines for Submitting Review
Requests for Encryption Items’’
The option to fax support documents
is removed, because that method has
been replaced by either e-mailing the
document in PDF or sending the
document by mail. A requirement to
obtain express mail certification of the
mailing of support documentation is
added for those that intend to rely on
the 30 day registration provisions of the
EAR.
Paragraph (a) is divided into 5
subparagraphs that clarify existing
review requirements and procedures.
Former paragraph (a) is now new
subparagraph (a)(1), and is revised to
add a requirement to include a brief
non-technical description of the type of
product being submitted, e.g., routers,
disk drives, cell phones, chips, etc. Part
of the introductory paragraph to Supp.
No. 6 that addressed prior reviews is
moved to a new subparagraph (a)(2),
and is revised to add a requirement, for
products with minor changes in
encryption functionality, to include a
cover sheet with complete reference to
the previous review (CCATS#,
Application Control Number (ACN),
ECCN, authorization paragraph) along
with a clear description of the changes.
New subparagraph (a)(3) requires a
description of how encryption is used in
the product and the categories of
encrypted data (i.e., stored data,
communications, management data,
internal data, etc.). New subparagraph
(a)(4) requires, for mass market reviews,
a specific description of who will be
receiving the product and how the
product is being marketed, as well as
how this method of marketing and other
relevant information (e.g., cost of
product and volume of sales) is
described by the Cryptography Note
(Note 3 to Category 5, Part 2). New
subparagraph (a)(5) clarifies information
about any encryption source code being
used.
Subparagraph (c)(1) is amended by
adding the phrase ‘‘including relevant
parameters, inputs and settings’’ to the
end of the first sentence. Subparagraph
(c)(6) is amended by adding more
examples of communication and
cryptographic functions, as well as
replacing the term ‘‘encryption
protocols’’ with a more accurate term
‘‘cryptographic protocols and methods.’’
An additional requirement is added to
(c)(6) to describe how the protocols that
are supported are used. The text of
(c)(11) is revised to more clearly
PO 00000
Frm 00016
Fmt 4700
Sfmt 4700
describe the information that would
assist BIS.
The introductory text for paragraphs
(d) and (e) is clarified.
Section 744.9 ‘‘Restrictions on
Technical Assistance by U.S. Persons
With Respect to Encryption Items’’
This rule removes § 744.9 of the EAR
that required authorization from BIS for
U.S. persons to provide technical
assistance (including training) to foreign
persons with the intent to aid a foreign
person in the development or
manufacture outside the United States
of encryption commodities or software
that, if of U.S.-origin, would be ‘‘EI’’
controlled under ECCNs 5A002 or
5D002. Section 744.9 was added to the
EAR in 1996 when jurisdiction over
dual-use encryption items was
transferred from the Department of State
to the Department of Commerce.
Technical assistance is treated
differently under the International
Trade in Arms Regulations (ITAR) than
it is in EAR. Technical assistance is
considered a form of ‘‘technology’’
under the definition of ‘‘technology’’ in
section 772.1 of the EAR. The EAR
states that technical assistance ‘‘may
take forms such as instruction, skills
training, working knowledge, consulting
services’’ and that it ‘‘may involve
transfer of ‘technical data.’ ’’ When a
person performs technical assistance,
which draws upon ‘‘development,’’
‘‘production,’’ or ‘‘use’’ ‘‘technology’’
obtained in the United States or that is
of U.S.-origin, then a release of
‘‘technology’’ takes place, which is
considered an export or reexport and
may require authorization under the
EAR. BIS has observed that there is
rarely an application for a license
submitted under the requirements of
section 744.9; however, requests for
authorization under section 744.9 are
often included in license applications
for export of ECCN 5E002 Technology.
This has led BIS to conclude that people
are submitting license applications for
technology exports and reexports when
involved in technical assistance.
Therefore, to harmonize the
understanding of technical assistance as
it is understood in the EAR with the
practical application of it by the public,
BIS is removing section 744.9. This
removal does not remove any license
requirements for controlled encryption
technology released while performing
technical assistance. This amendment
does not affect the scope of the note in
former 744.9 in that the mere teaching
or discussion of information about
cryptography, including, for example, in
an academic setting or in the work of
groups or bodies engaged in standards
E:\FR\FM\03OCR1.SGM
03OCR1
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
development, by itself would not
establish a license requirement under
ECCN 5E002, even where foreign
persons are present. Section 744.9 is
replaced by a ‘‘license requirement’’
note in ECCN 5E002 on the Commerce
Control List.
Supplement No. 2 to Part 748
Application and Submission
Requirements’’
‘‘Unique
This rule adds a sentence instructing
applicants to place an ‘‘X’’ in the box
marked ‘‘classification request’’ in Block
5 (Type of Application) of Form BIS–
748P or select ‘‘Commodity
Classification’’ if filing electronically,
because neither the electronic nor paper
forms provide a separate Block to check
for submission of encryption review
requests.
Section 750.3 Review of License
Application by BIS and Other
Government Agencies and Departments
This rule makes an editorial
correction by removing paragraph
(b)(2)(iv) and redesignating (b)(2)(v) as
(b)(2)(iv). This paragraph referred to the
Arms Control and Disarmament Agency
(ACDA), which no longer exists.
However, ACDA’s personnel and
functions were absorbed by the
Department of State in 1999. Therefore,
this rule revises paragraph (b)(2)(iii) by
adding national security and nuclear
nonproliferation to the description of
State Department’s concerns. Missile
technology is also added as a State
Department concern because the State
Department chairs the Missile
Technology Export control interagency
working group.
jlentini on PROD1PC65 with RULES
Section 750.7
Issuance of Licenses
This rule removes paragraph (c)(2),
which explained how to amend your
Encryption License Agreement (ELA) by
letter. BIS has observed a trend that
industry has been submitting license
applications for replacement or new
ELAs when they want a change. In
addition, it is more efficient for
applicants to apply and track
applications than letters, because of BIS’
electronic application system. It is also
easier for BIS to process and track
submissions of applications than letters
for the same reason. Therefore, this
provision is removed.
This rule removes the third and fourth
sentences in the introductory text of
paragraph (d) that pertain to the
responsibilities of a licensee with regard
to ELAs. These sentences are removed,
because a licensee may not transfer its
license responsibilities.
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
Section 762.2 Records To Be Retained
This rule removes paragraph (b)(8),
which referred to records related to key
escrow encryption items under License
Exception KMI. This rule removes
License Exception KMI and Supplement
No. 4 to part 742 ‘‘Key Escrow or Key
Recovery Products Criteria,’’ therefore
this recordkeeping requirement no
longer exists.
Section 770.2 Item Interpretations
This rule moves paragraph (n)
‘‘Interpretation 14: Encryption
commodity and software reviews,’’ to a
new note under paragraphs 740.17(b)
and 742.15(b), so that exporters do not
miss this important information about
when to submit a new product review
when a change has occurred in the
encryption product. The text of this
paragraph is also revised for clarity. The
note explains that a new product review
is not required when a change involves:
the subsequent bundling, patches,
upgrades or releases of a product; name
changes; or changes to a previously
reviewed encryption product limited to
updates in an encryption software
component (e.g., version updates of an
encryption library that is called by a
product to provide encryption
functionality where the encryption
library has either already been reviewed
or did not require prior review.)
Section 772.1 Definition of terms as
used in the Export Administration
Regulations (EAR)
This rule removes the definition of
‘‘strategic partner’’ as this term is not
used in the control or licensing of
encryption items. This rule also adds
definitions for two new terms ‘‘ancillary
cryptography’’ and ‘‘personal area
network,’’ which are associated with
new review and reporting exclusions in
License Exception ENC.
Commerce Control List—Supplement
No. 1 to Part 774
This rule revises the Nota Bene to the
Cryptography Note at the beginning of
Category 5 Part 2 in order to harmonize
it with the revisions in this rule.
This rule clarifies what is controlled
for ‘‘EI’’ reasons in ECCNs 5A002,
5D002, and 5E002 by replacing the text
‘‘EI applies to encryption items
transferred from the U.S. Munitions List
to the Commerce Control List consistent
with E.O.13026 of November 15, 1996
(61 FR 58767) and pursuant to the
Presidential Memorandum of that date.
Refer to § 742.15 of this subchapter.’’
with appropriate text that refers to
specific paragraphs within those ECCNs
for which EI applies. For ECCN 5A002,
the new EI control reads ‘‘EI applies to
PO 00000
Frm 00017
Fmt 4700
Sfmt 4700
57501
5A002.a.1, a.2, a.5, a.6 and a.9. Refer to
§ 742.15 of the EAR.’’ For ECCN 5D002,
the new EI control reads, ‘‘EI applies to
‘‘software’’ in 5D002.a or c.1 for
equipment controlled for EI reasons in
ECCN 5A002. Refer to § 742.15 of the
EAR.’’ For ECCN 5E002, the new EI
control reads, ‘‘EI applies to
‘‘technology’’ for the ‘‘development,’’
‘‘production,’’ or ‘‘use’’ of commodities
or ‘‘software’’ controlled for EI reasons
in ECCNs 5A002 or 5D002. Refer to
§ 742.15 of the EAR.’’ In addition,
License Exception ENC is added to the
License Exception section of each of
these ECCNs, because it is the principal
license exception for EI controlled
items.
ECCN 5A002
This rule removes the license
requirement notes section from ECCN
5A002, because there is no Wassenaar
reporting requirement for this ECCN. In
addition, this rule makes editorial
corrections to the Related Controls
paragraph by replacing the use of the
term ‘‘items’’ with commodities when
referring to ECCN 5A002 and 5A992.
Moreover, this rule clarifies that if
commodities are listed in paragraphs (a)
through (f) in the Note to 5A002, and
therefore the commodities are classified
under ECCN 5A992, then the related
software and technology are classified
under ECCNs 5D992 and 5E992,
respectively. This rule also revises
Related Controls note 2 to be consistent
with the mass market review procedures
of § 742.15 of the EAR. This note now
reads ‘‘2) After a review and
classification by BIS, mass market
encryption commodities that meet
eligibility requirements are released
from ‘‘EI’’ and ‘‘NS’’ controls. These
commodities are classified under ECCN
5A992.c. See § 742.15(b) of the EAR.’’
ECCN 5A992
This rule revises the anti-terrorism
(AT) controls for ECCN 5A992, by
placing the entire entry under AT
Column 1 controls, for ease of
understanding and compliance. This
rule adds a new paragraph 5A992.c.
This new paragraph clarifies that a mass
market commodity is classified under
ECCN 5A992 upon completion of
Government review of a commodity in
accordance with paragraph 742.15(b) of
the EAR, when that review determines
that the commodity meets the
requirements for mass market treatment.
Encryption items are no longer
presumed eligible for mass market
treatment while pending Government
review.
E:\FR\FM\03OCR1.SGM
03OCR1
57502
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
ECCN 5D002
ECCN 5E002
This rule removes the third note in
the License Requirement section,
because the information in it does not
harmonize with the revision made in
this rule. In addition, this rule adds
another note to the Related Controls
paragraph to inform the public about the
review and classification of mass market
software.
This rule adds a License Requirement
Note to remind people to consider the
possibility of the release of technology
when performing technical assistance;
the note reads, ‘‘When a person
performs or provides technical
assistance that incorporates, or
otherwise draws upon, ‘‘technology’’
that was either obtained in the United
States or is of U.S.-origin, then a release
of the ‘‘technology’’ takes place. Such
technical assistance, when rendered
with the intent to aid in the
‘‘development’’ or ‘‘production’’ of
encryption commodities or software that
would be controlled for ‘‘EI’’ reasons
under ECCN 5A002 or 5D002, may
require authorization under the EAR
even if the underlying encryption
algorithm to be implemented is from the
public domain or is not of U.S. origin.’’
In addition, in order to harmonize with
the revisions in this rule and for
consistency, this rule adds text to the
Related Controls paragraph of the List of
Items Controlled section to read ‘‘This
entry does not control ‘‘technology’’
‘‘required’’ for the ‘‘use’’ of equipment
excluded from control under the Related
Controls paragraph or the Technical
Notes in ECCN 5A002 or ‘‘technology’’
related to equipment excluded from
control under ECCN 5A002. This
‘‘technology’’ is classified as ECCN
5E992.’’
jlentini on PROD1PC65 with RULES
ECCN 5D992
This rule revises the anti-terrorism
(AT) controls for ECCN 5D992, by
placing the entire entry under AT
Column 1 controls, for ease of
understanding and compliance.
Paragraphs 5D992.a.1 and a.2, and
5D992.b.1 and b.2, are combined as
5D992.a and 5D992.b, respectively, in
order to simplify the entry. This rule
also removes paragraph 5D992.c
(‘‘software’’ designed or modified to
protect against malicious computer
damage, e.g., viruses) from ECCN
5D992, while adding a note in the
Related Control stating, ‘‘This entry
does not control ‘‘software’’ designed or
modified to protect against malicious
computer damage, e.g., viruses, where
the use of ‘‘cryptography’’ is limited to
authentication, digital signature and/or
the decryption of data or files.’’ Certain
software for protection against
malicious damage that meet the criteria
of the Related Control note are thus now
decontrolled and classified as EAR99,
unless the software performs functions
that are controlled under other ECCNs
(whether under Category 5, part 2 or
elsewhere in the Commerce Control
List). Such software remains subject to
the EAR and may be classified under
ECCN 5D002 or 5D992 if it performs
cryptographic functionality controlled
by these Category 5, part 2 ECCNs (e.g.,
data or file encryption, including of user
or system data under Secure Socket
Layer (SSL) encryption, even if the
cryptographic functionality is not
directly user accessible.) Examples of
software decontrolled by this change
include certain firewall and other
software for the screening of digital
content and the detection and removal
of viruses, spyware and unsolicited
commercial e-mail.
This rule also adds a new paragraph
5D992.c. This paragraph clarifies that
mass market software is classified under
ECCN 5D992.c upon completion of
Government review of the software in
accord with § 742.15 of the EAR when
that review determines that the software
meets the requirements for mass market
treatment. Encryption software is no
longer presumed eligible for mass
market treatment.
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
ECCN 5E992
This rule revises the anti-terrorism
(AT) controls for ECCN 5E992, by
placing the entire entry under AT
Column 1 controls, for ease of
understanding and compliance. This
rule revises the references in 5E992.a
and .b to conform to revisions included
in this rule.
Although the Export Administration
Act expired on August 20, 2001, the
President, through Executive Order
13222 of August 17, 2001, 3 CFR, 2001
Comp., p. 783 (2002), as extended by the
Notice of July 23, 2008, 73 FR 43603
(July 25, 2008), has continued the
Export Administration Regulations in
effect under the International
Emergency Economic Powers Act.
Rulemaking Requirements
1. This interim final rule has been
determined to be not significant for
purposes of Executive Order 12866.
2. Notwithstanding any other
provision of law, no person is required
to respond to, nor shall any person be
subject to a penalty for failure to comply
with a collection of information subject
to the requirements of the Paperwork
Reduction Act of 1995 (44 U.S.C. 3501
PO 00000
Frm 00018
Fmt 4700
Sfmt 4700
et. seq.) (PRA), unless that collection of
information displays a currently valid
Office of Management and Budget
(OMB) Control Number. This rule
involves two collections of information
subject to the PRA. One of the
collections has been approved by OMB
under control number 0694–0088,
‘‘Multi Purpose Application,’’ and
carries a burden hour estimate of 58
minutes for a manual or electronic
submission. The other collection has
been approved by OMB under control
number 0694–0104, ‘‘Commercial
Encryption Items Under the Jurisdiction
of the Department of Commerce,’’ and
carries a burden hour estimate of 7
hours for a manual or electronic
submission. Send comments regarding
these burden estimates or any other
aspect of these collections of
information, including suggestions for
reducing the burden, to Jasmeet Seehra,
OMB Desk Officer, by e-mail at
jseehra@omb.eop.gov or by fax to (202)
395–7285; and to the Office of
Administration, Bureau of Industry and
Security, Department of Commerce,
14th and Pennsylvania Avenue, NW.,
Room 6622, Washington, DC 20230.
3. This rule does not contain policies
with Federalism implications as that
term is defined under Executive Order
13132.
4. The provisions of the
Administrative Procedure Act (5 U.S.C.
553) requiring notice of proposed
rulemaking, the opportunity for public
participation, and a delay in effective
date, are inapplicable because this
regulation involves a military and
foreign affairs function of the United
States (5 U.S.C. 553(a)(1)). Further, no
other law requires that a notice of
proposed rulemaking and an
opportunity for public comment be
given for this interim final rule. Because
a notice of proposed rulemaking and an
opportunity for public comment are not
required to be given for this rule under
the Administrative Procedure Act or by
any other law, the analytical
requirements of the Regulatory
Flexibility Act (5 U.S.C. 601 et. seq.) are
not applicable. Therefore, this
regulation is issued in interim final
form. Although there is no formal
comment period, public comments on
this regulation are welcome on a
continuing basis. Comments should be
submitted to Sharron Cook, Office of
Exporter Services, Bureau of Industry
and Security, Department of Commerce,
14th and Pennsylvania Ave., NW.,
Room 2705, Washington, DC 20230.
E:\FR\FM\03OCR1.SGM
03OCR1
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
List of Subjects
15 CFR Parts 732, 740, 748 and 750
Administrative practice and
procedure, Exports, Reporting and
recordkeeping requirements.
15 CFR Parts 738, 770 and 772
Exports.
15 CFR Part 744
Exports, Reporting and recordkeeping
requirements, Terrorism.
PART 734—[AMENDED]
15 CFR Part 742
Exports, Terrorism.
3. The authority citation for part 734
is revised to read as follows:
■
15 CFR Part 746
Exports, Reporting and recordkeeping
requirements.
15 CFR Part 762
Administrative practice and
procedure, Business and industry,
Confidential business information,
Exports, Reporting and recordkeeping
requirements.
Exports, Reporting and recordkeeping
requirements.
■ Accordingly, parts 732, 734, 738, 740,
742, 744, 746, 748, 750, 762, 770, 772
and 774 of the Export Administration
Regulations (15 CFR parts 730–774) are
amended as follows:
PART 732—[AMENDED]
1. The authority citation for part 732
is revised to read as follows:
■
Authority: 50 U.S.C. app. 2401 et. seq.; 50
U.S.C. 1701 et. seq.; E.O. 13026, 61 FR 58767,
3 CFR, 1996 Comp., p. 228; E.O. 13222, 66
FR 44025, 3 CFR, 2001 Comp., p. 783; Notice
of July 23, 2008, 73 FR 43603 (July 25, 2008).
2. Section 732.2 is amended by
revising paragraph (b) to read as follows:
■
Steps Regarding Scope of the EAR
jlentini on PROD1PC65 with RULES
*
*
*
*
*
(b) Step 2: Publicly available
technology and software. This step is
relevant for both exports and reexports.
Determine if your technology or
software is publicly available as defined
and explained at part 734 of the EAR.
Supplement No. 1 to part 734 of the
EAR contains several practical examples
describing publicly available technology
and software that are outside the scope
of the EAR. The examples are
illustrative, not comprehensive. Note
that encryption software controlled for
EI reasons under ECCN 5D002 on the
Commerce Control List (refer to
Supplement No.1 to Part 774 of the
EAR) and mass market encryption
software with symmetric key length
VerDate Aug<31>2005
17:58 Oct 02, 2008
Authority: 50 U.S.C. app. 2401 et. seq.; 50
U.S.C. 1701 et. seq.; E.O. 12938, 59 FR 59099,
3 CFR, 1994 Comp., p. 950; E.O. 13020, 61
FR 54079, 3 CFR, 1996 Comp. p. 219; E.O.
13026, 61 FR 58767, 3 CFR, 1996 Comp., p.
228; E.O. 13222, 66 FR 44025, 3 CFR, 2001
Comp., p. 783; Notice of July 23, 2008, 73 FR
43603 (July 25, 2008); Notice of November 8,
2007, 72 FR 63963 (November 13, 2007).
4. Section 734.3 is amended by adding
a note to paragraph (a)(4) to read as
follows:
■
15 CFR Part 774
§ 732.2
exceeding 64-bits classified under ECCN
5D992 shall be subject to the EAR even
if publicly available. Accordingly, the
provisions of the EAR concerning the
public availability of items are not
applicable to encryption items
controlled for ‘‘EI’’ reasons under ECCN
5D002 and mass market encryption
software with symmetric key length
exceeding 64-bits classified under ECCN
5D992.
*
*
*
*
*
Jkt 217001
§ 734.3
Items Subject to the EAR
(a) * * *
(4) * * *
Note to paragraph (a)(4): Certain foreignmanufactured items developed or produced
from U.S.-origin encryption items exported
pursuant to License Exception ENC are
subject to the EAR. See sections 740.17(a)
and 740.17(b)(4)(ii) of the EAR.
5. Supplement No. 1 to part 734 is
amended by revising the introductory
paragraph to read as follows:
■
Supplement No. 1 to Part 734—
Questions and Answers—Technology
and Software Subject to the EAR
This Supplement No. 1 contains
explanatory questions and answers
relating to technology and software that
is subject to the EAR. It is intended to
give the public guidance in
understanding how BIS interprets this
part, but is only illustrative, not
comprehensive. In addition, facts or
circumstances that differ in any material
way from those set forth in the
questions or answers will be considered
under the applicable provisions of the
EAR. Exporters should note that the
provisions of this supplement do not
apply to encryption software classified
under ECCN 5D002 for ‘‘EI’’ reasons on
the Commerce Control List or to mass
market encryption software with
symmetric key length exceeding 64-bits
classified under ECCN 5D992. This
PO 00000
Frm 00019
Fmt 4700
Sfmt 4700
57503
Supplement is divided into nine
sections according to topic as follows:
*
*
*
*
*
PART 738—[AMENDED]
6. The authority citation for part 738
continues to read as follows:
■
Authority: 50 U.S.C. app. 2401 et seq.; 50
U.S.C. 1701 et seq.; 10 U.S.C. 7420; 10 U.S.C.
7430(e); 22 U.S.C. 287c; 22 U.S.C. 3201 et
seq.; 22 U.S.C. 6004; 30 U.S.C. 185(s), 185(u);
42 U.S.C. 2139a; 42 U.S.C. 6212; 43 U.S.C.
1354; 46 U.S.C. app. 466c; 50 U.S.C. app. 5;
22 U.S.C. 7201 et. seq.; 22 U.S.C. 7210; E.O.
13026, 61 FR 58767, 3 CFR, 1996 Comp., p.
228; E.O. 13222, 66 FR 44025, 3 CFR, 2001
Comp., p. 783; Notice of July 23, 2008, 73 FR
43603 (July 25, 2008).
7. Section 738.4 is amended by
revising paragraphs (a)(1) and
(a)(2)(ii)(B) to read as follows:
■
§ 738.4 Determining Whether a License Is
Required
(a) * * *
(1) Overview. Once you have
determined that your item is classified
under a specific ECCN, you must use
information contained in the ‘‘License
Requirements’’ section of that ECCN in
combination with the Country Chart to
decide whether a license is required.
Note that not all license requirements
set forth under the ‘‘License
Requirements’’ section of an ECCN refer
you to the Commerce Country Chart, but
in some cases this section will contain
references to a specific section in the
EAR for license requirements. In such
cases, this section would not apply.
(2) * * *
(ii) * * *
(B) If no, a license is not required
based on the particular Reason for
Control and destination. Provided that
General Prohibitions Four through Ten
do not apply to your proposed
transaction and that any applicable
review requirements described in
§ 742.15(b) of the EAR have been met for
certain mass market encryption items
controlled under ECCNs 5A992 or
5D992, you may effect your shipment
using the symbol ‘‘NLR.’’ Proceed to
parts 758 and 762 of the EAR for
information on export clearance
procedures and recordkeeping
requirements. Note that although you
may stop after determining a license is
required based on the first Reason for
Control, it is best to work through each
applicable Reason for Control. A full
analysis of every possible licensing
requirement based on each applicable
Reason for Control is required to
determine the most advantageous
License Exception available for your
particular transaction and, if a license is
E:\FR\FM\03OCR1.SGM
03OCR1
57504
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
required, ascertain the scope of review
conducted by BIS on your license
application.
*
*
*
*
*
PART 740—[AMENDED]
8. The authority citation for part 740
continues to read as follows:
■
Authority: 50 U.S.C. app. 2401 et seq.; 50
U.S.C. 1701 et seq.; 22 U.S.C. 7201 et seq.;
E.O. 13026, 61 FR 58767, 3 CFR, 1996 Comp.,
p. 228; E.O. 13222, 66 FR 44025, 3 CFR, 2001
Comp., p. 783; Notice of July 23, 2008, 73 FR
43603 (July 25, 2008).
9. Section 740.3 is amended by
revising paragraph (d)(5) to read as
follows:
■
§ 740.3
Shipments of Limited Value (LVS)
*
*
*
*
*
(d) * * *
(5) Exports and reexports of
encryption components or spare parts.
For components or spare parts
controlled for ‘‘EI’’ reasons under ECCN
5A002, exports and reexports under this
License Exception must be destined to
support a commodity previously
authorized for export or reexport.
*
*
*
*
*
§ 740.8
■
[Removed]
10. Remove and reserve § 740.8.
§ 740.13
[Amended]
11. Section 740.13 is amended by
removing the quotation marks around
the term ‘‘mass market’’ in paragraph (d)
heading, paragraph (d)(1), footnote 1,
paragraph (d)(3)(i) and paragraph
(d)(3)(ii).
■
12. Section 740.17 is revised to read
as follows:
■
jlentini on PROD1PC65 with RULES
§ 740.17 Encryption Commodities,
Software and Technology (ENC).
License Exception ENC authorizes
export and reexport of software and
commodities and components therefor
that are classified under ECCNs
5A002.a.1, a.2, a.5, a.6 or a.9, 5B002,
5D002, and technology that is classified
under ECCN 5E002. This License
Exception ENC does not authorize
export or reexport to, or provision of
any service in any country listed in
Country Group E:1 in Supplement No.
1 to part 740 of the EAR, or release of
source code or technology to any
national of a country listed in Country
Group E:1. Reexports and transfers
under License Exception ENC are
subject to the criteria set forth in
paragraph (c) of this section. Paragraph
(d) of this section sets forth information
about review requests required by this
section. Paragraph (e) sets forth
reporting required by this section.
VerDate Aug<31>2005
18:36 Oct 02, 2008
Jkt 217001
(a) No prior review or post export
reporting required—(1) Internal
‘‘development’’ or ‘‘production’’ of new
products. License Exception ENC
authorizes exports and reexports of
items described in paragraph (a)(1)(i) of
this section, to end-users described in
paragraph (a)(1)(ii) of this section, for
the intended end-use described in
paragraph (a)(1)(iii) of this section
without prior review by the U.S.
Government.
(i) Eligible items. Eligible items are
those classified under ECCNs 5A002.a.1,
.a.2, .a.5, .a.6, or .a.9, 5B002, 5D002, or
5E002.
(ii) Eligible end-users. Eligible endusers are ‘‘private sector end-users’’
wherever located, except to countries
listed in Country Group E:1 (see
Supplement No. 1 to part 740 of the
EAR) that are headquartered in a
country listed in Supplement No. 3 of
this part.
Note to paragraph (a)(1)(ii): A ‘‘private
sector end-user’’ is:
(1) An individual who is not acting on
behalf of any foreign government; or
(2) A commercial firm (including its
subsidiary and parent firms, and other
subsidiaries of the same parent) that is not
wholly owned by, or otherwise controlled by
or acting on behalf of, any foreign
government.
(iii) Eligible end-use. The eligible end-use
is internal ‘‘development’’ or ‘‘production’’ of
new products by those end-users.
Note to paragraph (a)(1)(iii): All items
produced or developed with items exported
or reexported under this paragraph (a)(1) are
subject to the EAR. These items may require
review and authorization before sale,
reexport or transfer, unless otherwise
authorized by license or license exception.
(2) Exports and reexports to ‘‘U.S.
Subsidiaries.’’ License Exception ENC
authorizes export and reexport of items
classified under ECCNs 5A002.a.1, .a.2,
.a.5, .a.6, or .a.9, 5B002, 5D002, or
5E002 to any ‘‘U.S. subsidiary,’’
wherever located, except to countries
listed in Country Group E:1 (see
Supplement No. 1 to part 740 of the
EAR), without prior review by the U.S.
Government. License Exception ENC
also authorizes export or reexport of
such items by a U.S. company and its
subsidiaries to foreign nationals who are
employees, contractors or interns of a
U.S. company or its subsidiaries if the
items are for internal company use,
including the ‘‘development’’ or
‘‘production’’ of new products, without
prior review by the U.S. Government.
Note to paragraph (a)(2): All items
produced or developed with items
exported or reexported under this
paragraph (a)(2) are subject to the EAR.
These items may require review and
authorization before sale, reexport or
PO 00000
Frm 00020
Fmt 4700
Sfmt 4700
transfer, unless otherwise authorized by
license or license exception.
(b) Prior review required. License
Exception ENC authorizes the export
and reexport of commodities and
software that require a license under
ECCNs 5A002.a.1, a.2, a.5, a.6, or a.9,
5B002, or 5D002. Paragraph (b)(1)(i) of
this section also authorizes the export
and reexport of ‘‘technology’’ controlled
for EI reasons under ECCN 5E002 to the
end-users indicated in paragraph
(b)(1)(i). Exports and reexports
authorized under this paragraph (b) of
License Exception ENC require
submission of a review request in
accordance with paragraph (d) of this
section. License Exception ENC does
not authorize the export or reexport of
cryptanalytic items to any ‘‘government
end-user’’. Export or reexport of items
that provide an ‘‘open cryptographic
interface’’ is only authorized under
paragraph (b)(1)(i) of this section.
Exports and reexports authorized under
paragraph (b) of this section are subject
to reporting requirements in accordance
with paragraph (e) of this section.
(1) Review required without waiting
period. Once your review request is
registered with BIS in accordance with
paragraph (d) of this section, License
Exception ENC authorizes the exports or
reexports (except to countries listed in
Country Group E:1 of Supplement No. 1
to part 740 of the EAR) to the following
destinations:
(i) Export and reexport to countries
listed in Supplement No. 3 of this part.
License Exception ENC authorizes the
export and reexport of encryption items,
including EI controlled commodities or
software (excluding source code) that
are pending review for mass market
treatment (under § 742.15(b) of the
EAR), to ‘‘government end-users’’ and
non-‘‘government end-users’’ located in
countries listed in Supplement 3 of this
part, as well as to foreign subsidiaries or
offices of firms, organizations and
governments headquartered in countries
listed in Supplement 3 of this part.
(ii) Export and reexport to countries
not listed in Supplement No. 3 of this
part. License Exception ENC authorizes
the export and reexport of the following
commodities and software:
(A) Encryption commodities and
software (including key management
products), as follows: for symmetric
algorithms with key lengths not
exceeding 80 bits; for asymmetric
algorithms with key lengths not
exceeding 1,024 bits; and for elliptic
curve algorithms with key lengths not
exceeding 160 bits. (After review has
been completed, the issued Commodity
Classification Automated Tracking
E:\FR\FM\03OCR1.SGM
03OCR1
jlentini on PROD1PC65 with RULES
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
System (CCATS) document will indicate
authorization is under paragraph (b)(2)
or (b)(3) of this section, whichever
paragraph is appropriate.)
(B) Encryption source code that
would not be eligible for export or
reexport under License Exception TSU,
provided that a copy of the source code
is included in the review request, to
non-’’government end-users’’ located in
any country except a country listed in
Country Group E:1 of Supplement No. 1
to part 740 of the EAR. (After the review
has been completed, the issued
Commodity Classification Automated
Tracking System (CCATS) document
will indicate authorization is under
paragraph (b)(2) of this section.)
(2) Review required with 30 day wait
(non-‘‘government end-users’’ only).
Thirty days after your review request is
registered with BIS in accordance with
paragraph (d) of this section and subject
to the reporting requirements in
paragraph (e) of this section, License
Exception ENC authorizes the export or
reexport of the following commodities
and software to non-‘‘government endusers’’ located in a country not listed in
Supplement No. 3 to this part or
Country Group E:1 of Supplement No. 1
to part 740 of the EAR:
(i) Network infrastructure software
and commodities and components
thereof (including commodities and
software necessary to activate or enable
cryptographic functionality in network
infrastructure products) providing
secure Wide Area Network (WAN),
Metropolitan Area Network (MAN),
Virtual Private Network (VPN), satellite,
digital packet telephony/media (voice,
video, data) over internet protocol,
cellular or trunked communications
meeting any of the following with key
lengths exceeding 80-bits for symmetric
algorithms:
(A) Aggregate encrypted WAN, MAN,
VPN or backhaul throughput (includes
communications through wireless
network elements such as gateways,
mobile switches, controllers, etc) greater
than 90 Mbps;
(B) Wire (line), cable or fiber-optic
WAN, MAN or VPN single-channel
input data rate exceeding 154 Mbps;
(C) Media (voice/video/data)
encryption or centralized key
management supporting more than 250
concurrent encrypted data channels, or
encrypted signaling to more than 1,000
endpoints, for digital packet telephony/
media (voice/video/data) over internet
protocol communications; or
(D) Air-interface coverage (e.g.,
through base stations, access points to
mesh networks, bridges, etc.) exceeding
1,000 meters, where any of the
following applies:
VerDate Aug<31>2005
18:36 Oct 02, 2008
Jkt 217001
(1) Maximum transmission data rates
exceeding 10 Mbps (at operating ranges
beyond 1,000 meters);
(2) Maximum number of concurrent
full-duplex voice channels exceeding
30; or
(3) Substantial support is required for
installation or use;
(ii) Encryption source code that
would not be eligible for export or
reexport under License Exception TSU
because it is not publicly available as
that term is used in § 740.13(e)(1) of the
EAR, and the export or reexport of the
encryption source code that is not
otherwise eligible for License Exception
ENC under paragraph (b)(1)(ii)(B) of this
section;
(iii) Encryption software,
commodities or components therefor,
that have any of the following:
(A) Been designed, modified, adapted
or customized for ‘‘government enduser(s)’’ or government end-use (e.g., to
secure police, state security, or
emergency response communications),
including encryption commodities and
software for external security operations
center (SOC)/network operations center
(NOC) command and infrastructure,
public safety radio, and digital
forensics/computer forensics;
(B) Cryptographic functionality that
has been modified or customized to
customer specification; or
(C) Cryptographic functionality or
‘‘encryption component’’ (except
encryption software that would be
considered publicly available, as that
term is used in § 740.13(e)(1) of the
EAR) that is user-accessible and can be
easily changed by the user;
(iv) ‘‘Cryptanalytic items’’;
(v) Encryption commodities and
software that provide functions
necessary for quantum cryptography, as
defined in ECCN 5A002 of the
Commerce Control List;
(vi) Encryption commodities and
software that have been modified or
customized for computers classified
under ECCN 4A003.
(3) Review required with 30 day
waiting period (‘‘government end-users’’
or non-‘‘government end-users’’). Thirty
days after your review request is
registered with BIS in accordance with
paragraph (d) of this section, License
Exception ENC authorizes the export
and reexport of software and
commodities and components not listed
in paragraph (b)(2) of this section to
either ‘‘government end-users’’ or non‘‘government end-users’’ located in a
country not listed in Supplement No. 3
to this part or Country Group E:1 of
Supplement No. 1 to part 740 of the
EAR.
PO 00000
Frm 00021
Fmt 4700
Sfmt 4700
57505
(4) Items excluded from review
requirements—(i) Short-range wireless
encryption functions. Commodities and
software not otherwise controlled in
Category 5, but that are classified under
ECCN 5A002, 5B002 or 5D002 only
because they incorporate components or
software that provide short-range
wireless encryption functions (e.g., with
a nominal operating range not exceeding
100 meters according to the
manufacturer’s specifications).
Commodities and software included in
this description include those designed
to comply with the Institute of Electrical
and Electronic Engineers (IEEE) 802.11
wireless LAN standard (35 meters) for
short-range use and those designed to
comply with the IEEE 802.15.1 standard
that provide only the short-range
wireless encryption functionality, and
would not be classified under Category
5, part 1 of the CCL
(telecommunications) absent this
encryption functionality. Certain items
excluded from review by this paragraph
may also be excluded from review
under paragraph (b)(4)(iii) of this
section (personal area networks) or
paragraph (b)(4)(iv) of this section
(commodities and software that provide
‘‘ancillary cryptography’’).
(ii) Foreign products developed with
or incorporating U.S.-origin encryption
source code, components, or toolkits.
Foreign products developed with or
incorporating U.S.-origin encryption
source code, components or toolkits that
are subject to the EAR, provided that the
U.S.-origin encryption items have
previously been reviewed and
authorized by BIS and the cryptographic
functionality has not been changed.
Such products include foreigndeveloped products that are designed to
operate with U.S. products through a
cryptographic interface.
(iii) Wireless ‘‘personal area network’’
items. Wireless ‘‘personal area network’’
items that implement only published or
commercial cryptographic standards
and where the cryptographic capability
is limited to a nominal operating range
not exceeding 30 meters according to
the manufacturer’s specifications. See
Nota Bene of the definition for
‘‘personal area network’’ in § 772.1 of
the EAR.
(iv) ‘‘Ancillary cryptography.’’
Commodities and software that perform
‘‘ancillary cryptography.’’ See Nota
Bene of definition of ‘‘ancillary
cryptography’’ in § 772.1 of the EAR.
Note to paragraph (b): A new product
review is required if a change is made to the
cryptographic functionality (e.g., algorithms)
or other technical characteristics affecting
License Exception ENC eligibility (e.g.,
encrypted throughput) of the originally
E:\FR\FM\03OCR1.SGM
03OCR1
57506
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
jlentini on PROD1PC65 with RULES
reviewed product. However, a new product
review is not required when a change
involves: The subsequent bundling, patches,
upgrades or releases of a product; name
changes; or changes to a previously reviewed
encryption product where the change is
limited to updates of encryption software
components where the product is otherwise
unchanged.
(c) Reexport and transfer. U.S. or
foreign distributors, resellers or other
entities who are not original
manufacturers of encryption
commodities and software are permitted
to use License Exception ENC only in
instances where the export or reexport
meets the applicable terms and
conditions of this section. Transfers of
encryption items listed in paragraph
(b)(2) of this section to ‘‘government
end-users,’’ or for government end-uses,
within the same country are prohibited,
unless otherwise authorized by license
or license exception.
(d) Review request procedures—(1)
Submission. To request review of your
encryption items under License
Exception ENC, you must submit to BIS
and to the ENC Encryption Request
Coordinator form BIS–748P
(Multipurpose Application), or its
electronic equivalent in accordance
with the instructions in paragraph (r) of
Supplement No. 2 to part 748 ‘‘Unique
Application and Submission
Requirements’’ and the applicable
information described in paragraphs (a)
through (e) of Supplement No. 6 to part
742 of the EAR (Guidelines for
Submitting Review Requests for
Encryption Items). Failure to properly
complete these items may delay
consideration of your review request.
(2) Action by BIS—(i) Notification.
Upon completion of its review, BIS will
send you written notice of the
provisions of this section, if any, under
which your items may be exported or
reexported.
(ii) After 30 days. If BIS has not,
within 30 days of registration of a
complete review request from you,
informed you that your item is not
authorized for License Exception ENC,
you may export or reexport under the
applicable provisions of License
Exception ENC.
(iii) Hold Without Action (HWA). BIS
may hold your review request without
action if necessary to obtain additional
information or for any other reason
necessary to ensure an accurate
determination with respect to ENC
eligibility. Time on such ‘‘hold without
action’’ status shall not be counted
towards fulfilling the 30 day waiting
period specified in this paragraph and
in paragraphs (b)(2) and (b)(3) of this
section. BIS may require you to supply
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
additional relevant technical
information about your encryption
item(s) or information that pertains to
their eligibility for License Exception
ENC at any time, before or after the
expiration of the 30 day waiting period
specified in this paragraph and in
paragraphs (b)(2) and (b)(3) of this
section. If you do not supply such
information within 14 days after
receiving a request for it from BIS, BIS
may return your review request(s)
without action or otherwise suspend or
revoke your eligibility to use License
Exception ENC for that item(s). At your
request, BIS may grant you up to an
additional 14 days to provide the
requested information. Any request for
such an additional number of days must
be made prior to the date by which the
information was otherwise due to be
provided to BIS, and may be approved
if BIS concludes that additional time is
necessary.
(e) Reporting requirements—(1) Semiannual reporting requirement. Semiannual reporting is required for exports
to all destinations other than Canada,
and for reexports from Canada, under
this license exception. Certain
encryption items and transactions are
excluded from this reporting
requirement, see paragraph (e)(1)(iii) of
this section. For information about what
must be included in the report and
submission requirements, see
paragraphs (e)(1)(i) and (e)(1)(ii) of this
section respectively.
(i) Information required. Exporters
must include for each item, the
Commodity Classification Automated
Tracking System (CCATS) number and
the name of the item(s) exported (or
reexported from Canada), and the
following information in their reports:
(A) Distributors or resellers. For items
exported (or reexported from Canada) to
a distributor or other reseller, including
subsidiaries of U.S. firms, the name and
address of the distributor or reseller, the
item and the quantity exported or
reexported and, if collected by the
exporter as part of the distribution
process, the end-user’s name and
address;
(B) Individual consumers. For items
exported (or reexported from Canada) to
individual consumers through direct
sale, the name and address of the
recipient, the item, and the quantity
exported; or
(C) Foreign manufacturers and
products that use encryption items. For
exports (i.e., from the United States) or
direct transfers (e.g. by a ‘‘U.S.
subsidiary’’ located outside the United
States) of encryption components,
source code, general purpose toolkits,
equipment controlled under ECCN
PO 00000
Frm 00022
Fmt 4700
Sfmt 4700
5B002, technology, or items that provide
an ‘‘open cryptographic interface’’
exported to a foreign developer or
manufacturer headquartered in a
country not listed in Supplement No. 3
to this part when intended for use in
foreign products developed for
commercial sale, the names and
addresses of the manufacturers using
these encryption items and, if known,
when the product is made available for
commercial sale, a non-proprietary
technical description of the foreign
products for which these encryption
items are being used (e.g., brochures,
other documentation, descriptions or
other identifiers of the final foreign
product; the algorithm and key lengths
used; general programming interfaces to
the product, if known; any standards or
protocols that the foreign product
adheres to; and source code, if
available).
(ii) Submission requirements. For
exports occurring between January 1
and June 30, a report is due no later
than August 1 of that year. For exports
occurring between July 1 and December
31, a report is due no later than
February 1 the following year. These
reports must be provided in electronic
form. Recommended file formats for
electronic submission include
spreadsheets, tabular text or structured
text. Exporters may request other
reporting arrangements with BIS to
better reflect their business models.
Reports may be sent electronically to
BIS at crypt@bis.doc.gov and to the ENC
Encryption Request Coordinator at
enc@nsa.gov, or disks and CDs
containing the reports may be sent to
the following addresses:
(A) Department of Commerce, Bureau
of Industry and Security, Office of
National Security and Technology
Transfer Controls, 14th Street and
Pennsylvania Ave., NW., Room 2705,
Washington, DC 20230, Attn:
Encryption Reports, and
(B) Attn: ENC Encryption Request
Coordinator, 9800 Savage Road, Suite
6940, Ft. Meade, MD 20755–6000.
(iii) Exclusions from reporting
requirement. Reporting is not required
for the following items and transactions:
(A) Any encryption item exported (or
reexported from Canada) under
paragraph (a) of this section;
(B) Encryption commodities or
software with a symmetric key length
not exceeding 64 bits;
(C) Encryption commodities or
software authorized under paragraph
(b)(3) of this section, exported (or
reexported from Canada) to individual
consumers;
E:\FR\FM\03OCR1.SGM
03OCR1
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
(D) Encryption items exported (or
reexported from Canada) via free and
anonymous download;
(E) Encryption items from or to a U.S.
bank, financial institution or its
subsidiaries, affiliates, customers or
contractors for banking or financial
operations;
(F) Items listed in (b)(4) of this
section, unless it is a foreign item
described in (b)(4)(ii) that has entered
the United States;
(G) Foreign products developed by
bundling or compiling of source code;
(H) General purpose operating
systems, or desktop applications (e.g., email, browsers, games, word processing,
data base, financial applications or
utilities) authorized under paragraph
(b)(3) of this section;
(I) Client Internet appliance and client
wireless LAN cards; or
(J) Other items as determined on a
case-by-case basis.
(2) Reporting key length increases.
Reporting is required for commodities
and software that, after having been
reviewed and authorized for License
Exception ENC by BIS, are modified
only to upgrade the key length used for
confidentiality or key exchange
algorithms. Such items may be exported
or reexported under the previously
authorized provision of License
Exception ENC without further review.
(i) Information required. (A) A
certification that no change to the
encryption functionality has been made
other than to upgrade the key length for
confidentiality or key exchange
algorithms.
(B) The original Commodity
Classification Automated Tracking
System (CCATS) authorization number
issued by BIS and the date of issuance.
(C) The new key length.
(ii) Submission requirements. (A) The
report must be received by BIS and the
ENC Encryption Request Coordinator
before the export or reexport of the
upgraded product; and
(B) The report is e-mailed to
crypt@bis.doc.gov and enc@nsa.gov.
Supplement No. 3 to Part 740
[Amended]
13. Supplement No. 3 is amended by:
a. Revising the heading to read
‘‘License Exception ENC Favorable
Treatment Countries’’; and
■ b. Adding Bulgaria, Canada, Iceland,
Romania, and Turkey in alphabetic
order.
■
■
jlentini on PROD1PC65 with RULES
PART 742—[AMENDED]
14. The authority citation for part 742
continues to read as follows:
■
Authority: 50 U.S.C. app. 2401 et seq.; 50
U.S.C. 1701 et seq.; 22 U.S.C. 3201 et seq.;
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
42 U.S.C. 2139a; 22 U.S.C. 7201 et seq.; 22
U.S.C. 7210; Sec 1503, Pub. L. 108–11, 117
Stat. 559; E.O. 12058, 43 FR 20947, 3 CFR,
1978 Comp., p. 179; E.O. 12851, 58 FR 33181,
3 CFR, 1993 Comp., p. 608; E.O. 12938, 59
FR 59099, 3 CFR, 1994 Comp., p. 950; E.O.
13026, 61 FR 58767, 3 CFR, 1996 Comp., p.
228; E.O. 13222, 66 FR 44025, 3 CFR, 2001
Comp., p. 783; Presidential Determination
2003–23 of May 7, 2003, 68 FR 26459, May
16, 2003; Notice of July 23, 2008, 73 FR
43603 (July 25, 2008); Notice of November 8,
2007, 72 FR 63963 (November 13, 2007).
15. Section 742.15 is revised to read
as follows:
■
§ 742.15
Encryption items.
Encryption items can be used to
maintain the secrecy of information, and
thereby may be used by persons abroad
to harm U.S. national security, foreign
policy and law enforcement interests.
The United States has a critical interest
in ensuring that important and sensitive
information of the public and private
sector is protected. Consistent with our
international obligations as a member of
the Wassenaar Arrangement, the United
States has a responsibility to maintain
control over the export and reexport of
encryption items. As the President
indicated in Executive Order 13026 and
in his Memorandum of November 15,
1996, exports and reexports of
encryption software, like exports and
reexports of encryption hardware, are
controlled because of this functional
capacity to encrypt information, and not
because of any informational or
theoretical value that such software may
reflect, contain, or represent, or that its
export or reexport may convey to others
abroad. For this reason, export controls
on encryption software are
distinguished from controls on other
software regulated under the EAR.
(a) Licensing requirements and
policy—(1) Licensing requirements. A
license is required to export or reexport
encryption items (‘‘EI’’) classified under
ECCN 5A002.a.1, a.2, a.5, a.6 and a.9;
5D002.a or c.1 for equipment controlled
for EI reasons in ECCN 5A002; or 5E002
for ‘‘technology’’ for the ‘‘development,’’
‘‘production,’’ or ‘‘use’’ of commodities
or ‘‘software’’ controlled for EI reasons
in ECCNs 5A002 or 5D002 to all
destinations, except Canada. Refer to
part 740 of the EAR for license
exceptions that apply to certain
encryption items, and to § 772.1 of the
EAR for definitions of encryption items
and terms. Most encryption items may
be exported under the provisions of
License Exception ENC set forth in
§ 740.17 of the EAR. Before submitting
a license application, please review
License Exception ENC to determine
whether this license exception is
available for your item or transaction.
PO 00000
Frm 00023
Fmt 4700
Sfmt 4700
57507
For exports and reexports of encryption
items that are not eligible for a license
exception, exporters must submit an
application to obtain authorization
under a license or an Encryption
Licensing Arrangement.
(2) Licensing policy. Applications will
be reviewed on a case-by-case basis by
BIS, in conjunction with other agencies,
to determine whether the export or
reexport is consistent with U.S. national
security and foreign policy interests.
Encryption Licensing Arrangements
(ELAs) may be authorized for exports
and reexports of unlimited quantities of
encryption commodities and software to
national or federal government
bureaucratic agencies for civil use, and
to state, provincial or local
governments, in all destinations, except
countries listed in Country Group E:1 of
Supplement No. 1 to part 740. ELAs are
valid for four years and may require
post-export reporting or pre-shipment
notification. Applicants seeking
authorization for Encryption Licensing
Arrangements must specify the sales
territory and class of end-user on their
license applications.
Note to paragraph (a): Pursuant to Note 3
to Category 5 Part 2 of the Commerce Control
List in Supplement No. 1 to part 774, once
mass market encryption commodities and
software have been reviewed by BIS and the
ENC Encryption Request Coordinator (Ft.
Meade, MD) and released from ‘‘EI’’ and
‘‘NS’’ controls pursuant to § 742.15(b) of the
EAR, they are classified under ECCN 5A992
and 5D992 respectively, and are thereafter
outside the scope of this section.
(b) Review requirement for mass
market encryption commodities and
software exceeding 64 bits: Mass market
encryption commodities and software
employing a key length greater than 64
bits for the symmetric algorithm
(including such products previously
reviewed by BIS and exported under
ECCN 5A002 or 5D002) are subject to
the EAR and require review by BIS and
the ENC Encryption Request
Coordinator (Ft. Meade, MD), prior to
export or reexport. Encryption
commodities and software that are
described in § 740.17(b)(2) of the EAR
do not qualify for mass market
treatment. A new product review is
required if a change is made to the
cryptographic functionality (e.g.,
algorithms) or other technical
characteristics affecting mass market
eligibility (e.g., performance
enhancements to provide network
infrastructure services, or
customizations to end-user
specifications) of the originally
reviewed product. However, a new
product review is not required when a
change involves: The subsequent
E:\FR\FM\03OCR1.SGM
03OCR1
jlentini on PROD1PC65 with RULES
57508
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
bundling, patches, upgrades or releases
of a product; name changes; or changes
to a previously reviewed encryption
product where the change is limited to
updates of encryption software
components where the product is
otherwise unchanged.
(1) Procedures for requesting review.
To request review of your mass market
encryption products, you must submit
to BIS and the ENC Encryption Request
Coordinator the information described
in paragraphs (a) through (e) of
Supplement No. 6 to this part 742, and
you must include specific information
describing how your products qualify
for mass market treatment under the
criteria in the Cryptography Note (Note
3) of Category 5, Part 2 (‘‘Information
Security’’), of the Commerce Control
List (Supplement No. 1 to part 774 of
the EAR). Review requests must be
submitted on Form BIS–748P
(Multipurpose Application), or its
electronic equivalent, as described in
§ 748.3 of the EAR. See paragraph (r) of
Supplement No. 2 to Part 748 of the
EAR for special instructions about this
submission. Review requests that are
not submitted electronically to BIS
should be mailed to the address
indicated in § 748.2(c) of the EAR.
Submissions to the ENC Encryption
Request Coordinator should be directed
to the mailing address indicated in
§ 740.17(e)(1)(ii) of the EAR. BIS will
notify you if there are any questions
concerning your request for review (e.g.,
because of missing or incompatible
support documentation).
(2) Action by BIS. Once BIS has
completed its review, you will receive
written confirmation concerning the
eligibility of your items for export or
reexport as mass market encryption
commodities or software classified
under ECCN 5A992 or 5D992. If, during
the course of its review, BIS determines
that your encryption items do not
qualify for mass market treatment under
the EAR, or are otherwise classified
under ECCN 5A002, 5B002, 5D002 or
5E002, BIS will notify you and will
review your commodities or software for
eligibility under License Exception ENC
(see § 740.17 of the EAR for review and
reporting requirements for encryption
items under License Exception ENC).
BIS reserves the right to suspend your
eligibility to export and reexport under
the provisions of this paragraph (b) and
to return review requests, without
action, if the requirements for review
have not been met. Thirty days after BIS
registers your review request, you may
export or reexport these mass market
encryption products, without a license,
to government and non-government
end-users located in most destinations
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
outside the countries listed in
Supplement No. 3 to part 740 of the
EAR (certain destinations and persons
may require a license for anti-terrorism
(AT) reasons or for reasons specified
elsewhere in the EAR), unless otherwise
notified by BIS (e.g., because of missing
or incomplete support documentation or
conversion to License Exception ENC
review.) The thirty days does not
include any time that your review
request is on hold without action.
(3) Exclusions from review
requirements. The following
commodities and software do not
require review prior to export or
reexport as mass market products.
(i) Short-range wireless encryption
functions. Commodities and software
not otherwise controlled in Category 5,
but that are classified under ECCN
5A992 or 5D992 only because they
incorporate components or software that
provide short-range wireless encryption
functions (e.g., with a nominal operating
range not exceeding 100 meters
according to the manufacturer’s
specifications). Commodities and
software included in this description
include those designed to comply with
the Institute of Electrical and Electronic
Engineers (IEEE) 802.11 wireless LAN
standard (35 meters) for short-range use
and those designed to comply with the
IEEE 802.15.1 standard that provide
only the short-range wireless encryption
functionality, and would not be
classified under Category 5, part 1 of the
CCL (telecommunications) absent this
encryption functionality. Certain items
excluded from review by this paragraph
may also be excluded from review
under paragraph (b)(3)(ii) of this section
(personal area networks) or paragraph
(b)(3)(iii) of this section (commodities
and software that provide ‘‘ancillary
cryptography’’).
(ii) Wireless ‘‘personal area network’’
items. Wireless ‘‘personal area network’’
items that implement only published or
commercial cryptographic standards
and where the cryptographic capability
is limited to a nominal operating range
not exceeding 30 meters according to
the manufacturer’s specifications. See
Nota Bene of the definition for
‘‘personal area network’’ in § 772.1 of
the EAR.
(iii) ‘‘Ancillary cryptography’’.
Commodities and software that perform
‘‘ancillary cryptography.’’ See Nota
Bene of definition of ‘‘ancillary
cryptography’’ in § 772.1 of the EAR.
(4) Commodities and software that
activate or enable cryptographic
functionality. Commodities, software,
and components that allow the end-user
to activate or enable cryptographic
functionality in encryption products
PO 00000
Frm 00024
Fmt 4700
Sfmt 4700
which would otherwise remain
disabled, are controlled according to the
functionality of the activated encryption
product.
(5) Examples of mass market
encryption products. Subject to the
requirements of the Cryptography Note
(Note 3) in Category 5, Part 2, of the
Commerce Control List, mass market
encryption products include, but are not
limited to, general purpose operating
systems and desktop applications (e.g.,
e-mail, browsers, games, word
processing, database, financial
applications or utilities) designed for
use with computers classified as ECCN
4A994 or EAR99, laptops, or hand-held
devices; commodities and software for
client Internet appliances and client
wireless LAN devices; home use
networking commodities and software
(e.g., personal firewalls, cable modems
for personal computers, and consumer
set top boxes); and portable or mobile
civil telecommunications commodities
and software (e.g., personal data
assistants (PDAs), radios, or cellular
products).
Supplement No. 4 to Part 742
[Removed]
■ 16. Supplement No. 4 to Part 742 is
removed and reserved.
■ 17. Supplement No. 6 to Part 742 is
amended by:
■ a. Revising the introductory
paragraph;
■ b. Revising paragraph (a);
■ c. Revising paragraphs (c)(1), (c)(6),
and (c)(11);
■ e. Revising the introductory
paragraphs of (d) and (e), to read as
follows:
Supplement No. 6 to Part 742—
Guidelines for Submitting Review
Requests for Encryption Items
Review requests for encryption items must
be submitted on Form BIS–748P
(Multipurpose Application), or its electronic
equivalent, and supported by the
documentation described in this
Supplement, in accordance with the
procedures described in § 748.3 of the EAR.
To ensure that your review request is
properly routed, insert the phrase ‘‘Mass
market encryption’’ or ‘‘License Exception
ENC’’ (whichever is applicable) in Block 9
(Special Purpose) of the application form and
place an ‘‘X’’ in the box marked
‘‘Classification Request’’ in Block 5 (Type of
Application)—Block 5 does not provide a
separate item to check for the submission of
encryption review requests. Failure to
properly complete these items may delay
consideration of your review request. BIS
recommends that review requests be
delivered via courier service or be sent to:
Bureau of Industry and Security, U.S.
Department of Commerce, 14th Street and
Pennsylvania Ave., NW., Room 2705,
Washington, DC 20230.
E:\FR\FM\03OCR1.SGM
03OCR1
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
For electronic submissions via SNAP–R,
support documents not readily attached in
PDF format must be sent to: Bureau of
Industry and Security, Information
Technology Controls Division, Room 2093,
14th Street and Pennsylvania Ave., NW.,
Washington, DC 20230.
In addition, you must send a copy of your
review request and all support documents to:
Attn: ENC Encryption Request Coordinator,
9800 Savage Road, Suite 6940, Fort Meade,
MD 20755–6000.
If you intend to rely on the 30 day
registration provisions of the regulations,
express mail certification of these documents
is needed.
(a)(1) State the name(s) of each product
being submitted for review and provide a
brief non-technical description of the type of
product (e.g., routers, disk drives, cell
phones, chips, etc.) being submitted.
(2) Indicate whether there have been any
prior reviews of the product(s), if such
reviews are applicable to the current
submission. For products with minor
changes in encryption functionality, you
must include a cover sheet with complete
reference to the previous review (Commodity
Classification Automated Tracking System
(CCATS) number, Application Control
Number (ACN), Export Control Classification
Number (ECCN), authorization paragraph)
along with a clear description of the changes.
(3) Describe how encryption is used in the
product and the categories of encrypted data
(e.g., stored data, communications,
management data, internal data, etc.).
(4) For mass market review requests,
describe specifically to whom and how the
product is being marketed and state how this
method of marketing and other relevant
information (e.g., cost of product and volume
of sales) are described by the Cryptography
Note (Note 3 to Category 5, Part 2).
(5) Is any ‘‘encryption source code’’ being
provided (shipped or bundled) as part of this
offering? If yes, is this source code publicly
available source code, unchanged from the
code obtained from an open source web site,
or is it proprietary ‘‘encryption source code?’’
applicable (e.g., maximum aggregate
encrypted user data throughput, maximum
number of concurrent encrypted channels,
and operating range for wireless products). If
the § 740.17(b)(2) parameters are not
applicable to the commodity or software,
clearly explain why (e.g., by providing
specific data evaluated against the
§ 740.17(b)(2) thresholds.)
(d) For review requests for hardware or
software ‘‘encryption components’’ other
than source code (i.e., chips, toolkits,
executable or linkable modules intended for
use in or production of another encryption
item) provide the following additional
information:
*
■
*
*
*
*
(c) * * *
(1) Description of all the symmetric and
asymmetric encryption algorithms and key
lengths and how the algorithms are used,
including relevant parameters, inputs and
settings. Specify which encryption modes are
supported (e.g., cipher feedback mode or
cipher block chaining mode).
*
*
*
*
*
(6) State all communication protocols (e.g.,
X.25, Telnet, TCP, IEEE 802.11, IEEE 802.16,
SIP * * *) and cryptographic protocols and
methods (e.g., SSL, TLS, SSH, IPSEC, IKE,
SRTP, ECCN, MD5, SHA, X.509, PKCS
standards * * *) that are supported and
describe how they are used.
jlentini on PROD1PC65 with RULES
*
*
*
*
*
(11) License Exception ENC ‘Restricted’
commodities and software described by the
criteria in § 740.17(b)(2) require licenses to
certain ‘‘government end-users.’’ Describe
whether the product(s) meet any of the
§ 740.17(b)(2) criteria. Provide specific data
for each of the parameters listed, as
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
*
*
*
*
*
(e) For review requests for ‘‘encryption
source code’’ provide the following
information:
*
*
*
*
*
PART 744—[AMENDED]
18. The authority citation for part 744
continues to read as follows:
■
Authority: 50 U.S.C. app. 2401 et seq.; 50
U.S.C. 1701 et seq.; 22 U.S.C. 3201 et seq.;
42 U.S.C. 2139a; 22 U.S.C. 7201 et seq.; 22
U.S.C. 7210; E.O. 12058, 43 FR 20947, 3 CFR,
1978 Comp., p. 179; E.O. 12851, 58 FR 33181,
3 CFR, 1993 Comp., p. 608; E.O. 12938, 59
FR 59099, 3 CFR, 1994 Comp., p. 950; E.O.
12947, 60 FR 5079, 3 CFR, 1995 Comp., p.
356; E.O. 13026, 61 FR 58767, 3 CFR, 1996
Comp., p. 228; E.O. 13099, 63 FR 45167, 3
CFR, 1998 Comp., p. 208; E.O. 13222, 66 FR
44025, 3 CFR, 2001 Comp., p. 783; E.O.
13224, 66 FR 49079, 3 CFR, 2001 Comp., p.
786; Notice of July 23, 2008, 73 FR 43603
(July 25, 2008); Notice of November 8, 2007,
72 FR 63963 (November 13, 2007).
§ 744.9
■
[Removed]
19. Remove and reserve § 744.9.
PART 746—[AMENDED]
20. The authority citation for part 746
is revised to read as follows:
Authority: 50 U.S.C. app. 2401 et seq.; 50
U.S.C. 1701 et seq.; 22 U.S.C. 287c; Sec 1503,
Pub. L. 108–11, 117 Stat. 559; 22 U.S.C. 6004;
22 U.S.C. 7201 et seq.; 22 U.S.C. 7210; E.O.
12854, 58 FR 36587, 3 CFR, 1993 Comp., p.
614; E.O. 12918, 59 FR 28205, 3 CFR, 1994
Comp., p. 899; E.O. 13222, 3 CFR, 2001
Comp., p. 783; Presidential Determination
2003–23 of May 7, 2003, 68 FR 26459, May
16, 2003; Presidential Determination 2007–7
of December 7, 2006, 72 FR 1899 (January 16,
2007); Notice of July 23, 2008, 73 FR 43603
(July 25, 2008).
§ 746.3
[Amended]
21. Section 746.3 is amended in
paragraph (c) by revising the phrase
‘‘License Exceptions: CIV, APP, TMP,
RPL, GOV, GFT, TSU, BAG, AVS, ENC
or KMI.’’ to read ‘‘License Exceptions:
CIV, APP, TMP, RPL, GOV, GFT, TSU,
BAG, AVS, or ENC.’’
■
PO 00000
Frm 00025
Fmt 4700
Sfmt 4700
57509
PART 748—[AMENDED]
22. The authority citation for part 748
continues to read as follows:
■
Authority: 50 U.S.C. app. 2401 et seq.; 50
U.S.C. 1701 et seq.; E.O. 13026, 61 FR 58767,
3 CFR, 1996 Comp., p. 228; E.O. 13222, 66
FR 44025, 3 CFR, 2001 Comp., p. 783; Notice
of July 23, 2008, 73 FR 43603 (July 25, 2008).
23. Supplement No. 2 to part 748 is
amended by revising paragraph (r) to
read as follows:
■
Supplement No. 2 to Part 748—Unique
Application and Submission
Requirements
*
*
*
*
*
(r) Encryption review requests. Enter, in
Block 9 (Special Purpose) of the BIS–748P,
‘‘License Exception ENC’’ if you are
submitting an encryption review request for
License Exception ENC (§ 740.17 of the EAR)
or ‘‘mass market encryption’’ if you are
submitting an encryption review request
under the mass market encryption provisions
(§ 742.15(b) of the EAR). If you seek an
encryption review for another reason, enter
‘‘encryption—other’’. Neither the electronic
nor paper forms provide a separate Block to
check for the submission of encryption
review requests, therefore you must also,
place an ‘‘X’’ in the box marked
‘‘Classification Request’’ in Block 5 (Type of
Application) of Form BIS–748P or select
‘‘Commodity Classification’’ if filing
electronically. Failure to properly complete
these items may delay consideration of your
review request.
*
*
*
*
*
PART 750—[AMENDED]
24. The authority citation for part 750
continues to read as follows:
■
Authority: 50 U.S.C. app. 2401 et seq.; 50
U.S.C. 1701 et seq.; Sec. 1503, Pub. L. 108–
11, 117 Stat. 559; E.O. 13026, 61 FR 58767,
3 CFR, 1996 Comp., p. 228; E.O. 13222, 66
FR 44025, 3 CFR, 2001 Comp., p. 783;
Presidential Determination 2003–23 of May
7, 2003, 68 FR 26459, May 16, 2003; Notice
of July 23, 2008, 73 FR 43603 (July 25, 2008).
25. Section 750.3 is amended by:
a. Removing paragraph (b)(2)(iv) and
redesignating paragraph (b)(2)(v) as
(b)(2)(iv); and
■ b. Revising (b)(2)(iii) to read as
follows:
■
■
§ 750.3 Review of License Applications by
BIS and Other Government Agencies and
Departments.
*
*
*
*
*
(b) * * *
(2) * * *
(iii) The Department of State is
concerned primarily with items
controlled for national security, nuclear
nonproliferation, missile technology,
E:\FR\FM\03OCR1.SGM
03OCR1
57510
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
regional stability, anti-terrorism, crime
control reasons, and sanctions; and
*
*
*
*
*
§ 750.7
[Amended]
26. Section 750.7 is amended by:
a. Removing and reserving paragraph
(c)(2); and
■ b. Removing the third and fourth
sentences in the introductory text of
paragraph (d).
■
■
PART 762—[AMENDED]
27. The authority citation for part 762
is revised to read as follows:
■
Authority: 50 U.S.C. app. 2401 et seq.; 50
U.S.C. 1701 et seq.; E.O. 13222, 66 FR 44025,
3 CFR, 2001 Comp., p. 783; Notice of July 23,
2008, 73 FR 43603 (July 25, 2008).
§ 762.2
[Amended]
28. Section 762.2 is amended by
removing and reserving paragraph
(b)(8).
■
PART 770—[AMENDED]
29. The authority citation for part 770
is revised to read as follows:
■
Authority: 50 U.S.C. app. 2401 et seq.; 50
U.S.C. 1701 et seq.; E.O. 13222, 66 FR 44025,
3 CFR, 2001 Comp., p. 783; Notice of July 23,
2008, 73 FR 43603 (July 25, 2008).
§ 770.2
[Amended]
30. Section 770.2 is amended by
removing paragraph (n).
■
PART 772—[AMENDED]
31. The authority citation for part 772
continues to read as follows:
■
Authority: 50 U.S.C. app. 2401 et seq.; 50
U.S.C. 1701 et seq.; E.O. 13222, 66 FR 44025,
3 CFR, 2001 Comp., p. 783; Notice of July 23,
2008, 73 FR 43603 (July 25, 2008).
32. Section 772.1 is amended by:
a. Removing the term and definition
‘‘strategic partners (of a U.S. company)’’;
and
■ b. Adding the terms and definitions
for ‘‘ancillary cryptography’’ and
‘‘personal area network’’ in alphabetic
order, to read as follows:
■
■
§ 772.1 Definitions of terms as used in the
Export Administration Regulations (EAR).
jlentini on PROD1PC65 with RULES
*
*
*
*
*
Ancillary cryptography. The
incorporation or application of
‘‘cryptography’’ by items that are not
primarily useful for computing
(including the operation of ‘‘digital
computers’’), communications,
networking (includes operation,
administration, management and
provisioning) or ‘‘information security’’.
N.B. Commodities and software that
perform ‘‘ancillary cryptography’’ (e.g.,
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
are specially designed and limited to:
piracy and theft prevention for software,
music, etc.; games and gaming;
household utilities and appliances;
printing, reproduction, imaging and
video recording or playback (but not
videoconferencing); business process
modeling and automation (e.g., supply
chain management, inventory,
scheduling and delivery); industrial,
manufacturing or mechanical systems
(including robotics, other factory or
heavy equipment, facilities systems
controllers including fire alarms and
HVAC); automotive, aviation and other
transportation systems). Commodities
and software included in this
description are not limited to wireless
communication and are not limited by
range or key length.
*
*
*
*
*
Personal area network. A data
communication system having all of the
following characteristics:
(a) Allows an arbitrary number of
independent or interconnected ‘data
devices’’ to communicate directly with
each other; and
(b) Is confined to the communication
between devices within the immediate
vicinity of an individual person or
device controller (e.g., single room,
office, or automobile).
Technical Note: ‘Data device’ means
equipment capable of transmitting or
receiving sequences of digital
information.
N.B. ‘‘Personal area network’’ items
include but are not limited to items
designed to comply with the Institute of
Electrical and Electronic Engineers
(IEEE) 802.15.1 standard, class 2 (10
meters) and class 3 (1 meter), but not
class 1 (100 meters) items. This includes
most home networking devices, but not
long-range enterprise equipment or
components that can be used in longrange equipment. IEEE 802.15.1 class 2
and class 3 devices include hands-free
headsets, wireless networking between
personal computers, wireless mice,
keyboards and printers, Global
Positioning Systems (GPS) receivers, bar
code scanners and game console
wireless controllers, as well as datacapable wireless telephones and devices
or software for transfer of files between
devices using Object Exchange (OBEX).
*
*
*
*
*
1354; 46 U.S.C. app. 466c; 50 U.S.C. app. 5;
22 U.S.C. 7201 et seq.; 22 U.S.C. 7210; E.O.
13026, 61 FR 58767, 3 CFR, 1996 Comp., p.
228; E.O. 13222, 66 FR 44025, 3 CFR, 2001
Comp., p. 783; Notice of July 23, 2008, 73 FR
43603 (July 25, 2008).
Supplement No. 1 to Part 774—
[Amended]
34. In Supplement No. 1 to Part 774
(the Commerce Control List), Category 5
Telecommunications and ‘‘Information
Security’’, Part 2 Information Security is
amended by revising the Nota Bene to
Cryptography Note, to read as follows:
■
CATEGORY 5—TELECOMMUNICATIONS
AND ‘‘INFORMATION SECURITY’’
*
*
*
*
*
II. ‘‘Information Security’’
*
*
*
*
*
N.B. to Cryptography Note: Mass market
encryption commodities and software
eligible for the Cryptography Note employing
a key length greater than 64 bits for the
symmetric algorithm must be reviewed in
accordance with the requirements of
§ 742.15(b) of the EAR in order to be released
from the ‘‘EI’’ and ‘‘NS’’ controls of ECCN
5A002 or 5D002.
35. In Supplement No. 1 to Part 774
(the Commerce Control List), Category 5
Telecommunications and ‘‘Information
Security’’, Part 2 Information Security,
Export Control Classification Number
(ECCN) 5A002 is amended by
■ a. Revising the EI paragraph of the
License Requirements section;
■ b. Removing the License
Requirements Notes from the License
Requirements section;
■ c. Adding a license exception
paragraph to the License Exception
section; and
■ d. Revising the Related Controls
paragraph of the List of Items Controlled
section, to read as follows:
■
5A002 Systems, equipment, application
specific ‘‘electronic assemblies’’, modules
and integrated circuits for ‘‘information
security’’, as follows (see List of Items
Controlled), and other specially designed
components therefor.
License Requirements
*
*
*
*
*
Control(s)
Country chart
PART 774—[AMENDED]
*
33. The authority citation for part 774
continues to read as follows:
EI applies to 5A002.a.1, a.2, a.5, a.6 and
a.9. Refer to § 742.15 of the EAR.
Authority: 50 U.S.C. app. 2401 et seq.; 50
U.S.C. 1701 et seq.; 10 U.S.C. 7420; 10 U.S.C.
7430(e); 22 U.S.C. 287c, 22 U.S.C. 3201 et
seq., 22 U.S.C. 6004; 30 U.S.C. 185(s), 185(u);
42 U.S.C. 2139a; 42 U.S.C. 6212; 43 U.S.C.
License Exceptions
■
PO 00000
Frm 00026
Fmt 4700
Sfmt 4700
*
*
*
*
*
*
*
*
*
ENC: Yes for certain EI controlled
commodities, see § 740.17 of the EAR for
eligibility.
E:\FR\FM\03OCR1.SGM
03OCR1
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
EI applies to ‘‘software’’ in 5D002.a or c.1
for equipment controlled for EI reasons in
ECCN 5A002. Refer to § 742.15 of the EAR.
‘‘production,’’ or ‘‘use’’ of equipment
controlled by ECCN 5A992.a or 5A992.b.
b. ‘‘Software’’ having the characteristics, or
performing or simulating the functions of the
equipment controlled by ECCN 5A992.a or
5A992.b.
c. ‘‘Software’’ that has been reviewed and
determined to be mass market encryption
software in accordance with § 742.15(b) of
the EAR.
*
■
List of Items Controlled
Unit: * * *
Related Controls: (1) 5A002 does not
control the commodities listed in paragraphs
(a) through (f) in the Note in the items
paragraph of this entry. These commodities
are instead classified under ECCN 5A992,
and related software and technology are
classified under ECCNs 5D992 and 5E992
respectively. (2) After a review and
classification by BIS, mass market encryption
commodities that meet eligibility
requirements are released from ‘‘EI’’ and
‘‘NS’’ controls. These commodities are
classified under ECCN 5A992.c. See
§ 742.15(b) of the EAR.
Related Definitions: * * *
Items: * * *
36. In Supplement No. 1 to Part 774
(the Commerce Control List), Category 5
Telecommunications and ‘‘Information
Security’’, Part 2 Information Security,
Export Control Classification Number
(ECCN) 5A992 is amended by revising
the License Requirements section and
paragraph c in the items paragraph of
the List of Items Controlled section, to
read as follows:
■
5A992
Equipment not controlled by 5A002.
License Requirements
*
*
*
*
*
Country chart
AT applies to entire entry ..
*
*
*
*
AT Column 1.
*
List of Items Controlled
*
*
*
*
*
*
*
*
Items:
*
*
c. Commodities that have been reviewed
and determined to be mass market
encryption commodities in accordance with
§ 742.15(b) of the EAR.
37. In Supplement No. 1 to Part 774
(the Commerce Control List), Category 5
Telecommunications and ‘‘Information
Security’’, Part 2 ‘‘Information
Security’’, Export Control Classification
Number (ECCN) 5D002 is amended by:
■ a. Revising the EI paragraph of the
License Requirements section;
■ b. Adding a new license exception to
the License Exception section;
■ c. Removing the third Note in the
License Requirements section; and
■ d. Revising the Related Controls
paragraph in the List of Items Controlled
section, to read as follows:
jlentini on PROD1PC65 with RULES
■
5D002
Information Security—‘‘Software’’.
License Requirements
*
*
*
VerDate Aug<31>2005
*
Control(s)
*
*
*
*
Country chart
*
*
*
*
*
License Exceptions
*
*
*
*
*
ENC: Yes for certain EI controlled software,
see § 740.17 of the EAR for eligibility.
List of Items Controlled
Unit: $ value
Related Controls: (1) This entry does not
control ‘‘software’’ ‘‘required’’ for the ‘‘use’’
of equipment excluded from control under
the Related Controls paragraph or the
Technical Notes in ECCN 5A002 or
‘‘software’’ providing any of the functions of
equipment excluded from control under
ECCN 5A002. This software is classified as
ECCN 5D992. (2) After a review and
classification by BIS, mass market encryption
software that meet eligibility requirements
are released from ‘‘EI’’ and ‘‘NS’’ controls.
This software is classified under ECCN
5D992.c. See § 742.15(b) of the EAR.
Related Definitions: * * *
Items: * * *
38. In Supplement No. 1 to Part 774
(the Commerce Control List), Category 5
Telecommunications and ‘‘Information
Security’’, Part 2 Information Security,
Export Control Classification Number
(ECCN) 5D992 is amended by:
■ a. Revising the License Requirements
section;
■ b. Revising the Related Controls
paragraph of the List of Items Controlled
section; and
■ c. Revising the Items paragraph of the
List of Items Controlled section, to read
as follows:
39. In Supplement No. 1 to Part 774
(the Commerce Control List), Category 5
Telecommunications and ‘‘Information
Security’’, Part 2 Information Security,
Export Control Classification Number
(ECCN) 5E002 is amended by:
■ a. Revising the EI paragraph and
adding a License Requirement Note in
the License Requirements section; and
■ b. Revising the Related Control
paragraph of the List of Items Controlled
section, to read as follows:
5E002 ‘‘Technology’’ according to the
General Technology Note for the
‘‘development’’, ‘‘production’’ or ‘‘use’’ of
equipment controlled by 5A002 or 5B002 or
‘‘software’’ controlled by 5D002.
License Requirements
*
*
*
17:58 Oct 02, 2008
Jkt 217001
5D992 ‘‘Information Security’’ ‘‘software’’
not controlled by 5D002.
License Requirements.
*
*
*
*
*
Control(s)
Country chart
AT applies to entire entry ..
AT Column 1.
*
*
*
Control(s)
■
Control(s)
57511
*
*
*
Country chart
*
*
EI applies to ‘‘technology’’ for the
‘‘development,’’ ‘‘production,’’ or ‘‘use’’ of
commodities or ‘‘software’’ controlled for EI
reasons in ECCNs 5A002 or 5D002. Refer to
§ 742.15 of the EAR.
License Requirement Note: When a person
performs or provides technical assistance
that incorporates, or otherwise draws upon,
‘‘technology’’ that was either obtained in the
United States or is of US-origin, then a
release of the ‘‘technology’’ takes place. Such
technical assistance, when rendered with the
intent to aid in the ‘‘development’’ or
‘‘production’’ of encryption commodities or
software that would be controlled for ‘‘EI’’
reasons under ECCN 5A002 or 5D002, may
require authorization under the EAR even if
the underlying encryption algorithm to be
implemented is from the public domain or is
not of U.S. origin.
*
*
*
*
*
List of Items Controlled
*
*
*
*
*
*
List of Items Controlled
Unit: * * *
Related Controls: This entry does not
control ‘‘software’’ designed or modified to
protect against malicious computer damage,
e.g., viruses, where the use of ‘‘cryptography’’
is limited to authentication, digital signature
and/or the decryption of data or files.
Related Definitions: * * *
Items:
a. ‘‘Software’’ specially designed or
modified for the ‘‘development,’’
PO 00000
Frm 00027
Fmt 4700
Sfmt 4700
*
*
*
*
Related Controls: See also 5E992. This
entry does not control ‘‘technology’’
‘‘required’’ for the ‘‘use’’ of equipment
excluded from control under the Related
Controls paragraph or the Technical Notes in
ECCN 5A002 or ‘‘technology’’ related to
equipment excluded from control under
ECCN 5A002. This ‘‘technology’’ is classified
as ECCN 5E992.
*
*
*
*
*
40. In Supplement No. 1 to Part 774
(the Commerce Control List), Category 5
■
E:\FR\FM\03OCR1.SGM
03OCR1
57512
Federal Register / Vol. 73, No. 193 / Friday, October 3, 2008 / Rules and Regulations
Telecommunications and ‘‘Information
Security’’, Part 2 Information Security,
Export Control Classification Number
(ECCN) 5E992 is amended by revising
the License Requirements section and
the List of Items Controlled section, to
read as follows:
5E992 ‘‘Information Security’’
‘‘technology’’, not controlled by 5E002.
License Requirements
*
*
*
*
*
Control(s)
Country chart
AT applies to entire entry ..
*
*
*
*
AT Column 1.
*
List of Items Controlled
*
*
*
*
*
Items:
a. ‘‘Technology’’ n.e.s., for the
‘‘development’’, ‘‘production’’ or ‘‘use’’ of
equipment controlled by 5A992.a,
‘‘information security’’or cryptologic
equipment controlled by 5A992.b or
‘‘software’’ controlled by 5D992.a or b.
b. ‘‘Technology’’, n.e.s., for the ‘‘use’’ of
mass market commodities controlled by
5A992.c or mass market ‘‘software’’
controlled by 5D992.c.
Dated: September 26, 2008.
Christopher R. Wall,
Assistant Secretary for Export
Administration.
[FR Doc. E8–23201 Filed 10–2–08; 8:45 am]
BILLING CODE 3510–33–P
COMMODITY FUTURES TRADING
COMMISSION
17 CFR Part 143
RIN 3038–AC13
Adjustment of Civil Monetary Penalties
for Inflation
Commodity Futures Trading
Commission.
ACTION: Final rule.
jlentini on PROD1PC65 with RULES
AGENCY:
SUMMARY: The Commodity Futures
Trading Commission (Commission) is
amending its rule which governs the
maximum amount of civil monetary
penalties, to adjust for inflation. This
rule sets forth the maximum, inflationadjusted dollar amount for civil
monetary penalties (CMPs) assessable
for violations of the Commodity
Exchange Act (Act) and Commission
rules and orders thereunder. The rule,
as amended, implements the Federal
Civil Penalties Inflation Adjustment Act
of 1990, as amended by the Debt
Collection Improvement Act of 1996.
The rules also reflect the higher
VerDate Aug<31>2005
17:58 Oct 02, 2008
Jkt 217001
penalties enacted this year by Congress
for violations of the Act prohibiting
manipulation and attempted
manipulation.
DATES: Effective Date: October 23, 2008.
FOR FURTHER INFORMATION CONTACT:
Thuy Dinh, Esq., Office of General
Counsel, at (202) 418–5128 or
tdinh@cftc.gov; or Richard Foelber, Esq.,
Division of Enforcement, at (202) 418–
5347 or rfoelber@cftc.gov, Commodity
Futures Trading Commission, 1155 21st
Street, NW., Washington, DC 20581.
This document also is available at
https://www.regulations.gov.
SUPPLEMENTARY INFORMATION:
I. Background
The Federal Civil Penalties Inflation
Adjustment Act of 1990 (FCPIAA), as
amended by the Debt Collection
Improvement Act of 1996 (DCIA),1
requires the head of each Federal agency
to adjust by regulation, at least once
every four years, the maximum amount
of CMPs provided by law within the
jurisdiction of that agency by the cost of
living adjustment defined in the
FCPIAA, as amended.2 Because the
purposes of the inflation adjustments
include maintaining the deterrent effect
of CMPs and promoting compliance
with the law, the Commission monitors
the impact of inflation on its CMP
maximums and adjusts them as needed
to implement the requirements and
purposes of the FCPIAA.3
Congress this year enacted the CFTC
Reauthorization Act of 2008 at Title XIII
of the Food, Conservation, and Energy
Act of 2008, P.L. 110–246, 122 Stat.
1651 (eff. May 22, 2008)(Farm Bill).
Section 13103(a)–(c) amends sections
6(c), 6b and 6c of the Act, in each case
increasing the maximum civil monetary
penalty that may be imposed ‘‘in any
case of manipulation or attempted
1 The FCPIAA, Pub. L. 101–410 (1990), and the
relevant amendments to the FCPIAA contained in
the DCIA, Public Law 104–134 (1996), are codified
at 28 U.S.C. 2461 note.
2 The DCIA also requires that the range of
minimum and maximum CMPs be adjusted, if
applicable. This is not applicable to the
Commission because, for the relevant CMPs within
the Commission’s jurisdiction, the Act provides
only for maximum amounts that can be assessed for
each violation of the Act or the rules and orders
thereunder; the Act does not set forth any minimum
penalties. Therefore, the remainder of this release
will refer only to CMP maximums.
3 Specifically, the FCPIAA states:
The purpose of [the FCPIAA] is to establish a
mechanism that shall—
(1) Allow for regular adjustment for inflation of
civil monetary penalties;
(2) Maintain the deterrent effect of civil monetary
penalties and promote compliance with the law;
and
(3) Improve the collection by the Federal
Government of civil monetary penalties.
PO 00000
Frm 00028
Fmt 4700
Sfmt 4700
manipulation’’ in violation of section
6(c), 6(d), or 9(a)(2) to ‘‘the greater of
$1,000,000 or triple the monetary gain’’
to the violator.4
II. Relevant Commission CMPs
The inflation adjustment requirement
applies to:
[A]ny penalty, fine or other sanction
that—
(A) Is for a specific monetary amount
as provided by Federal law; or
(ii) Has a maximum amount provided
for by Federal law; and
(B) Is assessed or enforced by an
agency pursuant to Federal law; and
(C) Is assessed or enforced pursuant to
an administrative proceeding or a civil
action in the Federal courts[.] 28 U.S.C.
2661 note. The Act provides for CMPs
that meet the above definition, and are
therefore subject to the inflation
adjustment, in three instances: Sections
6(c), 6b, and 6c of the Act.5
4 Section
13103(a) of the Farm Bill states:
(a) ENFORCEMENT POWERS OF THE
COMMISSION.—Section 6(c) of the Commodity
Exchange Act (7 U.S.C. 9, 15) is amended in clause
(3) of the 10th sentence—
(1) by inserting ‘‘(A)’’ after ‘‘assess such person’’;
and
(2) by inserting after ‘‘each such violation’’ the
following:
‘‘, or (B) in any case of manipulation or attempted
manipulation in violation of this subsection,
subsection (d) of this section, or section 9(a)(2), a
civil penalty of not more than the greater of
$1,000,000 or triple the monetary gain to the person
for each such violation,’’.
Section 13103(b) of the Farm Bill states:
(b) NONENFORCEMENT OF RULES OF
GOVERNMENT OR OTHER VIOLATIONS.—
Section 6b of such Act (7 U.S.C. 13a) is
amended—
(1) In the first sentence, by inserting before the
period at the end the following: ‘‘, or, in any case
of manipulation or attempted manipulation in
violation of section 6(c), 6(d), or 9(a)(2), a civil
penalty of not more than $1,000,000 for each such
violation’’; and
(2) In the second sentence, by inserting before the
period at the end the following: ‘‘, except that if the
failure or refusal to obey or comply with the order
involved any offense under section 9(a)(2), the
registered entity, director, officer, agent, or
employee shall be guilty of a felony and, on
conviction, shall be subject to penalties under
section 9(a)(2)’’.
Section 13103(c) of the Farm Bill states:
(c) ACTION TO ENJOIN OR RESTRAIN
VIOLATIONS.—Section 6c(d) of such Act (7 U.S.C.
13a–1(d)) is amended by striking all that precedes
paragraph (2) and inserting the following:
‘‘(d) CIVIL PENALTIES.—
‘‘(1) IN GENERAL.—In any action brought under
this section, the Commission may seek and the
court shall have jurisdiction to impose, on a proper
showing, on any person found in the action to have
committed any violation—
‘‘(A) a civil penalty in the amount of not more
than the greater of $100,000 or triple the monetary
gain to the person for each violation; or
‘‘(B) in any case of manipulation or attempted
manipulation in violation of section 6(c), 6(d), or
9(a)(2), a civil penalty in the amount of not more
than the greater of $1,000,000 or triple the monetary
gain to the person for each violation.’’
5 7 U.S.C. 9, 13a and 13a–1.
E:\FR\FM\03OCR1.SGM
03OCR1
Agencies
[Federal Register Volume 73, Number 193 (Friday, October 3, 2008)]
[Rules and Regulations]
[Pages 57495-57512]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-23201]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
Bureau of Industry and Security
15 CFR Parts 732, 734, 738, 740, 742, 744, 746, 748, 750, 762, 770,
772, and 774
[Docket No. 080211163-81224-01]
RIN 0694-AE18
Encryption Simplification
AGENCY: Bureau of Industry and Security, Commerce.
ACTION: Interim final rule.
-----------------------------------------------------------------------
SUMMARY: This interim final rule amends the Export Administration
Regulations (EAR) to make the treatment of encryption items more
consistent with the treatment of other items subject to the EAR, as
well as to simplify and clarify regulations pertaining to encryption
items. The restrictions pertaining to technical assistance by U.S.
persons with respect to encryption items are removed, because the
current export and reexport restrictions set forth in the EAR for
technology already include technical assistance. This rule also removes
License Exception KMI as it has become obsolete because of developments
in uses of encryption. In addition, this rule removes notification
requirements for items classified as 5A992, 5D992, and 5E992. This rule
also increases certain parameters under License Exception ENC, which is
intended to reflect advances in technology. This rule adds two new
review and reporting requirement exclusion paragraphs under License
Exception ENC for wireless ``personal area network'' items and for
``ancillary cryptography'' items. This rule also adds Bulgaria, Canada,
Iceland, Romania, and Turkey to the list of countries that receive
favorable treatment under License Exception ENC. Commodities and
software pending mass market review may no longer be exported under
ECCNs 5A992 and 5D992 using No License Required (NLR). However, once
the mass market review has been received by BIS, then such commodities
and software may be exported using License Exception ENC under ECCNs
5A002 and 5D002. This rule will reduce the paperwork burden on the
public by 9% (annual dollar amount savings of approximately $14,000 to
the public and $5,000 to the U.S. Government), because of the removal
of certain notification requirements, addition of countries to the list
of those receiving favorable treatment under License Exception ENC, and
the increase of reporting and review requirement exclusions. The
Departments of Commerce, State and Defense will continue to review
export control, license review policies, and license exceptions for
encryption items in the EAR.
DATES: Effective Date: This rule is effective October 3, 2008.
ADDRESSES: Written comments on this interim final rule may be sent by
e-mail to publiccomments@bis.doc.gov. Include ``Encryption rule'' in
the subject line of the message. Comments may also be submitted by mail
or hand delivery to Sharron Cook, Office of Exporter Services,
Regulatory Policy Division, Bureau of Industry and Security, Department
of Commerce, 14th St. & Pennsylvania Avenue, NW., Room 2705,
Washington, DC 20230, ATTN: Encryption rule; or by fax to (202) 482-
3355.
FOR FURTHER INFORMATION CONTACT: For questions of a general nature
contact Sharron Cook, Office of Exporter Services, Regulatory Policy
Division at (202) 482-2440 or E-Mail: scook@bis.doc.gov.
For questions of a technical nature contact: The Information
Technology Division, Office of National Security and Technology
Transfer Controls at 202-482-0707 or E-Mail: C. Randall Pratt at
cpratt@bis.doc.gov.
SUPPLEMENTARY INFORMATION:
Background
Steps Regarding Scope of the EAR
This rule revises paragraph 732.2(b) of the EAR, which sets forth
instructions on how to determine if your technology or software is
publicly available, by adding mass market encryption software with
symmetric key length exceeding 64-bits classified under ECCN 5D992. The
addition of this phrase harmonizes with the scope of publicly available
encryption software that is considered to be subject to the EAR because
of the criteria set forth in Sec. 734.3(b)(3) of the EAR.
[[Page 57496]]
Items Subject to the EAR
This rule adds a note to paragraph 734.3(a)(4) of the EAR, which
sets forth the items that are subject to the EAR. The note reminds
readers that certain foreign-manufactured items are subject to the EAR
when developed or produced from U.S.-origin encryption items that were
exported pursuant to Sec. 740.17(a) of License Exception ENC.
Clarification of Text
This rule replaces the phrase ``encryption software (including
source code) transferred from the U.S. Munitions List to the Commerce
Control List consistent with E.O. 13026 of November 15, 1996 (61 FR
58767) and pursuant to the Presidential Memorandum of that date'' with
``software controlled for ``EI'' reasons under ECCN 5D002 on the
Commerce Control List'' to clarify which software this sentence is
referring to in the introductory paragraph of Supplement No. 1 to part
734 ``Questions and Answers--Technology and Software subject to the
EAR.''
Determining Whether a License Is Required
This rule clarifies text in Sec. 738.4(a)(1) of the EAR that not
all license requirements set forth under the ``License Requirements''
section of an ECCN refer to the Commerce Country Chart, but in some
cases this section will contain references to a specific section in the
EAR that contain license requirements for that particular ECCN. In such
cases, you could not determine whether a license is required based on
the ECCN and Country Chart alone and section Sec. 738.4(a)(1) of the
EAR would not apply. For example, ``EI'' controls are not included in
the Country Chart; however licensing requirements for ``EI'' controlled
items are included in Sec. 742.15(a) of the EAR. In addition, this
rule removes the reference in Sec. 738.4(a)(2)(ii)(B) to notification
requirements described in paragraph 742.15(b) for items classified
under ECCNs 5A992, 5D992, and 5E992, because this rule removes
notification requirements for these items. This rule also clarifies the
reminder about the review requirements for certain mass market
encryption items under ECCNs 5A992 and 5D992, by removing the reference
to 5E992 and harmonizing the citation reference with the changes in
this rule.
License Exception LVS
This rule revises Sec. 740.3(d)(5) to clarify that not only
exports, but reexports of encryption components or spare parts are
subject to the special restriction in this paragraph. In addition, the
term ``item'' has been replaced by correct terminology.
License Exception KMI
This rule removes Sec. 740.8 of the EAR ``License Exception KMI''
as it has become obsolete because of the developments in the use of
encryption. A consequential revision is also made to Sec. 746.3(c) of
the EAR, where License Exception KMI was listed. Products previously
eligible for License Exception KMI will be accorded equivalent
treatment under license or license exception. As a result of this
change, this rule also removes Supplement No. 4 to part 742 ``Key
Escrow or Key Recovery Products Criteria.''
License Exception TSU
In Sec. 740.13(d) of the EAR, this rule removes the quotation
marks around the term ``mass market'' in the title to paragraph (d),
paragraph (d)(1), footnote 1, paragraph (d)(3)(i) and paragraph
(d)(3)(ii), because in the EAR double quotation marks around a term
indicate that the word is defined in part 772 of the EAR, and mass
market is not a defined term in part 772 of the EAR.
License Exception ENC
This rule revises Sec. 740.17 of the EAR by reformatting
paragraphs, removing redundant text, and clarifying text as needed.
This rule revises the title of this section to indicate that this
license exception also authorizes technology. The introductory
paragraph to Sec. 740.17 of the EAR is condensed to set forth the
scope of Sec. 740.17 of the EAR and include information not found
elsewhere in Sec. 740.17 of the EAR.
While this rule reformats the paragraphs in Sec. 740.17 of the
EAR, it was BIS's goal to minimize revisions to the enumeration of
paragraphs used to classify encryption items in the past, so as to
alleviate confusion about previous classifications provided by BIS that
reference specific paragraphs and to reduce the number of revisions to
industry's current product matrices. That being said, the paragraph
titles have been revised to reflect review request requirements instead
of destinations, end-uses, or types of end-users.
This rule removes paragraphs 740.17(a)(2) and (b)(2)(i) that
exempted commodities and software from review requirements based on a
previous review by the U.S. Government prior to October 19, 2000. These
commodities and software remain exempt from review requirements, and
BIS did not see the necessity of retaining such text in the Export
Administration Regulations.
Paragraph 740.17(a) now describes exports and reexports authorized
by License Exception ENC that do not require prior government review or
post export reporting. The former paragraph (a)(2) ``Items previously
reviewed by the U.S. Government'' is removed by this rule, as this
paragraph is no longer necessary because of the passage of time. Former
paragraph (a)(3) for end-uses other than internal development is moved
to new paragraph (b)(1), because a review request submission is
required for eligibility under this paragraph. Former paragraph (b)(1)
for U.S. subsidiaries is moved to (a)(2), because authorization under
this paragraph does not require prior review. In addition, this rule
amends former paragraph (b)(4)(i)(A) (exempting encryption items not
exceeding certain key lengths from the 30 day waiting period) by moving
it to (b)(1)(ii)(A).
Section 740.17(a)(1)
This rule removes references in paragraph Sec. 740.17(a)(1) to
``technical assistance described in Sec. 744.9 of the EAR,'' because
this rule removes 744.9, see explanation set forth below under ``Sec.
744.9.'' This rule clarifies text in paragraph (a)(1) so that it is
understood that License Exception ENC can be used for not only internal
development, but also internal production of new products.
Section 740.17(a)(2)
Paragraph 740.17(a)(2) is former paragraph (b)(1).
Section 740.17(b)
Paragraph 740.17(b) now sets forth those items authorized under
License Exception ENC that require prior review by the U.S. Government.
This paragraph also sets forth the ``open cryptographic interface''
restriction that applies to all paragraphs in 740.17(b), except for
paragraph Sec. 740.17(b)(1)(i). This introductory paragraph also sets
forth the restriction to export or reexport cryptanalytic items to any
``government end-user.'' There is also a reference in this paragraph to
paragraph (e) ``reporting requirements'' for exports and reexports
under Sec. 740.17(b).
Section 740.17(b)(1)
The new paragraph 740.17(b)(1) of the EAR authorizes exports and
reexports under License Exception ENC that require prior government
review, but allows the export or reexport to take place immediately
upon registration of the review request with BIS.
[[Page 57497]]
Paragraph (b)(1)(i) authorizes the export and reexport of
encryption items, including EI controlled commodities or software
(excluding source code) that are pending review for mass market
treatment (under Sec. 742.15(b) of the EAR), to ``government end-
users'' and non-``government end-users'' located in the countries
listed in Supplement 3 of part 740, as well as to foreign subsidiaries
or offices of firms, organizations and governments headquartered in
countries listed in Supplement 3 of part 740. This rule adds
authorization under License Exception ENC for items pending mass market
review, because it was not logical to temporarily classify commodities
and software under ECCNs 5A992 or 5D992 that were pending mass market
review under paragraph 742.15(b) and authorize export or reexport under
the designation of ``No License Required (NLR)'' when the possible
outcome of the BIS classification of the commodities and software could
be ECCN 5A002 or 5D002.
New paragraph 740.17(b)(1)(ii) authorizes exports and reexports of
specified encryption commodities and software to countries not listed
in Supplement No. 3 to part 740. This rule revises the format of the
parameters in this section from a range to an upper limit in paragraph
(b)(1)(ii)(A), former paragraph (b)(4)(i)(A). In addition, the upper
limit for symmetric algorithms has been raised from ``key lengths not
exceeding 64 bits'' to ``key lengths not exceeding 80 bits.'' After
review has been completed on these commodities or software, BIS will
issue a CCATS that will indicate authorization is under paragraph
(b)(2) or (b)(3) of Sec. 740.17 of the EAR, whichever paragraph is
appropriate.
Paragraph (b)(1)(ii)(B), former paragraph (b)(4)(i)(B), authorizes
exports and reexports of encryption source code that would not be
eligible for export or reexport under License Exception TSU, provided
that a copy of the source code is included in the review request, to
non-``government end-users'' located in any country except a country
listed in Country Group E:1 of Supplement No. 1 to part 740 of the EAR.
After the review has been completed, BIS will issue a CCATS that will
indicate authorization is under paragraph 740.17(b)(2) of the EAR. The
text is clarified by replacing the phrase ``considered publicly
available'' with ``eligible'' in order to avoid confusion about the
scope of encryption source code eligible under this paragraph.
Section 740.17(b)(2)
Paragraph (b)(2) of License Exception ENC authorizes exports and
reexports to non-``government end-users'' located in a country not
listed in Supplement No. 3 to this part or Country Group E:1 that
require a prior review and 30 day waiting period. Pursuant to the new
scope paragraph 740.17(b), this rule expands the scope of (b)(2) to
include ECCN 5B002 to be consistent with commodities and software
eligible for License Exception ENC under paragraphs (b)(1) and (b)(3)
of the EAR. In addition, former paragraph (b)(2)(i) concerning
transactions previously reviewed prior to October 19, 2000 by the U.S.
Government is removed as the passage of time has made this paragraph
unnecessary. Former paragraph (b)(2)(ii) that set forth the review
request requirement is removed, as the review request requirement has
been moved to the introductory text of paragraph (b)(2). Former
paragraph (b)(2)(iii) is replaced by the introductory text of paragraph
(b)(2).
This rule revises new paragraph (b)(2)(i), (Network infrastructure
software and commodities) by adding ``digital packet telephony/media
(voice/video/data) over internet protocol'' to the list of capabilities
described.
Also in this new paragraph (b)(2)(i), the former paragraph
(b)(2)(iii)(A) reference to ``64 bits for symmetric algorithms'' is
changed to ``80 bits for symmetric algorithms'', commensurate with the
key length change in new paragraph (b)(1)(ii)(B). (Note: Regarding key
length with respect to the authorizations and restrictions set forth in
both the current and former versions of License Exception ENC Sec.
740.17(b)(2), only `network infrastructure' commodities and software
(sub-paragraph (i) in this rule) are distinguished by key length. All
encryption commodities and software now enumerated in sub-paragraphs
(ii)-(vi) (former sub-paragraphs (iiii)(B)-(iii)(F)) of License
Exception ENC paragraph (b)(2) are controlled to ``government end-
users'' as described, regardless of key length.)
Former paragraph (b)(2)(iii)(A)(1), new paragraph Sec.
740.17(b)(2)(i)(A) is clarified by this rule to add quotes around the
term ``government end-user(s)'' and now reads as follows, ``Been
designed, modified, adapted or customized for ``government end-
user(s)'' or government end-use (e.g., to secure police, state
security, or emergency response communications).''
This rule further revises former paragraph (b)(2)(iii)(A)(1), new
paragraph (b)(2)(i)(A), which addresses aggregate encrypted WAN, MAN,
VPN or backhaul throughput, by increasing the parameter from 44 Mbps to
90 Mbps.
This rule further revises former paragraph (b)(2)(iii)(A)(2), new
paragraph (b)(2)(i)(B). The Wire (line), cable or fiber optic WAN, MAN
or VPN single-channel input data rate is revised from ``44 Mbps'' to
``154 Mbps.''
These revisions are not expected to result in a decrease in the
number of license applications submitted for exports and reexports of
items described in paragraph (b)(2) to government end-users. Most
network infrastructure items currently being exported to government
end-uses exceed these performance parameters. However, BIS has
determined that the parameters should be adjusted in recognition of
technology advances, and to avoid maintaining controls on legacy
systems.
This rule replaces the ``Maximum number of concurrent encrypted
data tunnels or channels * * *'' parameter in former paragraph
(b)(2)(iii)(A)(3), new paragraph (b)(2)(i)(C) with ``Media (voice/
video/data) encryption or centralized key management supporting more
than 250 concurrent encrypted data channels, or encrypted signaling to
more than 1,000 endpoints, for digital packet telephony/media (voice/
video/data) over internet protocol communications.'' These amendments
update these provisions of License Exception ENC to reflect advances in
encryption technology. Specifically, these amendments address
cryptographic developments in Datagram Transport Layer Security
(DTLS)--Secure Real-Time Transport Protocol (SRTP), and encrypted
communications signaling, for large Voice over Internet Protocol (VoIP)
network infrastructures.
This rule also revises former paragraph (b)(2)(iii)(A)(4)(i), new
paragraph (b)(2)(i)(D)(1), which addresses Air-interface coverage
capabilities, by changing ``maximum data rates'' to ``maximum
transmission data rates'' and changing the parameter from ``5 Mbps'' to
``10 Mbps.'' By limiting this License Exception ENC provision to the
transmit (upstream) data rates and doubling the licensing threshold,
these amendments reflect technology developments for certain satellite
and other long-range wireless devices.
Former paragraph (b)(2)(iii)(B) that addressed encryption source
code that would not be eligible for export or reexport under License
Exception TSU is moved to new paragraph (b)(2)(ii), but also appears in
new paragraph (b)(1)(ii)(B) for review requests that include a copy of
the source code, and
[[Page 57498]]
may be exported or reexported without a waiting period under License
Exception ENC when the review request is registered with BIS.
Former paragraph (b)(2)(iii)(C), new paragraph (b)(2)(iii) is
revised by removing the reference to the open cryptographic interface
restriction, because this restriction is now placed in the introductory
text of paragraph 740.17(b).
Former paragraph (b)(2)(iii)(C)(1), new paragraph (b)(2)(iii)(A) is
amended by revising the phrase ``Been modified or customized for'' to
read ``been designed, modified, adapted or customized for.'' Quotes
have been added around the term ``government end-user(s)'' to indicate
that this term is defined in part 772 of the EAR.
This rule also revises the phrase ``to secure departmental, police,
state security, or emergency response communications'' to read ``to
secure police, state, security, or emergency response communications,
including encryption commodities and software for external Security
Operations Center (SOC)/Network Operations Center (NOC) command and
infrastructure, and digital forensics/computer forensics.'' With this
clarification, this rule provides examples of three such systems that
are controlled for their inherent government end-use: External Security
Operations Center (SOC)/Network Operations Center (NOC) command and
infrastructure; public safety radio (e.g., implementing Terrestrial
Trunked Radio (TETRA) and/or Association of Public-Safety
Communications Officials International (APCO) Project 25 (P25)
standards); and digital forensics/computer forensics.
Note: Regarding the use of encryption by a computer forensics/
digital forensics commodity or software (e.g., for securing the
collection, examination, and/or reporting of data or metadata on an
investigated computer), such digital/computer forensics tools would
not be considered ``cryptanalytic items'' if the only use of
``cryptography'' is for encryption. However, such tools that also
perform ``cryptanalysis'' (e.g., cracking passwords or employing
other cryptanalytic techniques to derive user-encrypted data or
metadata from a computer or network) would be controlled as
``cryptanalytic items.''
Former paragraph (b)(2)(iii)(E), new paragraph (b)(2)(v) is revised
by adding a clarifying phrase after the term ``quantum cryptography''
to read ``as defined in ECCN 5A002 of the Commerce Control List.''
Former paragraph (b)(2)(iii)(F), new paragraph (b)(2)(vi) is
revised by replacing the term ``controlled'' with ``classified under''
to clarify the scope of computers in this paragraph.
Section 740.17(b)(3)
This rule revises paragraph Sec. 740.17(b)(3) of the EAR for
export or reexport of commodities and software not listed in Sec.
740.17(b)(2) of the EAR by both ``government end-users'' and non-
``government end-users'' by removing the redundant former paragraph
(b)(3)(ii)(B) that explained the review procedures and instead
inserting a reference to paragraph Sec. 740.17(d) that sets forth
these procedures. In addition, former paragraph (b)(3)(ii)(A)
concerning transactions previously reviewed by the U.S. Government is
removed as the passage of time has made this paragraph unnecessary.
Former paragraph (b)(3)(i)(A) that set forth the ineligibility of
commodities and software that provide an ``open cryptographic
interface'' is removed because this restriction is set forth in the
introductory text of paragraph 740.17(b). This rule adds text that
clarifies the eligible locations of the end-users, because 740.17(a)
addresses all exports to Supplement No. 3 countries. This rule
relocates the restriction in former paragraph (f)(1) concerning
``cryptanalytic items'' to the introductory text of paragraph (b)(3).
Section 740.17(b)(4)
Former paragraph 740.17(b)(4)(i), setting forth commodities and
software that are eligible for export immediately upon registration of
a review request, is moved to new paragraph (b)(1)(ii). In addition,
previous paragraph 740.17(b)(4)(ii), setting forth exclusions from
review requirements for certain items, is reformatted as paragraph
740.17(b)(4).
Former paragraph (b)(4)(ii)(A) for short-range wireless encryption
is now in new paragraph (b)(4)(i). This rule adds examples to this
paragraph of short-range wireless commodities and software. An
informative sentence is also added to notify the reader that certain
items excluded by this paragraph may also be excluded from review under
(b)(4)(iii) (personal area networks) or (b)(4)(iv) (commodities and
software that provide ``ancillary cryptography'').
Former paragraph (b)(4)(ii)(B) is replaced by the third, fourth,
and fifth sentences of former paragraph (c), which pertains to foreign
products developed with or incorporating U.S.-origin encryption source
code, components, or toolkits.
This rule adds two new review requirement exclusion paragraphs. The
first new paragraph (b)(4)(iii) is for wireless ``personal area
network'' items. This rule adds the term ``personal area network'' and
definition, as well as examples to part 772. The other new exclusion
paragraph (b)(4)(iv) is for ``ancillary cryptography,'' which is also a
newly added term/definition in part 772. The term/definition includes
examples of ``ancillary cryptography.'' The U.S. Government has
determined that it is not necessary to review the encryption
functionality of such items.
Reexports and Transfers
This rule clarifies the second sentence in Sec. 740.17(c) of the
EAR (restricted transfers) by adding quotes around the term
``government end-users'' for consistency. The third and fourth
sentences in this section concerning foreign products developed with or
incorporating U.S.-origin encryption products are moved to new
paragraph (b)(4)(ii), because it was misplaced and redundant to text
already included in another paragraph of License Exception ENC.
Review Request Procedures
This rule removes former paragraph (d)(1) ``Instructions for
requesting review'' because these instructions were redundant and
inconsistent with the instructions for submissions on Form BIS-748P
(Multipurpose Application) found in Part 748 of the EAR. Instructions
for such submissions belong in Part 748 of the EAR.
This rule reformats former paragraph (d)(2) ``Action by BIS''
because this paragraph was entirely too long and needed to be divided
by subject matter. The new subparagraph titles are: (i) Notification;
(ii) After 30 days; and (iii) Hold Without Action (HWA).
This rule moves former paragraph (d)(3), ``key length increases,''
to the reporting requirement section under new paragraph (e)(2),
because this requirement is in actuality a reporting requirement and
not a review requirement. This report is required for commodities and
software that, after having been reviewed and authorized for License
Exception ENC by BIS, are modified only to upgrade the key length used
for confidentiality or key exchange algorithms. This rule also makes
the new key length a required element of the report.
Reporting Requirements
The reporting requirements for License Exception ENC are now split
into two sections: Semiannual reporting requirement and reporting key
length increases. This rule clarifies that the Commodity Classification
Automated Tracking System (CCATS) number is a required element of the
report. This rule removes former paragraph (e)(2)(iv),
[[Page 57499]]
which required a report for exports of ECCN 5E002 items to be used for
technical assistance that are not released by 744.9, because this rule
removed section 744.9 of the EAR. This rule also clarifies the purpose
and scope of paragraph (e)(3), regarding reportable information on
foreign manufacturers and products that use encryption items in
countries not listed in Supplement No. 3 to part 740.
Reporting Exclusions
This rule revises the exclusion set forth in former paragraph
(e)(4)(i), new paragraph (e)(1)(iii)(A), by removing the reference to
paragraph (b)(1), because (b)(1) did not require prior review or post
export reporting, therefore this rule moved (b)(1) to new paragraph
(a)(2).
In new paragraph (e)(1)(iii)(F), this rule expands the exclusion
that was in former paragraph (e)(4)(vi) for components limited to
providing short-range wireless encryption functions, by making the
reporting exclusion apply to all of the items in the new paragraph
(b)(4), which are those items that are excluded from review
requirements (certain commodities and software that provide short-range
wireless; foreign products developed with or incorporating U.S.-origin
encryption source code (that have not entered United States for
subsequent export), components, or toolkits; wireless ``personal area
network'' items; and ``ancillary cryptography'' commodities and
software).
Lastly, in new paragraph (e)(1)(iii)(J), this rule adds a new
provision to exclude from reporting requirements exports of items that
have been determined, on a case-by-case basis do not require the burden
of semi-annual reporting. Certain exports of items that do not qualify
for mass market treatment, but are authorized under License Exception
ENC are not of interest for national security reasons, therefore do not
warrant reporting requirements. Exporters will be notified of this
exclusion on issued Commodity Classification Automated Tracking System
(CCATS) documents.
Restrictions
Former paragraph Sec. 740.17(f) ``Restrictions'' is removed,
because the restrictions that were in this paragraph are integrated
into the introductory paragraph to Sec. 740.17 or specific paragraphs
for which they apply.
Supplement No. 3 to Part 740
This rule revises the title of Supplement No. 3 to part 740 to read
``License Exception ENC Favorable Treatment Countries,'' because the
former title of ``Countries Eligible for the Provisions of Sec.
740.17(a)'' is no longer correct, as these countries are now eligible
for provisions of Sec. 740.17(b)(1) of the EAR. This rule adds
Bulgaria, Canada, Iceland, Romania, and Turkey to the list of countries
in Supplement No. 3 to part 740 of the EAR. Bulgaria and Romania joined
the European Union by accession on January 1, 2007. The addition of
Canada is simply for clarity, as licenses are not required to Canada
for Encryption Items (pursuant to Sec. 742.15(a)(1)) and License
Exception ENC has been available for subsidiaries and offices of the
Canadian government and private-sector end-users (along with the
previous Supplement No. 3 to part 740 list of countries). Turkey and
Iceland are added because they are members of the North Atlantic Treaty
Organization (NATO). This will increase eligibility under License
Exception ENC under new paragraphs Sec. 740.17(a)(1) and (b)(1) of the
EAR, which will decrease the necessity for submitting license
applications, review requests, and semiannual reports.
This revision will reduce the number of license applications
submitted to BIS for the export or reexport of encryption products
classified under ECCNs 5A002 and 5D002 to Bulgaria, Iceland, Romania,
and Turkey by 95 percent (approximately $37 million in exports and
reexports for CY 2007). This revision will not change the amount of
license applications received by BIS for the export or reexport of
encryption products to Canada, because Canada, while not included in
the list of countries that received favorable treatment under License
Exception ENC, already received such benefits.
Section 742.15 ``Encryption Items''
Paragraph 742.15(a) is revised by more specifically describing what
is EI controlled under ECCNs 5A002, 5D002, and 5E002. This revision
harmonizes with changes this rule makes to the license requirements
paragraphs of these ECCNs. In addition, a sentence is added that
advises exporters to review License Exception ENC prior to submitting a
license to BIS. Also, the phrase ``on a computer system'' is removed
from the introductory text of Sec. 742.15 in order to be more
consistent with the first Note in the License Requirement section of
ECCN 5D002.
Section 742.15(a)(2) License Requirements and Review Policy for ECCNS
5A992, 5D992, and 5E992
This rule removes former paragraph 742.15(a)(2), which explained
license requirements and review policy for items classified under ECCNS
5A992, 5D992, and 5E992, because the purpose of Sec. 742.15 is to set
forth the license requirements and review policies for items controlled
for encryption item (EI) reasons and these items are controlled for
anti-terrorism (AT) reasons only. The license requirements and review
policy for these items are found under appropriate anti-terrorism
sections of part 742.
This rule removes the second sentence of 742.15(a)(2), because the
indefinite language did not add to the transparency of licensing
policy. The sentence stated, ``Exports and reexports of encryption
items to governments, or to Internet and telecommunications service
providers for the provision of services specific to governments, may be
favorably considered.'' This rule removes the extraneous phrase
``including those which authorize exports and reexports of encryption
technology to strategic partners (as defined in Sec. 772.1 of the EAR)
of U.S. companies.'' To be more transparent, this rule adds the phrase
``or pre-shipment notification'' to explain that ELAs may require pre-
shipment notification. This rule adds a note to paragraph (a)(2) to
remind exporters that once mass market encryption commodities and
software have been reviewed by BIS and the ENC Encryption Request
Coordinator (Ft. Meade, MD) and released from ``EI'' and ``NS''
controls pursuant to Sec. 742.15(b) of the EAR, they are classified
under ECCN 5A992 and 5D992 respectively, and are thereafter outside the
scope of this section.
This rule removes the notification and review requirements for
items classified under ECCNs 5A992, 5D992, and 5E992, which were set
forth in former paragraphs Sec. 742.15(b) introductory paragraph and
Sec. 742.15 (b)(1) of the EAR.
This rule adds a reference to the ENC Encryption Request
Coordinator (FT. Meade, MD) with regard to the requirement for review
of mass market encryption commodities and software.
Specific instructions for how to fill out form 748P (multipurpose
application) for submission of a review request has been removed,
because these instructions were redundant and inconsistent with the
instructions found in paragraph (r) of Supplement No. 2 to part 748 of
the EAR. Instead, a reference to this paragraph (r) is added to new
paragraph 742.15(b)(1) ``Procedures for requesting review.''
This rule removes former paragraph (b)(2)(iii) that provided
authorization under the designation of ``no license required (NLR)''
for exports and reexports of encryption commodities
[[Page 57500]]
and software pending mass market treatment review by BIS to government
and non-government end-users located in countries listed in Supp. No. 3
to part 740 of the EAR or for internal use of foreign subsidiaries or
offices of firms, organizations and governments headquartered in Canada
or in countries listed in Supp. No. 3 to part 740 of the EAR. This
authorization was based on a temporary classification under ECCNs 5A992
and 5D992, which is inconsistent with the way other items are
classified in the EAR, therefore this provision is removed. Instead,
encryption commodities and software will remain under the
classification of ECCN 5A002 and 5D002 until 30 days have passed since
registration of the submitted review request or BIS issues a
classification under ECCN 5A992 or 5D992. However, this rule creates a
new authorization under License Exception ENC for such commodities and
software pending a decision by BIS concerning mass market treatment
under new paragraph 740.17(b)(1) of the EAR. This rule adds explanatory
text about this new procedure in (b)(2) ``Action by BIS.''
Section 742.15(b)(3) Exclusions for Notification and Review
Requirements
This rule removes the former exclusion paragraphs, because it is no
longer applicable and is replaced by new exclusion paragraphs from mass
market review requirements under Sec. 742.15(b). There are three new
exclusions: Certain short range wireless commodities and software,
wireless ``personal area network'' items, and ``ancillary
cryptography'' commodities and software.
Section 742.15(b)(4) Dormant Encryption and Enabling Software and
Commodities
This rule condenses this paragraph to remove text that pertained to
ECCNs 5A992 and 5D992.
Section 742.15(b)(5) Examples of Mass Market Software
The phrase ``designed for, bundled with, or pre-loaded on single
CPU computes'' is revised to read ``designed for computers classified
as ECCN 4A994 or EAR99.'' This phrase was changed to remove outdated
and confusing text related to computers. This rule also removes the
last phrase ``and commodities and software exported via free or
anonymous downloads.'' This phrase was removed because it confused the
public, in that it led people to believe that if they incorporated free
encryption software or open source encryption into their products that
it was not subject to the EAR, which is not the case.
Supplement No. 6 to Part 742 ``Guidelines for Submitting Review
Requests for Encryption Items''
The option to fax support documents is removed, because that method
has been replaced by either e-mailing the document in PDF or sending
the document by mail. A requirement to obtain express mail
certification of the mailing of support documentation is added for
those that intend to rely on the 30 day registration provisions of the
EAR.
Paragraph (a) is divided into 5 subparagraphs that clarify existing
review requirements and procedures. Former paragraph (a) is now new
subparagraph (a)(1), and is revised to add a requirement to include a
brief non-technical description of the type of product being submitted,
e.g., routers, disk drives, cell phones, chips, etc. Part of the
introductory paragraph to Supp. No. 6 that addressed prior reviews is
moved to a new subparagraph (a)(2), and is revised to add a
requirement, for products with minor changes in encryption
functionality, to include a cover sheet with complete reference to the
previous review (CCATS, Application Control Number (ACN),
ECCN, authorization paragraph) along with a clear description of the
changes. New subparagraph (a)(3) requires a description of how
encryption is used in the product and the categories of encrypted data
(i.e., stored data, communications, management data, internal data,
etc.). New subparagraph (a)(4) requires, for mass market reviews, a
specific description of who will be receiving the product and how the
product is being marketed, as well as how this method of marketing and
other relevant information (e.g., cost of product and volume of sales)
is described by the Cryptography Note (Note 3 to Category 5, Part 2).
New subparagraph (a)(5) clarifies information about any encryption
source code being used.
Subparagraph (c)(1) is amended by adding the phrase ``including
relevant parameters, inputs and settings'' to the end of the first
sentence. Subparagraph (c)(6) is amended by adding more examples of
communication and cryptographic functions, as well as replacing the
term ``encryption protocols'' with a more accurate term ``cryptographic
protocols and methods.'' An additional requirement is added to (c)(6)
to describe how the protocols that are supported are used. The text of
(c)(11) is revised to more clearly describe the information that would
assist BIS.
The introductory text for paragraphs (d) and (e) is clarified.
Section 744.9 ``Restrictions on Technical Assistance by U.S. Persons
With Respect to Encryption Items''
This rule removes Sec. 744.9 of the EAR that required
authorization from BIS for U.S. persons to provide technical assistance
(including training) to foreign persons with the intent to aid a
foreign person in the development or manufacture outside the United
States of encryption commodities or software that, if of U.S.-origin,
would be ``EI'' controlled under ECCNs 5A002 or 5D002. Section 744.9
was added to the EAR in 1996 when jurisdiction over dual-use encryption
items was transferred from the Department of State to the Department of
Commerce. Technical assistance is treated differently under the
International Trade in Arms Regulations (ITAR) than it is in EAR.
Technical assistance is considered a form of ``technology'' under the
definition of ``technology'' in section 772.1 of the EAR. The EAR
states that technical assistance ``may take forms such as instruction,
skills training, working knowledge, consulting services'' and that it
``may involve transfer of `technical data.' '' When a person performs
technical assistance, which draws upon ``development,'' ``production,''
or ``use'' ``technology'' obtained in the United States or that is of
U.S.-origin, then a release of ``technology'' takes place, which is
considered an export or reexport and may require authorization under
the EAR. BIS has observed that there is rarely an application for a
license submitted under the requirements of section 744.9; however,
requests for authorization under section 744.9 are often included in
license applications for export of ECCN 5E002 Technology. This has led
BIS to conclude that people are submitting license applications for
technology exports and reexports when involved in technical assistance.
Therefore, to harmonize the understanding of technical assistance as it
is understood in the EAR with the practical application of it by the
public, BIS is removing section 744.9. This removal does not remove any
license requirements for controlled encryption technology released
while performing technical assistance. This amendment does not affect
the scope of the note in former 744.9 in that the mere teaching or
discussion of information about cryptography, including, for example,
in an academic setting or in the work of groups or bodies engaged in
standards
[[Page 57501]]
development, by itself would not establish a license requirement under
ECCN 5E002, even where foreign persons are present. Section 744.9 is
replaced by a ``license requirement'' note in ECCN 5E002 on the
Commerce Control List.
Supplement No. 2 to Part 748 ``Unique Application and Submission
Requirements''
This rule adds a sentence instructing applicants to place an ``X''
in the box marked ``classification request'' in Block 5 (Type of
Application) of Form BIS-748P or select ``Commodity Classification'' if
filing electronically, because neither the electronic nor paper forms
provide a separate Block to check for submission of encryption review
requests.
Section 750.3 Review of License Application by BIS and Other Government
Agencies and Departments
This rule makes an editorial correction by removing paragraph
(b)(2)(iv) and redesignating (b)(2)(v) as (b)(2)(iv). This paragraph
referred to the Arms Control and Disarmament Agency (ACDA), which no
longer exists. However, ACDA's personnel and functions were absorbed by
the Department of State in 1999. Therefore, this rule revises paragraph
(b)(2)(iii) by adding national security and nuclear nonproliferation to
the description of State Department's concerns. Missile technology is
also added as a State Department concern because the State Department
chairs the Missile Technology Export control interagency working group.
Section 750.7 Issuance of Licenses
This rule removes paragraph (c)(2), which explained how to amend
your Encryption License Agreement (ELA) by letter. BIS has observed a
trend that industry has been submitting license applications for
replacement or new ELAs when they want a change. In addition, it is
more efficient for applicants to apply and track applications than
letters, because of BIS' electronic application system. It is also
easier for BIS to process and track submissions of applications than
letters for the same reason. Therefore, this provision is removed.
This rule removes the third and fourth sentences in the
introductory text of paragraph (d) that pertain to the responsibilities
of a licensee with regard to ELAs. These sentences are removed, because
a licensee may not transfer its license responsibilities.
Section 762.2 Records To Be Retained
This rule removes paragraph (b)(8), which referred to records
related to key escrow encryption items under License Exception KMI.
This rule removes License Exception KMI and Supplement No. 4 to part
742 ``Key Escrow or Key Recovery Products Criteria,'' therefore this
recordkeeping requirement no longer exists.
Section 770.2 Item Interpretations
This rule moves paragraph (n) ``Interpretation 14: Encryption
commodity and software reviews,'' to a new note under paragraphs
740.17(b) and 742.15(b), so that exporters do not miss this important
information about when to submit a new product review when a change has
occurred in the encryption product. The text of this paragraph is also
revised for clarity. The note explains that a new product review is not
required when a change involves: the subsequent bundling, patches,
upgrades or releases of a product; name changes; or changes to a
previously reviewed encryption product limited to updates in an
encryption software component (e.g., version updates of an encryption
library that is called by a product to provide encryption functionality
where the encryption library has either already been reviewed or did
not require prior review.)
Section 772.1 Definition of terms as used in the Export Administration
Regulations (EAR)
This rule removes the definition of ``strategic partner'' as this
term is not used in the control or licensing of encryption items. This
rule also adds definitions for two new terms ``ancillary cryptography''
and ``personal area network,'' which are associated with new review and
reporting exclusions in License Exception ENC.
Commerce Control List--Supplement No. 1 to Part 774
This rule revises the Nota Bene to the Cryptography Note at the
beginning of Category 5 Part 2 in order to harmonize it with the
revisions in this rule.
This rule clarifies what is controlled for ``EI'' reasons in ECCNs
5A002, 5D002, and 5E002 by replacing the text ``EI applies to
encryption items transferred from the U.S. Munitions List to the
Commerce Control List consistent with E.O.13026 of November 15, 1996
(61 FR 58767) and pursuant to the Presidential Memorandum of that date.
Refer to Sec. 742.15 of this subchapter.'' with appropriate text that
refers to specific paragraphs within those ECCNs for which EI applies.
For ECCN 5A002, the new EI control reads ``EI applies to 5A002.a.1,
a.2, a.5, a.6 and a.9. Refer to Sec. 742.15 of the EAR.'' For ECCN
5D002, the new EI control reads, ``EI applies to ``software'' in
5D002.a or c.1 for equipment controlled for EI reasons in ECCN 5A002.
Refer to Sec. 742.15 of the EAR.'' For ECCN 5E002, the new EI control
reads, ``EI applies to ``technology'' for the ``development,''
``production,'' or ``use'' of commodities or ``software'' controlled
for EI reasons in ECCNs 5A002 or 5D002. Refer to Sec. 742.15 of the
EAR.'' In addition, License Exception ENC is added to the License
Exception section of each of these ECCNs, because it is the principal
license exception for EI controlled items.
ECCN 5A002
This rule removes the license requirement notes section from ECCN
5A002, because there is no Wassenaar reporting requirement for this
ECCN. In addition, this rule makes editorial corrections to the Related
Controls paragraph by replacing the use of the term ``items'' with
commodities when referring to ECCN 5A002 and 5A992. Moreover, this rule
clarifies that if commodities are listed in paragraphs (a) through (f)
in the Note to 5A002, and therefore the commodities are classified
under ECCN 5A992, then the related software and technology are
classified under ECCNs 5D992 and 5E992, respectively. This rule also
revises Related Controls note 2 to be consistent with the mass market
review procedures of Sec. 742.15 of the EAR. This note now reads ``2)
After a review and classification by BIS, mass market encryption
commodities that meet eligibility requirements are released from ``EI''
and ``NS'' controls. These commodities are classified under ECCN
5A992.c. See Sec. 742.15(b) of the EAR.''
ECCN 5A992
This rule revises the anti-terrorism (AT) controls for ECCN 5A992,
by placing the entire entry under AT Column 1 controls, for ease of
understanding and compliance. This rule adds a new paragraph 5A992.c.
This new paragraph clarifies that a mass market commodity is classified
under ECCN 5A992 upon completion of Government review of a commodity in
accordance with paragraph 742.15(b) of the EAR, when that review
determines that the commodity meets the requirements for mass market
treatment. Encryption items are no longer presumed eligible for mass
market treatment while pending Government review.
[[Page 57502]]
ECCN 5D002
This rule removes the third note in the License Requirement
section, because the information in it does not harmonize with the
revision made in this rule. In addition, this rule adds another note to
the Related Controls paragraph to inform the public about the review
and classification of mass market software.
ECCN 5D992
This rule revises the anti-terrorism (AT) controls for ECCN 5D992,
by placing the entire entry under AT Column 1 controls, for ease of
understanding and compliance. Paragraphs 5D992.a.1 and a.2, and
5D992.b.1 and b.2, are combined as 5D992.a and 5D992.b, respectively,
in order to simplify the entry. This rule also removes paragraph
5D992.c (``software'' designed or modified to protect against malicious
computer damage, e.g., viruses) from ECCN 5D992, while adding a note in
the Related Control stating, ``This entry does not control ``software''
designed or modified to protect against malicious computer damage,
e.g., viruses, where the use of ``cryptography'' is limited to
authentication, digital signature and/or the decryption of data or
files.'' Certain software for protection against malicious damage that
meet the criteria of the Related Control note are thus now decontrolled
and classified as EAR99, unless the software performs functions that
are controlled under other ECCNs (whether under Category 5, part 2 or
elsewhere in the Commerce Control List). Such software remains subject
to the EAR and may be classified under ECCN 5D002 or 5D992 if it
performs cryptographic functionality controlled by these Category 5,
part 2 ECCNs (e.g., data or file encryption, including of user or
system data under Secure Socket Layer (SSL) encryption, even if the
cryptographic functionality is not directly user accessible.) Examples
of software decontrolled by this change include certain firewall and
other software for the screening of digital content and the detection
and removal of viruses, spyware and unsolicited commercial e-mail.
This rule also adds a new paragraph 5D992.c. This paragraph
clarifies that mass market software is classified under ECCN 5D992.c
upon completion of Government review of the software in accord with
Sec. 742.15 of the EAR when that review determines that the software
meets the requirements for mass market treatment. Encryption software
is no longer presumed eligible for mass market treatment.
ECCN 5E002
This rule adds a License Requirement Note to remind people to
consider the possibility of the release of technology when performing
technical assistance; the note reads, ``When a person performs or
provides technical assistance that incorporates, or otherwise draws
upon, ``technology'' that was either obtained in the United States or
is of U.S.-origin, then a release of the ``technology'' takes place.
Such technical assistance, when rendered with the intent to aid in the
``development'' or ``production'' of encryption commodities or software
that would be controlled for ``EI'' reasons under ECCN 5A002 or 5D002,
may require authorization under the EAR even if the underlying
encryption algorithm to be implemented is from the public domain or is
not of U.S. origin.'' In addition, in order to harmonize with the
revisions in this rule and for consistency, this rule adds text to the
Related Controls paragraph of the List of Items Controlled section to
read ``This entry does not control ``technology'' ``required'' for the
``use'' of equipment excluded from control under the Related Controls
paragraph or the Technical Notes in ECCN 5A002 or ``technology''
related to equipment excluded from control under ECCN 5A002. This
``technology'' is classified as ECCN 5E992.''
ECCN 5E992
This rule revises the anti-terrorism (AT) controls for ECCN 5E992,
by placing the entire entry under AT Column 1 controls, for ease of
understanding and compliance. This rule revises the references in
5E992.a and .b to conform to revisions included in this rule.
Although the Export Administration Act expired on August 20, 2001,
the President, through Executive Order 13222 of August 17, 2001, 3 CFR,
2001 Comp., p. 783 (2002), as extended by the Notice of July 23, 2008,
73 FR 43603 (July 25, 2008), has continued the Export Administration
Regulations in effect under the International Emergency Economic Powers
Act.
Rulemaking Requirements
1. This interim final rule has been determined to be not
significant for purposes of Executive Order 12866.
2. Notwithstanding any other provision of law, no person is
required to respond to, nor shall any person be subject to a penalty
for failure to comply with a collection of information subject to the
requirements of the Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et.
seq.) (PRA), unless that collection of information displays a currently
valid Office of Management and Budget (OMB) Control Number. This rule
involves two collections of information subject to the PRA. One of the
collections has been approved by OMB under control number 0694-0088,
``Multi Purpose Application,'' and carries a burden hour estimate of 58
minutes for a manual or electronic submission. The other collection has
been approved by OMB under control number 0694-0104, ``Commercial
Encryption Items Under the Jurisdiction of the Department of
Commerce,'' and carries a burden hour estimate of 7 hours for a manual
or electronic submission. Send comments regarding these burden
estimates or any other aspect of these collections of information,
including suggestions for reducing the burden, to Jasmeet Seehra, OMB
Desk Officer, by e-mail at jseehra@omb.eop.gov or by fax to (202) 395-
7285; and to the Office of Administration, Bureau of Industry and
Security, Department of Commerce, 14th and Pennsylvania Avenue, NW.,
Room 6622, Washington, DC 20230.
3. This rule does not contain policies with Federalism implications
as that term is defined under Executive Order 13132.
4. The provisions of the Administrative Procedure Act (5 U.S.C.
553) requiring notice of proposed rulemaking, the opportunity for
public participation, and a delay in effective date, are inapplicable
because this regulation involves a military and foreign affairs
function of the United States (5 U.S.C. 553(a)(1)). Further, no other
law requires that a notice of proposed rulemaking and an opportunity
for public comment be given for this interim final rule. Because a
notice of proposed rulemaking and an opportunity for public comment are
not required to be given for this rule under the Administrative
Procedure Act or by any other law, the analytical requirements of the
Regulatory Flexibility Act (5 U.S.C. 601 et. seq.) are not applicable.
Therefore, this regulation is issued in interim final form. Although
there is no formal comment period, public comments on this regulation
are welcome on a continuing basis. Comments should be submitted to
Sharron Cook, Office of Exporter Services, Bureau of Industry and
Security, Department of Commerce, 14th and Pennsylvania Ave., NW., Room
2705, Washington, DC 20230.
[[Page 57503]]
List of Subjects
15 CFR Parts 732, 740, 748 and 750
Administrative practice and procedure, Exports, Reporting and
recordkeeping requirements.
15 CFR Parts 738, 770 and 772
Exports.
15 CFR Part 744
Exports, Reporting and recordkeeping requirements, Terrorism.
15 CFR Part 742
Exports, Terrorism.
15 CFR Part 746
Exports, Reporting and recordkeeping requirements.
15 CFR Part 762
Administrative practice and procedure, Business and industry,
Confidential business information, Exports, Reporting and recordkeeping
requirements.
15 CFR Part 774
Exports, Reporting and recordkeeping requirements.
0
Accordingly, parts 732, 734, 738, 740, 742, 744, 746, 748, 750, 762,
770, 772 and 774 of the Export Administration Regulations (15 CFR parts
730-774) are amended as follows:
PART 732--[AMENDED]
0
1. The authority citation for part 732 is revised to read as follows:
Authority: 50 U.S.C. app. 2401 et. seq.; 50 U.S.C. 1701 et.
seq.; E.O. 13026, 61 FR 58767, 3 CFR, 1996 Comp., p. 228; E.O.
13222, 66 FR 44025, 3 CFR, 2001 Comp., p. 783; Notice of July 23,
2008, 73 FR 43603 (July 25, 2008).
0
2. Section 732.2 is amended by revising paragraph (b) to read as
follows:
Sec. 732.2 Steps Regarding Scope of the EAR
* * * * *
(b) Step 2: Publicly available technology and software. This step
is relevant for both exports and reexports. Determine if your
technology or software is publicly available as defined and explained
at part 734 of the EAR. Supplement No. 1 to part 734 of the EAR
contains several practical examples describing publicly available
technology and software that are outside the scope of the EAR. The
examples are illustrative, not comprehensive. Note that encryption
software controlled for EI reasons under ECCN 5D002 on the Commerce
Control List (refer to Supplement No.1 to Part 774 of the EAR) and mass
market encryption software with symmetric key length exceeding 64-bits
classified under ECCN 5D992 shall be subject to the EAR even if
publicly available. Accordingly, the provisions of the EAR concerning
the public availability of items are not applicable to encryption items
controlled for ``EI'' reasons under ECCN 5D002 and mass market
encryption software with symmetric key length exceeding 64-bits
classified under ECCN 5D992.
* * * * *
PART 734--[AMENDED]
0
3. The authority citation for part 734 is revised to read as follows:
Authority: 50 U.S.C. app. 2401 et. seq.; 50 U.S.C. 1701 et.
seq.; E.O. 12938, 59 FR 59099, 3 CFR, 1994 Comp., p. 950; E.O.
13020, 61 FR 54079, 3 CFR, 1996 Comp. p. 219; E.O. 13026, 61 FR
58767, 3 CFR, 1996 Comp., p. 228; E.O. 13222, 66 FR 44025, 3 CFR,
2001 Comp., p. 783; Notice of July 23, 2008, 73 FR 43603 (July 25,
2008); Notice of November 8, 2007, 72 FR 63963 (November 13, 2007).
0
4. Section 734.3 is amended by adding a note to paragraph (a)(4) to
read as follows:
Sec. 734.3 Items Subject to the EAR
(a) * * *
(4) * * *
Note to paragraph (a)(4): Certain foreign-manufactured items
developed or produced from U.S.-origin encryption items exported
pursuant to License Exception ENC are subject to the EAR. See
sections 740.17(a) and 740.17(b)(4)(ii) of the EAR.
0
5. Supplement No. 1 to part 734 is amended by revising the introductory
paragraph to read as follows:
Supplement No. 1 to Part 734--Questions and Answers--Technology and
Software Subject to the EAR
This Supplement No. 1 contains explanatory questions and answers
relating to technology and software that is subject to the EAR. It is
intended to give the public guidance in understanding how BIS
interprets this part, but is only illustrative, not comprehensive. In
addition, facts or circumstances that differ in any material way from
those set forth in the questions or answers will be considered under
the applicable provisions of the EAR. Exporters should note that the
provisions of this supplement do not apply to encryption software
classified under ECCN 5D002 for ``EI'' reasons on the Commerce Control
List or to mass market encryption software with symmetric key length
exceeding 64-bits classified under ECCN 5D992. This Supplement is
divided into nine sections according to topic as follows:
* * * * *
PART 738--[AMENDED]
0
6. The authority citation for part 738 continues to read as follows:
Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.;
10 U.S.C. 7420; 10 U.S.C. 7430(e); 22 U.S.C. 287c; 22 U.S.C. 3201 et
seq.; 22 U.S.C. 6004; 30 U.S.C. 185(s), 185(u); 42 U.S.C. 2139a; 42
U.S.C. 6212; 43 U.S.C. 1354; 46 U.S.C. app. 466c; 50 U.S.C. app. 5;
22 U.S.C. 7201 et. seq.; 22 U.S.C. 7210; E.O. 13026, 61 FR 58767, 3
CFR, 1996 Comp., p. 228; E.O. 13222, 66 FR 44025, 3 CFR, 2001 Comp.,
p. 783; Notice of July 23, 2008, 73 FR 43603 (July 25, 2008).
0
7. Section 738.4 is amended by revising paragraphs (a)(1) and
(a)(2)(ii)(B) to read as follows:
Sec. 738.4 Determining Whether a License Is Required
(a) * * *
(1) Overview. Once you have determined that your item is classified
under a specific ECCN, you must use information contained in the
``License Requirements'' section of that ECCN in combination with the
Country Chart to decide whether a license is required. Note that not
all license requirements set forth under the ``License Requirements''
section of an ECCN refer you to the Commerce Country Chart, but in some
cases this section will contain references to a specific section in the
EAR for license requirements. In such cases, this section would not
apply.
(2) * * *
(ii) * * *
(B) If no, a license is not required based on the particular Reason
for Control and destination. Provided that General Prohibitions Four
through Ten do not apply to your proposed transaction and that any
applicable review requirements described in Sec. 742.15(b) of the EAR
have been met for certain mass market encryption items controlled under
ECCNs 5A992 or 5D992, you may effect your shipment using the symbol
``NLR.'' Proceed to parts 758 and 762 of the EAR for information on
export clearance procedures and recordkeeping requirements. Note that
although you may stop after determining a license is required based on
the first Reason for Control, it is best to work through each
applicable Reason for Control. A full analysis of every possible
licensing requirement based on each applicable Reason for Control is
required to determine the most advantageous License Exception available
for your particular transaction and, if a license is
[[Page 57504]]
required, ascertain the scope of review conducted by BIS on your
license application.
* * * * *
PART 740--[AMENDED]
0
8. The authority citation for part 740 continues to read as follows:
Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.;
22 U.S.C. 7201 et seq.; E.O. 13026, 61 FR 58767, 3 CFR, 1996 Comp.,
p. 228; E.O. 13222, 66 FR 44025, 3 CFR, 2001 Comp., p. 783; Notice
of July 23, 2008, 73 FR 43603 (July 25, 2008).
0
9. Section 740.3 is amended by revising paragraph (d)(5) to read as
follows:
Sec. 740.3 Shipments of Limited Value (LVS)
* * * * *
(d) * * *
(5) Exports and reexports of encryption components or spare parts.
For components or spare parts controlled for ``EI'' reasons under ECCN
5A002, exports and reexports under this License Exception must be
destined to support a commodity previously authorized for export or
reexport.
* * * * *
Sec. 740.8 [Removed]
0
10. Remove and reserve Sec. 740.8.
Sec. 740.13 [Amended]
0
11. Section 740.13 is amended by removing the quotation marks around
the term ``mass market'' in paragraph (d) heading, paragraph (d)(1),
footnote 1, paragraph (d)(3)(i) and paragraph (d)(3)(ii).
0
12. Section 740.17 is revised to read as follows:
Sec. 740.17 Encryption Commodities, Software and Technology (ENC).
License Exception ENC authorizes export and reexport of software
and commodities and components therefor that are classified under ECCNs
5A002.a.1, a.2, a.5, a.6 or a.9, 5B002, 5D002, and technology that is
classified under ECCN 5E002. This License Exception ENC does not
authorize export or reexport to, or provision of any service in any
country listed in Country Group E:1 in Supplement No. 1 to part 740 of
the EAR, or release of source code or technology to any national of a
country listed in Country Group E:1. Reexports and transfers under
License Exception ENC are subject to the criteria set forth in
paragraph (c) of this section. Paragraph (d) of this section sets forth
information about review requests required by this section. Paragraph
(e) sets forth reporting required by this section.
(a) No prior review or post export reporting required--(1) Internal
``development'' or ``production'' of new products. License Exception
ENC authorizes exports and reexports of items described in paragraph
(a)(1)(i) of this section, to end-users described in paragraph
(a)(1)(ii) of this section, for the intended end-use described in
paragraph (a)(1)(iii) of this section without prior review by the U.S.
Government.
(i) Eligible items. Eligible items are those classified under ECCNs
5A002.a.1, .a.2, .a.5, .a.6, or .a.9, 5B002, 5D002, or 5E002.
(ii) Eligible end-users. Eligible end-users are ``private sector
end-users'' wherever located, except to countries listed in Country
Group E:1 (see Supplement No. 1 to part 740 of the EAR) that are
headquartered in a country listed in Supplement No. 3 of this part.
Note to paragraph (a)(1)(ii): A ``private sector end-user'' is: