International Traffic in Arms Regulations: Creation of Definition of Activities That Are Not Exports, Reexports, Retransfers, or Temporary Imports; Creation of Definition of Access Information; Revisions to Definitions of Export, Reexport, Retransfer, Temporary Import, and Release, 70887-70893 [2019-27438]
Download as PDF
Federal Register / Vol. 84, No. 247 / Thursday, December 26, 2019 / Rules and Regulations
attorney fees, market value appraisals,
and foreclosure costs. Annual fees
advanced by the lender to the Agency
are ineligible for reimbursement when
calculating the loss claim payment.
■ 11. Amend § 3555.353 by revising
paragraphs (a) introductory text and (b)
to read as follows:
§ 3555.353
Net recovery value.
*
*
*
*
*
(a) For a property that has been sold.
When a loss claim is filed on a property
that was sold to a third party at the
foreclosure sale or through an approved
pre-foreclosure sale, net recovery value
is calculated as follows:
*
*
*
*
*
(b) For a property that has been
acquired. When a loss claim is filed on
a property acquired by the lender
through a foreclosure sale or a deed-inlieu of foreclosure, the net recovery
value is based on an estimated sales
price calculated using a market value
appraisal along with holding and
disposition costs calculated using the
acquisition and management factor (also
known as the VA Net Value Factor)
published by the VA, and other factors
as determined by the Agency. The
lender must submit a loss claim
package, including a market value
appraisal, within 60 days of the
foreclosure sale date or the date the
lender acquires title. If eviction action is
required in order to obtain a market
value appraisal, the lender must submit
the loss claim package, including the
market value appraisal, within 60 days
of the date the occupants clear the
premises and in accordance with other
requirements of this subpart. with any
loss claim request in accordance with
subpart H.
■ 12. Amend § 3555.354 by revising the
introductory text and paragraph (b) to
read as follows:
khammond on DSKJM1Z7X2PROD with RULES
§ 3555.354
Loss claim procedures.
All lenders must use a web-based
automated system designated by the
Agency to submit all loss claim
requests.
*
*
*
*
*
(b) REO. If at liquidation, the title to
the property is conveyed to the lender,
the lender will submit a loss claim
package, including a market value
appraisal, within 60 days of the
foreclosure sale date or the date the
lender acquires title. If eviction action is
required in order to obtain a market
value appraisal, the lender must submit
the loss claim package within 60 days
of the date the occupants clear the
premises. The lender must order a
market value appraisal and include the
VerDate Sep<11>2014
15:55 Dec 23, 2019
Jkt 250001
market value appraisal with the loss
claim package. The Agency will use the
market value appraisal, along with other
Agency required documentation, to
determine the property value for the
basis of the loss claim. The Agency will
apply an acquisition and management
resale factor to estimate holding and
disposition costs, based on the most
current VA Management and
Acquisition Factor found at https://
www.benefits.va.gov/HOMELOANS/
servicers_valeri.asp.
*
*
*
*
*
§ 3555.356
■
[Removed and Reserved]
13. Remove and reserve § 3555.356.
Dated: November 25, 2019.
Bruce W. Lammers,
Administrator, Rural Housing Service.
[FR Doc. 2019–27504 Filed 12–23–19; 8:45 am]
BILLING CODE 3410–XV–P
FEDERAL RESERVE SYSTEM
12 CFR Parts 206, 208, 211, 215, 217,
223, 225, 238, and 251
[Regulation Q; Docket No. R–1638]
RIN 7100–AF 29
Regulatory Capital Rule: Capital
Simplification for Qualifying
Community Banking Organizations
Board of Governors of the
Federal Reserve System (Board).
ACTION: Final rule; correction.
AGENCY:
The Federal Register
document of November 13, 2019,
promulgating a final rule that provides
for a simple measure of capital
adequacy for certain community
banking organization had two erroneous
amendment instructions. This
document corrects these errors.
DATES: This correction is effective on
January 1, 2020.
SUPPLEMENTARY INFORMATION: In FR Doc.
2019–23472 appearing on page 61776 in
the Federal Register of Wednesday,
November 13, 2019, the following
corrections are made:
■ 1. On page 61796, in the center
column, amendatory instruction 31 is
corrected to read as follows:
‘‘31. Section 208.43 is amended by
revising paragraphs (a), (b) introductory
text, and (b)(1) to read as follows:’’
■ 2. On page 61799, in the center
column, amendatory instruction 46 is
corrected to read as follows:
‘‘46. Section 225.14 is amended by:
a. Redesignating footnote 3 to
paragraph (a)(1)(ii) as footnote 1 to
paragraph (a)(1)(ii);
SUMMARY:
PO 00000
Frm 00007
Fmt 4700
Sfmt 4700
70887
b. Revising paragraphs (a)(1)(v),
(a)(1)(vii), and (c)(6)(i)(A) and (B); and
c. Adding paragraphs (c)(6)(iii) and
(f).’’
Board of Governors of the Federal Reserve
System, December 18, 2019.
Ann Misback,
Secretary of the Board.
[FR Doc. 2019–27717 Filed 12–23–19; 8:45 am]
BILLING CODE 6210–01–P
DEPARTMENT OF STATE
22 CFR Part 120
[Public Notice: 10946]
RIN 1400–AE76
International Traffic in Arms
Regulations: Creation of Definition of
Activities That Are Not Exports,
Reexports, Retransfers, or Temporary
Imports; Creation of Definition of
Access Information; Revisions to
Definitions of Export, Reexport,
Retransfer, Temporary Import, and
Release
Department of State.
Interim final rule; request for
comment.
AGENCY:
ACTION:
The Department of State
amends the International Traffic in
Arms Regulations (ITAR) to create a
definition of ‘‘activities that are not
exports, reexports, retransfers, or
temporary imports’’ by combining
existing text from the regulations with
new text regarding secured unclassified
technical data. The activities included
in the new definition are: Launching
items into space, providing technical
data to U.S. persons within the United
States or within a single country abroad,
and moving a defense article between
the states, possessions, and territories of
the United States. The definition also
clarifies that the electronic transmission
and storage of properly secured
unclassified technical data via foreign
communications infrastructure does not
constitute an export. Additionally, the
Department amends the ITAR to create
a definition of ‘‘access information’’ and
revise the definition of ‘‘release’’ to
address the provision of access
information to an unauthorized foreign
person.
DATES: Effective date: This interim final
rule is effective on March 25, 2020.
Comments due date: Interested parties
may submit comments by January 27,
2020.
SUMMARY:
Interested parties may
submit comments by one of the
following methods:
ADDRESSES:
E:\FR\FM\26DER1.SGM
26DER1
khammond on DSKJM1Z7X2PROD with RULES
70888
Federal Register / Vol. 84, No. 247 / Thursday, December 26, 2019 / Rules and Regulations
• Email: DDTCPublicComments@
state.gov with the subject line,
‘‘Revisions to Definitions; Data
Transmission and Storage’’
• Internet: At www.regulations.gov,
search for this notice using Docket
DOS–2019–0040.
FOR FURTHER INFORMATION CONTACT: Ms.
Sarah Heidema, Director, Office of
Defense Trade Controls Policy,
Department of State, telephone (202)
663–1282; email
DDTCPublicComments@state.gov.
ATTN: ITAR Amendment—Revisions to
Definitions; Data Transmission and
Storage.
SUPPLEMENTARY INFORMATION: The
Directorate of Defense Trade Controls
(DDTC), U.S. Department of State,
administers the International Traffic in
Arms Regulations (ITAR) (22 CFR parts
120 through 130). The items subject to
the jurisdiction of the ITAR, i.e., defense
articles and defense services, are
identified on the ITAR’s U.S. Munitions
List (USML) (22 CFR 121.1). With few
exceptions, items not subject to the
export control jurisdiction of the ITAR
are subject to the jurisdiction of the
Export Administration Regulations
(EAR, 15 CFR parts 730 through 774,
which includes the Commerce Control
List (CCL) in Supplement No. 1 to part
774), administered by the Bureau of
Industry and Security (BIS), U.S.
Department of Commerce. Both the
ITAR and the EAR create license
requirements for exports and reexports
of controlled items. Items not subject to
the ITAR or to the exclusive licensing
jurisdiction of any other set of
regulations are subject to the EAR.
On June 3, 2015, the Department of
State published a proposed rule (80 FR
31525) (2015 proposed rule) and
requested comments on an extensive
array of proposed amendments to the
ITAR, including the revision of key
definitions, the creation of several new
definitions, and the revision of related
provisions. The proposed amendments
also attempted to harmonize these
definitions with the EAR to the extent
appropriate. After reviewing the public
comments on the 2015 proposed rule,
the Department published an interim
final rule on June 3, 2016 (81 FR 35611)
(2016 interim final rule), which updated
the definitions of ‘‘export’’ and
‘‘reexport or retransfer’’ and, in an effort
to clarify and support the interpretation
of these definitions, also created
definitions of ‘‘release’’ and
‘‘retransfer.’’ BIS concurrently
published amendments (BIS companion
rule) to definitions, including ‘‘export,’’
‘‘reexport,’’ ‘‘release,’’ and ‘‘transfer (incountry)’’ in the EAR (81 FR 35586).
VerDate Sep<11>2014
15:55 Dec 23, 2019
Jkt 250001
The Department subsequently reviewed
the public comments on the 2016
interim final rule and published a final
rule on September 8, 2016 (81 FR
62004) (2016 final rule), which revised
the definition of ‘‘retransfer’’ and made
other clarifying revisions. Not all of the
amendments proposed in the 2015
proposed rule were adopted, and both
the 2016 interim final rule and the 2016
final rule reserved the remaining
amendments for consideration in
separate rulemakings.
This interim final rulemaking
addresses certain of the remaining
amendments from the 2015 proposed
rule, and the Department continues to
reserve the remaining amendments for
consideration in separate rulemakings.
Included in this interim final rule is the
creation of a definition for ‘‘activities
that are not exports, reexports,
retransfers, or temporary imports’’
under a new ITAR § 120.54 (§ 120.52 in
the 2015 proposed rule). Among other
things, this provision provides that the
properly secured (by end-to-end
encryption) electronic transmission or
storage of unclassified technical data via
foreign communications infrastructure
does not constitute an export, reexport,
retransfer, or temporary import.
The Department recognizes the BIS
companion rule addressed these issues
with the creation of EAR § 734.18, and
the Department has received repeated
enquiries regarding when a similar rule
would be issued regarding the ITAR. In
an effort to align the definition in the
ITAR with the definition in the EAR, the
interim final rule described below is
structured similarly to EAR § 734.18.
The Department also recognizes that it
has received public comments regarding
these amendments to the ITAR. Where
appropriate, those comments are
addressed in the analysis below. In light
of the potential impact the amendments
in this rule may have on the regulated
community’s processes, and the
updated security strength standards
described below, the Department
considered it appropriate to provide
another opportunity for the public to
submit comments and therefore
publishes this rule as an interim final
rule with the opportunity for the public
to provide comment.
1. Definition of Activities That Are Not
Exports, Reexports, Retransfers, or
Temporary Imports
The Department adds § 120.54 to
describe those ‘‘activities that are not
exports, reexports, retransfers, or
temporary imports’’ and do not require
authorization from the Department. For
the purpose of this preamble, the
Department will use the term
PO 00000
Frm 00008
Fmt 4700
Sfmt 4700
‘‘controlled event’’ to mean an export,
reexport, retransfer, or temporary
import, all of which require a DDTC
license or other approval.
The first of five provisions in the new
§ 120.54 states in paragraph (a)(1) that it
is not a controlled event to launch items
into space. This activity is already
excluded from the definition of an
export in ITAR § 120.17(a)(6) and by
statute, see 51 U.S.C. 50919(f). In an
effort to consolidate the different
activities that do not qualify as exports
under the ITAR, this provision has been
moved to § 120.54(a)(1), and the
language has been simplified.
The second provision states in
paragraph (a)(2) that it is not a
controlled event to transmit or
otherwise transfer technical data to a
U.S. person within the United States
from a person in the United States. In
response to public comments, the
updated version of paragraph (a)(2)
provides that a transmission or other
transfer between U.S. persons who are
in the United States is unequivocally
not a controlled event. However, any
release to a foreign person remains a
controlled event.
The third provision, which was not
included in the 2015 proposed rule but
is added here in response to public
comments to that proposed rule, is
found in the new paragraph (a)(3). This
provision states that transmissions or
other transfers of technical data between
and among only U.S. persons in the
same foreign country are similarly not
reexports or retransfers so long as they
do not result in a release to a foreign
person or transfer to a person prohibited
from receiving the technical data
because that person is otherwise
precluded from engaging in the
regulated activity, for example a
debarred person.
The fourth provision states in
paragraph (a)(4) that it is not a
controlled event to move a defense
article between the states, possessions,
and territories of the United States. One
commenter requested that the
Department revise paragraph (a)(4) to
list explicitly the Virgin Islands of the
United States, Guam, American Samoa,
and the various United States Minor
Outlying Islands. The Department will
not make this change because the ITAR
already defines the term ‘‘United States’’
in § 120.13, and that definition is
applicable.
The fifth provision states in paragraph
(a)(5) that it is not a controlled event to
send, take, or store unclassified
technical data when it is effectively
encrypted using end-to-end encryption.
Therefore, a controlled event does not
occur when technical data is encrypted
E:\FR\FM\26DER1.SGM
26DER1
khammond on DSKJM1Z7X2PROD with RULES
Federal Register / Vol. 84, No. 247 / Thursday, December 26, 2019 / Rules and Regulations
prior to leaving the sender’s facilities
and remains encrypted until decrypted
by the intended authorized recipient or
retrieved by the sender, as in the case
of remote storage. The controlled event
occurs upon the release of the technical
data. If the technical data is decrypted
by someone other than the sender, a
U.S. person in the United States, or a
person otherwise authorized to receive
the technical data, then the technical
data is not secured using end-to-end
encryption for purposes of paragraph
(a)(5) and the original transmission was
a controlled event.
The encryption must be accomplished
in a manner that is certified by the U.S.
National Institute for Standards and
Technology (NIST) as compliant with
the Federal Information Processing
Standards Publication 140–2 (FIPS 140–
2), or must meet or exceed a 128-bit
security strength. At the time of
publication of this rule, that criterion is
expressed in ‘‘Table 2: Comparable
strengths’’ of NIST Special Publication
800–57 Part 1, Revision 4. Additionally,
the technical data may not be
intentionally sent to a person in or
stored in a § 126.1 country or the
Russian Federation, even in its
encrypted state. This will allow for
transmissions and storage of encrypted
data in most foreign countries, so long
as the technical data remains
continuously encrypted while outside of
the United States or until decrypted by
an authorized intended recipient.
In response to public comments
regarding the requirement of the 2015
proposed rule that the encryption be via
a FIPS 140–2 compliant module, the
Department added language that allows
encryption through means other than
FIPS 140–2 compliant modules, so long
as it meets or exceeds a 128-bit security
strength. One commenter suggested that
the Department retain only FIPS 140–2
to encourage interoperability between
systems, but the overwhelming number
of commenters requested other
encryption modules be allowed. The
Department also clarified that
intentional storage in the Russian
Federation or a § 126.1 country
constitutes a controlled event. However,
incidental collection by a foreign
intelligence service or transient storage
that is incidental to sending information
via the internet does not.
Further, in response to public
comments, the Department revised
paragraph (b) to clarify the definition of
end-to-end encryption. The
cryptographic protection must be
applied prior to the data being sent
outside of the originator’s security
boundary and remain undisturbed until
it arrives within the security boundary
VerDate Sep<11>2014
15:55 Dec 23, 2019
Jkt 250001
of the intended recipient. For
communications between individuals,
this can be accomplished by encrypting
the data on the sender’s computer prior
to emailing or otherwise sending it to
the intended recipient. For large
entities, the security boundary may be
managed by IT staff, who will encrypt
the data before it leaves the entity’s
secure network and decrypt it on the
way into the network. However, in all
instances, the means of decryption must
not be provided to any third party and
the data must not have the
cryptographic protection removed at
any point in transit.
One commenter suggested that the
Department define which modules
under FIPS 140–2 are compliant and
which NIST publications are applicable,
in the rule. The Department disagrees
with this comment. Compliance with
any of the four levels set out in FIPS
140–2 is sufficient for the purposes of
this section. Exporters are free to choose
the level that best meets their needs.
Different NIST publications are relevant
to each standard, so the applicable
publications will depend on the
standard used.
One commenter suggested that the
Department provide one year from the
issuance of a new NIST standard for
implementation. The Department
disagrees with this comment. The NIST
standards will be final and applicable
when NIST makes them the standard.
One commenter requested that the
Department allow a transition period so
that exporters can implement IT systems
compliant with paragraph (5). The
Department disagrees with this
comment. Paragraph (5) creates a
mechanism for companies to send and
store technical data outside the United
States without engaging in a controlled
event. Until companies implement an IT
system that is compliant with paragraph
(5), they may not take advantage of this
paragraph, but nothing in paragraph (5)
places any new requirements on
exporters, therefore there is no need for
a transition period.
One commenter suggested that the
Department revise paragraph (b) to say
‘‘the means to access the data in
unencrypted form is not ‘released’ to
any third party’’ rather than ‘‘the means
to access the data in unencrypted form
is not given to any third party,’’ as
‘‘release’’ is a defined term. The
Department disagrees with this
comment. The Department did revise
this concept in paragraph (b) to require
that ‘‘the means of decryption are not
provided to any third party,’’ but the
Department chose not to use the word
‘‘released’’ because that word has a
PO 00000
Frm 00009
Fmt 4700
Sfmt 4700
70889
technical definition that would not be
applicable in this usage.
Several commenters requested that
the Department provide a safe harbor, of
sorts, by only requiring that cloud
customers obtain contractual assurances
that the data would not be stored in a
§ 126.1 country or the Russian
Federation. The Department disagrees
with this comment. Such a provision
would not be in the national security or
foreign policy interests of the United
States. The Department recognizes it can
be difficult to control the actions of
third parties, including partners, service
providers, and subcontractors, and will
review potential violations on a case-bycase basis, subject to the totality of the
facts and circumstances comprising the
issue at hand.
One commenter requested that the
Department clarify that appropriately
encrypted transmissions may transit the
Russian Federation or a § 126.1 country
and still qualify for this provision. The
Department clarified this point by
adding the word ‘‘intentionally,’’ to
differentiate those electronic
transmissions that were intentionally
sent to Russia or a § 126.1 country, and
those that simply transited them in
route to another country. The
commenter also provided an example of
such a transmission where an email
server is located in the Russian
Federation or a § 126.1 country.
Transmission through these destinations
is allowed, including temporary storage
incident to internet transmissions, but
long-term storage of the information,
such as is commonly done on email
servers, is prohibited in these
destinations. Prior to using this
provision, putative exporters should
ensure that the intended recipient or
any intended remote storage provider
does not store their information in the
Russian Federation or a § 126.1 country.
One commenter requested that the
Department provide that emails between
authorized parties in the same country
also be included in the definition of
activities that are not exports, reexports,
or retransfers if they happen to transit
a third country, even if the technical
data is not encrypted as described in
paragraph (5). The Department notes
that transmissions between U.S. persons
in the United States are not exports
under paragraph (2), but that with
respect to transmissions in foreign
countries, only those communications
that remain in one country between
only U.S. persons are excluded under
paragraph (3). If a company in a foreign
country is concerned that emails that
include technical data may transit third
countries, it should encrypt those
E:\FR\FM\26DER1.SGM
26DER1
khammond on DSKJM1Z7X2PROD with RULES
70890
Federal Register / Vol. 84, No. 247 / Thursday, December 26, 2019 / Rules and Regulations
communications consistent with
paragraph (5).
Several commenters requested that
the Department revise the local
definition of end-to-end encryption to
allow for information security
mechanisms that render the data into
clear text in route to the intended
recipient, for processing via
applications, such as anti-virus software
or spell-check. The commenters also
note that multiple layers of encryption
may be applied and removed
throughout the transit of the data. The
Department disagrees with this
comment. Use of paragraph (a)(5)
requires that the technical data subject
to the ITAR be continuously encrypted
at all times while outside of an
authorized security boundary. The
Department is aware that there are many
ways that this provision can be
implemented; some of which would
allow an entity to run anti-virus or other
security scans prior to allowing the data
onto its servers. As long as that initial
encryption layer remains intact, the
addition or removal of subsequent
layers of encryption, which may or may
not meet the FIPS 140–2 standard, is not
relevant to the application of this
section.
One commenter requested that the
Department include the electronic
storage in the United States and transfer
from the United States of non-U.S.
origin technical data by non-U.S.
persons within the activities that are not
an export, reexport, or retransfer, even
when not encrypted. The Department
disagrees with this comment. Non-U.S.
origin technical data transiting or stored
in the United States that is encrypted in
the manner described in paragraph
(a)(5) (i.e., it remains encrypted at all
times between originator and recipient,
including at any time while in the
United States), does not require
authorization from the Department,
unless it originates in or is sent to a
country listed in § 126.1 or the Russian
Federation.
One commenter stated that paragraph
(a)(5) in this rule does not authorize the
export of technical data in a physical
medium and requested that the
Department revise paragraph (a)(5) to
allow the shipment or carriage of
technical data in a physical medium
that has been properly encrypted. The
Department notes that the comment
mischaracterizes the activity. The
movement or storage of controlled
technical data in a properly encrypted
state outside of the United States is not
an export as defined in § 120.17(a)(1),
the specific concern raised by the
commenter, or a controlled event of any
type, and does not require
VerDate Sep<11>2014
15:55 Dec 23, 2019
Jkt 250001
authorization. The Department notes
that paragraph (a)(5) is not limited to
electronic transmissions and the
shipment or carriage of technical data in
a physical medium is not a controlled
event, so long as all of the conditions
are met.
One commenter requested that the
Department expand paragraph (a)(5) to
cover tokenization, as well as
encryption. Tokenization is a process
whereby individual elements of a
document, be they letters, words,
diagrams, or pictures, are replaced by a
representative token. As described by
the commenter, the tokens are assigned
randomly and a key of the document is
created. The document may not be
returned to the original text from the
tokens without use of the specific key
for that document. This process is
different from encryption, in that
encryption uses an algorithm to encode
the document, such that representative
characters are assigned according to a
mathematical formula that can, at least
theoretically, be deciphered through
analysis of the encrypted text. The
Department will not add tokenization.
There is no NIST or other comparable
standard that the Department can
reference to set a minimum threshold
for implementation of tokenization.
One commenter suggested that the
Department encourage other
jurisdictions to adopt a provision
similar to paragraph (a)(5) in their
export control systems. The Department
agrees, and has already engaged in
discussions with allies regarding
paragraph (a)(5).
One commenter requested that the
Department add shipping to and within
the territory of an approved end-user as
an activity that is not an export,
reexport, or retransfer. The Department
disagrees with this comment. A
shipment to the territory of an approved
end-user is an export or reexport that
requires authorization. Shipments
within the territory of an authorized
end-user will likewise require
authorization if the shipment is to
someone other than the authorized enduser or for activities other than the
authorized end-use.
One commenter requested that the
Department create a definition of ‘‘basic
technical data’’ and include the sharing
of such information in this section,
analogizing to the sharing of the owner’s
manual for a car. The Department
disagrees with this comment. The
export of technical data requires
authorization from the Department. If
the Department were to define some
portion of technical data that does not
warrant control, the Department would
revise § 120.6 or § 120.10 to exclude it.
PO 00000
Frm 00010
Fmt 4700
Sfmt 4700
One commenter suggested that the
Department include shipments to
military post offices in this section,
noting that the National Industrial
Security Program Operating Manual
(NISPOM) treats transfers to military
post offices as domestic transfers. The
Department disagrees with this
comment. The export of a defense
article shipped to a military post office
via the U.S. Postal Service is
accomplished by the U.S. military and
therefore may be authorized without a
license via § 126.4 of the ITAR, so long
as the other terms and conditions of that
provision are met.
2. Revised Definitions of Export,
Reexport, Retransfer, and Temporary
Import
As stated above, the Department
moves the language of § 120.17(a)(6),
which articulates that it is not an export
to launch items into space, to
§ 120.52(a)(1), and simplifies the
language. In its place, the Department
adds a new § 120.17(a)(6) in order to
include within the definition of export
the release through the use of access
information of previously encrypted
technical data as described in
§ 120.50(a)(3) (to a foreign person, no
matter where located) and (a)(4)
(causing the technical data to be in an
unencrypted form out of the United
States). The Department added a
citation to § 120.54 to §§ 120.17(a),
120.18, 120.19(a), and 120.51(a), which
define export, temporary import,
reexport, and retransfer, respectively, to
exclude from those definitions activities
identified in § 120.54. In addition, the
Department takes this opportunity to
revise § 120.17(a) in order to mirror the
construction of the other definitions of
controlled activities and lead with the
defined term of ‘‘export.’’
3. Definition of Access Information
The Department adds new § 120.55 to
define ‘‘access information.’’ Access
information allows access to encrypted
technical data in an unencrypted form,
such as decryption keys, network access
codes, and passwords. An authorization
is required to release technical data
through access information to the same
extent that an authorization is required
to export the technical data when it is
unsecured by encryption.
Several commenters requested that
the Department adopt the knowledge
requirement that was included in the
BIS companion rule and now appears in
EAR § 734.19. The Department disagrees
with this comment. As provided in
§§ 120.50(b) and 120.54(b), an existing
authorization for the release of technical
data to the foreign person must be in
E:\FR\FM\26DER1.SGM
26DER1
Federal Register / Vol. 84, No. 247 / Thursday, December 26, 2019 / Rules and Regulations
khammond on DSKJM1Z7X2PROD with RULES
place prior to the provision of access
information to the foreign person that
will allow the transition of the
encrypted technical data to an
unencrypted state.
4. Revised Definition of Release
The Department adds two new
subparagraphs to paragraph (a) and a
new paragraph (b) to the definition of
release in § 120.50 in order to clarify
what constitutes a release of technical
data, a controlled event requiring
authorization from the Department, and
the provision of access information that
may result in the release of technical
data. Paragraph (a)(3) makes it a release
of technical data to use access
information to cause or enable a foreign
person to access, view, or possess
technical data in unencrypted form.
Paragraph (a)(4) makes it a release of
technical data to use access information
in a foreign country to cause technical
data to be in unencrypted form,
including when such actions are taken
by U.S. persons abroad. Most U.S.
persons will be authorized to release the
technical data abroad to themselves or
over their employer’s virtual private
network through the exemption at ITAR
§ 125.4(b)(9).
The 2015 proposed rule proposed a
new paragraph (a)(5) to make it a release
to provide access information to a
foreign person that can cause or enable
access, viewing, or possession of
technical data in unencrypted form. It
also proposed a Note to paragraph (a) in
order to clarify the license requirement
regarding technical data secured by the
access information when a release
occurs under the proposed paragraphs
(a)(3), (a)(4), or (a)(5).
In a change from the 2015 proposed
rule, the Department now includes at
paragraph (b) language derived from the
proposed paragraph (a)(5) and Note
included in that draft. The new
paragraph (b) clarifies that the provision
of access information to a foreign person
is not itself a controlled event; there is
no need for an application by the access
information provider, or for the
Department to issue an authorization,
for the provision of access information.
However, in order for the Department to
effectively control the release of
technical data to a foreign person in
certain circumstances, paragraph (b)
requires an authorization for a release of
technical data to a foreign person before
providing the access information to that
foreign person, if that access
information can cause or enable access,
viewing, or possession of the
unencrypted technical data. In the
absence of an authorization for the
release of technical data in such
VerDate Sep<11>2014
15:55 Dec 23, 2019
Jkt 250001
circumstances, the provision of access
information to a foreign person is a
violation of ITAR § 127.1(b)(1) for
failure to abide by a rule or regulation
contained in this subchapter.
Furthermore, causing or enabling a
foreign person to access, view, or
possess unencrypted technical data may
constitute a separate violation of ITAR
§ 127.1(a), if the exporter (or reexporter
or retransferrer) in question has not
received prior authorization from the
Department in the form of a license or
other authorization (e.g., exemption). As
stated in ITAR § 120.54(b), in order for
the sending, taking, or storing technical
data to meet the requirements of end-toend encryption and therefore to
constitute an activity that is not a
controlled event under ITAR
§ 120.54(a)(5), the intended recipient
must be the originator, a U.S. person in
the United States, or otherwise
authorized to receive the technical data
in an unencrypted form.
The Department recognizes that the
2015 proposed rule contained draft
language for a new § 127.1(b)(4) that
would have listed the types of
controlled events involving the secured
unclassified technical data described in
this interim final rule’s § 120.54(a)(5).
The Department did not receive any
public comments on this proposed
amendment. Nevertheless, once the
Department decided to establish a new
definition for ‘‘access information’’ in
§ 120.55 that is distinct from the
definition of technical data in § 121.10,
it seemed more appropriate to include
descriptions of the relevant controlled
events under the definition of release in
§ 120.50 because that provision was
added to the ITAR in order to describe
more effectively the controlled
disclosure of information. Moreover,
this construction is analogous to how
the EAR defines the term ‘‘access
information’’ in EAR § 772.1 and uses
that term in § 734.19 to describe
controlled events related to ‘‘activities
that are not exports, reexports, or
retransfers’’ under § 734.18.
Finally, the Department adds and
reserves §§ 120.52 and 120.53.
Regulatory Analysis and Notices
Administrative Procedure Act
This rulemaking is exempt from
section 553 (Rulemaking) and
section 554 (Adjudications) of the
Administrative Procedure Act (APA)
pursuant to 5 U.S.C. 553(a)(1) as a
military or foreign affairs function of the
United States Government. Although
the Department is of the opinion that
this interim final rule is exempt from
the rulemaking provisions of the APA,
PO 00000
Frm 00011
Fmt 4700
Sfmt 4700
70891
the Department published this rule as a
proposed rule (80 FR 31525) with a 60day provision for public comment,
published an interim final rule (81 FR
35611) with a 30-day provision for
public comment and three-month
delayed effective date for certain
provisions thereof, and now as another
interim final rule with a 30-day
provision for public comment and threemonth delayed effective date for the
provisions identified herein. Those
publications were without prejudice to
the Department’s determination that
controlling the import and export of
defense services is a foreign affairs
function.
Regulatory Flexibility Act
Since the Department is of the
opinion that this rulemaking is exempt
from the rulemaking provisions of 5
U.S.C. 553, there is no requirement for
an analysis under the Regulatory
Flexibility Act.
Unfunded Mandates Reform Act of 1995
This rulemaking does not involve a
mandate that will result in the
expenditure by State, local, and tribal
governments, in the aggregate, or by the
private sector, of $100 million or more
in any year and it will not significantly
or uniquely affect small governments.
Therefore, no actions were deemed
necessary under the provisions of the
Unfunded Mandates Reform Act of
1995.
Small Business Regulatory Enforcement
Fairness Act of 1996
For purposes of the Small Business
Regulatory Enforcement Fairness Act of
1996 (the ‘‘Act’’), a major rule is a rule
that the Administrator of the OMB
Office of Information and Regulatory
Affairs finds has resulted or is likely to
result in: (1) An annual effect on the
economy of $100,000,000 or more; (2) a
major increase in costs or prices for
consumers, individual industries,
federal, state, or local government
agencies, or geographic regions; or (3)
significant adverse effects on
competition, employment, investment,
productivity, innovation, or on the
ability of United States-based
enterprises to compete with foreignbased enterprises in domestic and
foreign markets.
The Department does not believe this
rulemaking is a major rule within the
meaning of the Act. The means of
solving the issue of data protection are
already both familiar to and extensively
used by the affected public in protecting
sensitive information.
E:\FR\FM\26DER1.SGM
26DER1
70892
Federal Register / Vol. 84, No. 247 / Thursday, December 26, 2019 / Rules and Regulations
Paperwork Reduction Act
§ 120.19
This rulemaking will not have
substantial direct effects on the States,
on the relationship between the national
government and the States, or on the
distribution of power and
responsibilities among the various
levels of government. Therefore, in
accordance with Executive Order 13132,
it is determined that this rulemaking
does not have sufficient federalism
implications to require consultations or
warrant the preparation of a federalism
summary impact statement. The
regulations implementing Executive
Order 12372 regarding
intergovernmental consultation on
Federal programs and activities do not
apply to this rulemaking.
This rulemaking does not impose any
new reporting or recordkeeping
requirements subject to the Paperwork
Reduction Act, 44 U.S.C. Chapter 35;
however, the Department seeks public
comment on any unforeseen potential
for increased burden.
(a) Reexport, except as set forth in
§ 120.54, § 126.16, or § 126.17, means:
*
*
*
*
*
■ 5. Section 120.50 is amended as
follows:
■ a. By removing the word ‘‘or’’ at the
end of paragraph (a)(1);
■ b. By removing the period and adding
in its place a semi-colon at the end of
paragraph (a)(2); and
■ c. By adding paragraphs (a)(3) and (4)
and (b).
The additions read as follows:
Executive Orders 12866 and 13563
■
Executive Orders 12372 and 13132
Executive Orders 12866 and 13563
direct agencies to assess costs and
benefits of available regulatory
alternatives and, if regulation is
necessary, to select regulatory
approaches that maximize net benefits
(including potential economic,
environmental, public health and safety
effects, distributed impacts, and equity).
The executive orders stress the
importance of quantifying both costs
and benefits, of reducing costs, of
harmonizing rules, and of promoting
flexibility. This rulemaking has been
designated a ‘‘significant regulatory
action,’’ although not economically
significant, under section 3(f) of
Executive Order 12866. Accordingly,
the rulemaking has been reviewed by
the Office of Management and Budget
(OMB).
Executive Order 12988
khammond on DSKJM1Z7X2PROD with RULES
Executive Order 13175
The Department has determined that
this rulemaking will not have tribal
implications, will not impose
substantial direct compliance costs on
Indian tribal governments, and will not
preempt tribal law. Accordingly,
Executive Order 13175 does not apply
to this rulemaking.
Executive Order 13771
This final rule is not subject to the
requirements of Executive Order 13771
because it is issued with respect to a
military or foreign affairs function of the
United States.
20:33 Dec 23, 2019
Arms and munitions, Classified
information, Exports.
Accordingly, for the reasons set forth
above, title 22, chapter I, subchapter M,
part 120 of the Code of Federal
Regulations is amended as follows:
PART 120—PURPOSE AND
DEFINITIONS
1. The authority citation for part 120
continues to read as follows:
Authority: Secs. 2, 38, and 71, Pub. L. 90–
629, 90 Stat. 744 (22 U.S.C. 2752, 2778,
2797); 22 U.S.C. 2794; 22 U.S.C. 2651a; Pub.
L. 105–261, 112 Stat. 1920; Pub. L. 111–266;
Section 1261, Pub. L. 112–239; E.O. 13637,
78 FR 16129.
2. Section 120.17 is amended by
revising paragraphs (a) introductory text
and (a)(6) to read as follows:
■
§ 120.17
Jkt 250001
Export.
(a) Export, except as set forth in
§ 120.54, § 126.16, or § 126.17, means:
*
*
*
*
*
(6) The release of previously
encrypted technical data as described in
§ 120.50(a)(3) and (4) of this subchapter.
*
*
*
*
*
■ 3. Section 120.18 is revised to read as
follows:
§ 120.18
The Department has reviewed the
rulemaking in light of sections 3(a) and
3(b)(2) of Executive Order 12988 to
eliminate ambiguity, minimize
litigation, establish clear legal
standards, and reduce burden.
VerDate Sep<11>2014
List of Subjects in 22 CFR 120
Temporary import.
Frm 00012
Fmt 4700
Sfmt 4700
Release.
(a) * * *
(3) The use of access information to
cause or enable a foreign person,
including yourself, to access, view, or
possess unencrypted technical data; or
(4) The use of access information to
cause technical data outside of the
United States to be in unencrypted
form.
(b) Authorization for a release of
technical data to a foreign person is
required to provide access information
to that foreign person, if that access
information can cause or enable access,
viewing, or possession of the
unencrypted technical data.
■ 6. Section 120.51 is amended by
revising paragraph (a) introductory text
to read as follows:
§ 120.51
Retransfer.
(a) Retransfer, except as set forth in
§ 120.54, § 126.16, or § 126.17, means:
*
*
*
*
*
§ 120.52
■
[Reserved]
7. Add reserved § 120.52.
§ 120.53
Temporary import, except as set forth
in § 120.54, means bringing into the
United States from a foreign country any
defense article that is to be returned to
the country from which it was shipped
or taken, or any defense article that is
in transit to another foreign destination.
Temporary import includes withdrawal
of a defense article from a customs
bonded warehouse or foreign trade zone
for the purpose of returning it to the
country of origin or country from which
it was shipped or for shipment to
another foreign destination. Permanent
imports are regulated by the Attorney
General under the direction of the
Department of Justice’s Bureau of
Alcohol, Tobacco, Firearms, and
Explosives (see 27 CFR parts 447, 478,
479, and 555).
■ 4. Section 120.19 is amended by
revising paragraph (a) introductory text
to read as follows:
PO 00000
§ 120.50
Reexport.
[Reserved]
8. Add reserved § 120.53.
9. Section 120.54 is added to read as
follows:
■
■
§ 120.54 Activities that are not exports,
reexports, retransfers, or temporary
imports.
(a) The following activities are not
exports, reexports, retransfers, or
temporary imports:
(1) Launching a spacecraft, launch
vehicle, payload, or other item into
space.
(2) Transmitting or otherwise
transferring technical data to a U.S.
person in the United States from a
person in the United States.
(3) Transmitting or otherwise
transferring within the same foreign
country technical data between or
among only U.S. persons, so long as the
transmission or transfer does not result
in a release to a foreign person or
E:\FR\FM\26DER1.SGM
26DER1
Federal Register / Vol. 84, No. 247 / Thursday, December 26, 2019 / Rules and Regulations
transfer to a person prohibited from
receiving the technical data.
(4) Shipping, moving, or transferring
defense articles between or among the
United States as defined in § 120.13 of
this subchapter.
(5) Sending, taking, or storing
technical data that is:
(i) Unclassified;
(ii) Secured using end-to-end
encryption;
(iii) Secured using cryptographic
modules (hardware or software)
compliant with the Federal Information
Processing Standards Publication 140–2
(FIPS 140–2) or its successors,
supplemented by software
implementation, cryptographic key
management, and other procedures and
controls that are in accordance with
guidance provided in current U.S.
National Institute for Standards and
Technology (NIST) publications, or by
other cryptographic means that provide
security strength that is at least
comparable to the minimum 128 bits of
security strength achieved by the
Advanced Encryption Standard (AES–
128);
(iv) Not intentionally sent to a person
in or stored in a country proscribed in
§ 126.1 of this subchapter or the Russian
Federation; and
khammond on DSKJM1Z7X2PROD with RULES
Note to paragraph (a)(5)(iv): Data in-transit
via the internet is not deemed to be stored.
(v) Not sent from a country proscribed
in § 126.1 of this subchapter or the
Russian Federation.
(b)(1) For purposes of this section,
end-to-end encryption is defined as:
(i) The provision of cryptographic
protection of data, such that the data is
not in an unencrypted form, between an
originator (or the originator’s in-country
security boundary) and an intended
recipient (or the recipient’s in-country
security boundary); and
(ii) The means of decryption are not
provided to any third party.
(2) The originator and the intended
recipient may be the same person. The
intended recipient must be the
originator, a U.S. person in the United
States, or a person otherwise authorized
to receive the technical data, such as by
a license or other approval pursuant to
this subchapter.
(c) The ability to access technical data
in encrypted form that satisfies the
criteria set forth in paragraph (a)(5) of
this section does not constitute the
release or export of such technical data.
■ 9. Section 120.55 is added to read as
follows:
§ 120.55
Access Information.
Access information is information
that allows access to encrypted
VerDate Sep<11>2014
15:55 Dec 23, 2019
Jkt 250001
technical data subject to this subchapter
in an unencrypted form. Examples
include decryption keys, network access
codes, and passwords.
Christopher A. Ford,
Assistant Secretary, International Security
and Nonproliferation, U.S. Department of
State.
[FR Doc. 2019–27438 Filed 12–23–19; 8:45 am]
BILLING CODE 4710–25–P
DEPARTMENT OF HOMELAND
SECURITY
Coast Guard
33 CFR Part 165
[Docket No. USCG–2019–0942]
Safety Zone, Brandon Road Lock and
Dam to Lake Michigan Including Des
Plaines River, Chicago Sanitary and
Ship Canal, Chicago River, and
Calumet-Saganashkee Channel,
Chicago, IL
Coast Guard, DHS.
Notice of enforcement of
regulation.
AGENCY:
ACTION:
The Coast Guard will enforce
a segment of the Safety Zone; Brandon
Road Lock and Dam to Lake Michigan
including Des Plaines River, Chicago
Sanitary and Ship Canal, Chicago River,
Calumet-Saganashkee Channel on all
waters of the Main Branch of the
Chicago River 600 feet west of the N
Orleans Street Bridge and 1000 feet east
of the N Columbus Street Bridge. This
action is necessary and intended to
protect the safety of life and property on
navigable waters prior to, during, and
immediately after firework displays.
During the enforcement periods listed
below, entry into, transiting, or
anchoring within the safety zone is
prohibited unless authorized by the
Captain of the Port Lake Michigan or a
designated representative.
DATES: The regulation in 33 CFR
165.930 will be enforced from 11:30
p.m. on December 31, 2019 through
12:15 a.m. on January 1, 2020.
FOR FURTHER INFORMATION CONTACT: If
you have questions about this notice of
enforcement, call or email LT Tiziana C.
Garner, Waterways Management
Division, Marine Safety Unit Chicago,
U.S. Coast Guard; telephone (630) 986–
2155, email D09-DG-MSUChicagoWaterways@uscg.mil.
SUPPLEMENTARY INFORMATION: The Coast
Guard will enforce a segment of the
Safety Zone; Brandon Road Lock and
Dam to Lake Michigan including Des
Plaines River, Chicago Sanitary and
SUMMARY:
PO 00000
Frm 00013
Fmt 4700
Sfmt 4700
70893
Ship Canal, Chicago River, CalumetSaganashkee Channel on all waters of
the main branch of the Chicago River
600 feet west of the N Orleans Street
Bridge and 1000 feet east of the N
Columbus Street bridge. During the
enforcement period, no vessel may
transit this regulated area without
approval from the Captain of the Port
Lake Michigan or a designated
representative. Vessels and persons
granted permission to enter the safety
zone shall obey all lawful orders or
directions of the Captain of the Port
Lake Michigan, or an on-scene
representative.
This notice of enforcement is issued
under authority of 33 CFR 165.930 and
5 U.S.C. 552(a). In addition to this
notice in the Federal Register, the Coast
Guard will also provide notice through
other means, which will include
Broadcast Notice to Mariners, Local
Notice to Mariners, distribution in
leaflet form, and on-scene oral notice.
The Captain of the Port Lake Michigan
or a designated on-scene representative
may be contacted via Channel 16, VHF–
FM or at (414) 747–7182.
Dated: December 17, 2019.
Thomas J. Stuhlreyer,
Captain, U.S. Coast Guard, Captain of the
Port, Lake Michigan.
[FR Doc. 2019–27625 Filed 12–23–19; 8:45 am]
BILLING CODE 9110–04–P
DEPARTMENT OF HOMELAND
SECURITY
Coast Guard
33 CFR Part 165
[Docket Number USCG–2019–0965]
RIN 1625–AA00
Safety Zone; Straits of Mackinac, MI
Coast Guard, DHS.
Temporary final rule.
AGENCY:
ACTION:
The Coast Guard is
establishing a temporary safety zone in
the Captain of the Port, Sault Sainte
Marie zone in Mackinac City, MI. This
temporary safety zone is necessary to
protect the public and private
contractors from potential hazards
associated with remotely operated
underwater vehicle operations in the
Straits of Mackinac. During the effective
dates of the rule, vessels will not be able
to operate in certain U.S. navigable
waters in the Straits of Mackinac within
500 yards of the Tug Nancy Anne and
Deck Barge MM–142 without
authorization from the Captain of the
Port.
SUMMARY:
E:\FR\FM\26DER1.SGM
26DER1
Agencies
[Federal Register Volume 84, Number 247 (Thursday, December 26, 2019)]
[Rules and Regulations]
[Pages 70887-70893]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-27438]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF STATE
22 CFR Part 120
[Public Notice: 10946]
RIN 1400-AE76
International Traffic in Arms Regulations: Creation of Definition
of Activities That Are Not Exports, Reexports, Retransfers, or
Temporary Imports; Creation of Definition of Access Information;
Revisions to Definitions of Export, Reexport, Retransfer, Temporary
Import, and Release
AGENCY: Department of State.
ACTION: Interim final rule; request for comment.
-----------------------------------------------------------------------
SUMMARY: The Department of State amends the International Traffic in
Arms Regulations (ITAR) to create a definition of ``activities that are
not exports, reexports, retransfers, or temporary imports'' by
combining existing text from the regulations with new text regarding
secured unclassified technical data. The activities included in the new
definition are: Launching items into space, providing technical data to
U.S. persons within the United States or within a single country
abroad, and moving a defense article between the states, possessions,
and territories of the United States. The definition also clarifies
that the electronic transmission and storage of properly secured
unclassified technical data via foreign communications infrastructure
does not constitute an export. Additionally, the Department amends the
ITAR to create a definition of ``access information'' and revise the
definition of ``release'' to address the provision of access
information to an unauthorized foreign person.
DATES: Effective date: This interim final rule is effective on March
25, 2020.
Comments due date: Interested parties may submit comments by
January 27, 2020.
ADDRESSES: Interested parties may submit comments by one of the
following methods:
[[Page 70888]]
Email: [email protected] with the subject line,
``Revisions to Definitions; Data Transmission and Storage''
Internet: At www.regulations.gov, search for this notice
using Docket DOS-2019-0040.
FOR FURTHER INFORMATION CONTACT: Ms. Sarah Heidema, Director, Office of
Defense Trade Controls Policy, Department of State, telephone (202)
663-1282; email [email protected]. ATTN: ITAR Amendment--
Revisions to Definitions; Data Transmission and Storage.
SUPPLEMENTARY INFORMATION: The Directorate of Defense Trade Controls
(DDTC), U.S. Department of State, administers the International Traffic
in Arms Regulations (ITAR) (22 CFR parts 120 through 130). The items
subject to the jurisdiction of the ITAR, i.e., defense articles and
defense services, are identified on the ITAR's U.S. Munitions List
(USML) (22 CFR 121.1). With few exceptions, items not subject to the
export control jurisdiction of the ITAR are subject to the jurisdiction
of the Export Administration Regulations (EAR, 15 CFR parts 730 through
774, which includes the Commerce Control List (CCL) in Supplement No. 1
to part 774), administered by the Bureau of Industry and Security
(BIS), U.S. Department of Commerce. Both the ITAR and the EAR create
license requirements for exports and reexports of controlled items.
Items not subject to the ITAR or to the exclusive licensing
jurisdiction of any other set of regulations are subject to the EAR.
On June 3, 2015, the Department of State published a proposed rule
(80 FR 31525) (2015 proposed rule) and requested comments on an
extensive array of proposed amendments to the ITAR, including the
revision of key definitions, the creation of several new definitions,
and the revision of related provisions. The proposed amendments also
attempted to harmonize these definitions with the EAR to the extent
appropriate. After reviewing the public comments on the 2015 proposed
rule, the Department published an interim final rule on June 3, 2016
(81 FR 35611) (2016 interim final rule), which updated the definitions
of ``export'' and ``reexport or retransfer'' and, in an effort to
clarify and support the interpretation of these definitions, also
created definitions of ``release'' and ``retransfer.'' BIS concurrently
published amendments (BIS companion rule) to definitions, including
``export,'' ``reexport,'' ``release,'' and ``transfer (in-country)'' in
the EAR (81 FR 35586). The Department subsequently reviewed the public
comments on the 2016 interim final rule and published a final rule on
September 8, 2016 (81 FR 62004) (2016 final rule), which revised the
definition of ``retransfer'' and made other clarifying revisions. Not
all of the amendments proposed in the 2015 proposed rule were adopted,
and both the 2016 interim final rule and the 2016 final rule reserved
the remaining amendments for consideration in separate rulemakings.
This interim final rulemaking addresses certain of the remaining
amendments from the 2015 proposed rule, and the Department continues to
reserve the remaining amendments for consideration in separate
rulemakings. Included in this interim final rule is the creation of a
definition for ``activities that are not exports, reexports,
retransfers, or temporary imports'' under a new ITAR Sec. 120.54
(Sec. 120.52 in the 2015 proposed rule). Among other things, this
provision provides that the properly secured (by end-to-end encryption)
electronic transmission or storage of unclassified technical data via
foreign communications infrastructure does not constitute an export,
reexport, retransfer, or temporary import.
The Department recognizes the BIS companion rule addressed these
issues with the creation of EAR Sec. 734.18, and the Department has
received repeated enquiries regarding when a similar rule would be
issued regarding the ITAR. In an effort to align the definition in the
ITAR with the definition in the EAR, the interim final rule described
below is structured similarly to EAR Sec. 734.18. The Department also
recognizes that it has received public comments regarding these
amendments to the ITAR. Where appropriate, those comments are addressed
in the analysis below. In light of the potential impact the amendments
in this rule may have on the regulated community's processes, and the
updated security strength standards described below, the Department
considered it appropriate to provide another opportunity for the public
to submit comments and therefore publishes this rule as an interim
final rule with the opportunity for the public to provide comment.
1. Definition of Activities That Are Not Exports, Reexports,
Retransfers, or Temporary Imports
The Department adds Sec. 120.54 to describe those ``activities
that are not exports, reexports, retransfers, or temporary imports''
and do not require authorization from the Department. For the purpose
of this preamble, the Department will use the term ``controlled event''
to mean an export, reexport, retransfer, or temporary import, all of
which require a DDTC license or other approval.
The first of five provisions in the new Sec. 120.54 states in
paragraph (a)(1) that it is not a controlled event to launch items into
space. This activity is already excluded from the definition of an
export in ITAR Sec. 120.17(a)(6) and by statute, see 51 U.S.C.
50919(f). In an effort to consolidate the different activities that do
not qualify as exports under the ITAR, this provision has been moved to
Sec. 120.54(a)(1), and the language has been simplified.
The second provision states in paragraph (a)(2) that it is not a
controlled event to transmit or otherwise transfer technical data to a
U.S. person within the United States from a person in the United
States. In response to public comments, the updated version of
paragraph (a)(2) provides that a transmission or other transfer between
U.S. persons who are in the United States is unequivocally not a
controlled event. However, any release to a foreign person remains a
controlled event.
The third provision, which was not included in the 2015 proposed
rule but is added here in response to public comments to that proposed
rule, is found in the new paragraph (a)(3). This provision states that
transmissions or other transfers of technical data between and among
only U.S. persons in the same foreign country are similarly not
reexports or retransfers so long as they do not result in a release to
a foreign person or transfer to a person prohibited from receiving the
technical data because that person is otherwise precluded from engaging
in the regulated activity, for example a debarred person.
The fourth provision states in paragraph (a)(4) that it is not a
controlled event to move a defense article between the states,
possessions, and territories of the United States. One commenter
requested that the Department revise paragraph (a)(4) to list
explicitly the Virgin Islands of the United States, Guam, American
Samoa, and the various United States Minor Outlying Islands. The
Department will not make this change because the ITAR already defines
the term ``United States'' in Sec. 120.13, and that definition is
applicable.
The fifth provision states in paragraph (a)(5) that it is not a
controlled event to send, take, or store unclassified technical data
when it is effectively encrypted using end-to-end encryption.
Therefore, a controlled event does not occur when technical data is
encrypted
[[Page 70889]]
prior to leaving the sender's facilities and remains encrypted until
decrypted by the intended authorized recipient or retrieved by the
sender, as in the case of remote storage. The controlled event occurs
upon the release of the technical data. If the technical data is
decrypted by someone other than the sender, a U.S. person in the United
States, or a person otherwise authorized to receive the technical data,
then the technical data is not secured using end-to-end encryption for
purposes of paragraph (a)(5) and the original transmission was a
controlled event.
The encryption must be accomplished in a manner that is certified
by the U.S. National Institute for Standards and Technology (NIST) as
compliant with the Federal Information Processing Standards Publication
140-2 (FIPS 140-2), or must meet or exceed a 128-bit security strength.
At the time of publication of this rule, that criterion is expressed in
``Table 2: Comparable strengths'' of NIST Special Publication 800-57
Part 1, Revision 4. Additionally, the technical data may not be
intentionally sent to a person in or stored in a Sec. 126.1 country or
the Russian Federation, even in its encrypted state. This will allow
for transmissions and storage of encrypted data in most foreign
countries, so long as the technical data remains continuously encrypted
while outside of the United States or until decrypted by an authorized
intended recipient.
In response to public comments regarding the requirement of the
2015 proposed rule that the encryption be via a FIPS 140-2 compliant
module, the Department added language that allows encryption through
means other than FIPS 140-2 compliant modules, so long as it meets or
exceeds a 128-bit security strength. One commenter suggested that the
Department retain only FIPS 140-2 to encourage interoperability between
systems, but the overwhelming number of commenters requested other
encryption modules be allowed. The Department also clarified that
intentional storage in the Russian Federation or a Sec. 126.1 country
constitutes a controlled event. However, incidental collection by a
foreign intelligence service or transient storage that is incidental to
sending information via the internet does not.
Further, in response to public comments, the Department revised
paragraph (b) to clarify the definition of end-to-end encryption. The
cryptographic protection must be applied prior to the data being sent
outside of the originator's security boundary and remain undisturbed
until it arrives within the security boundary of the intended
recipient. For communications between individuals, this can be
accomplished by encrypting the data on the sender's computer prior to
emailing or otherwise sending it to the intended recipient. For large
entities, the security boundary may be managed by IT staff, who will
encrypt the data before it leaves the entity's secure network and
decrypt it on the way into the network. However, in all instances, the
means of decryption must not be provided to any third party and the
data must not have the cryptographic protection removed at any point in
transit.
One commenter suggested that the Department define which modules
under FIPS 140-2 are compliant and which NIST publications are
applicable, in the rule. The Department disagrees with this comment.
Compliance with any of the four levels set out in FIPS 140-2 is
sufficient for the purposes of this section. Exporters are free to
choose the level that best meets their needs. Different NIST
publications are relevant to each standard, so the applicable
publications will depend on the standard used.
One commenter suggested that the Department provide one year from
the issuance of a new NIST standard for implementation. The Department
disagrees with this comment. The NIST standards will be final and
applicable when NIST makes them the standard.
One commenter requested that the Department allow a transition
period so that exporters can implement IT systems compliant with
paragraph (5). The Department disagrees with this comment. Paragraph
(5) creates a mechanism for companies to send and store technical data
outside the United States without engaging in a controlled event. Until
companies implement an IT system that is compliant with paragraph (5),
they may not take advantage of this paragraph, but nothing in paragraph
(5) places any new requirements on exporters, therefore there is no
need for a transition period.
One commenter suggested that the Department revise paragraph (b) to
say ``the means to access the data in unencrypted form is not
`released' to any third party'' rather than ``the means to access the
data in unencrypted form is not given to any third party,'' as
``release'' is a defined term. The Department disagrees with this
comment. The Department did revise this concept in paragraph (b) to
require that ``the means of decryption are not provided to any third
party,'' but the Department chose not to use the word ``released''
because that word has a technical definition that would not be
applicable in this usage.
Several commenters requested that the Department provide a safe
harbor, of sorts, by only requiring that cloud customers obtain
contractual assurances that the data would not be stored in a Sec.
126.1 country or the Russian Federation. The Department disagrees with
this comment. Such a provision would not be in the national security or
foreign policy interests of the United States. The Department
recognizes it can be difficult to control the actions of third parties,
including partners, service providers, and subcontractors, and will
review potential violations on a case-by-case basis, subject to the
totality of the facts and circumstances comprising the issue at hand.
One commenter requested that the Department clarify that
appropriately encrypted transmissions may transit the Russian
Federation or a Sec. 126.1 country and still qualify for this
provision. The Department clarified this point by adding the word
``intentionally,'' to differentiate those electronic transmissions that
were intentionally sent to Russia or a Sec. 126.1 country, and those
that simply transited them in route to another country. The commenter
also provided an example of such a transmission where an email server
is located in the Russian Federation or a Sec. 126.1 country.
Transmission through these destinations is allowed, including temporary
storage incident to internet transmissions, but long-term storage of
the information, such as is commonly done on email servers, is
prohibited in these destinations. Prior to using this provision,
putative exporters should ensure that the intended recipient or any
intended remote storage provider does not store their information in
the Russian Federation or a Sec. 126.1 country.
One commenter requested that the Department provide that emails
between authorized parties in the same country also be included in the
definition of activities that are not exports, reexports, or
retransfers if they happen to transit a third country, even if the
technical data is not encrypted as described in paragraph (5). The
Department notes that transmissions between U.S. persons in the United
States are not exports under paragraph (2), but that with respect to
transmissions in foreign countries, only those communications that
remain in one country between only U.S. persons are excluded under
paragraph (3). If a company in a foreign country is concerned that
emails that include technical data may transit third countries, it
should encrypt those
[[Page 70890]]
communications consistent with paragraph (5).
Several commenters requested that the Department revise the local
definition of end-to-end encryption to allow for information security
mechanisms that render the data into clear text in route to the
intended recipient, for processing via applications, such as anti-virus
software or spell-check. The commenters also note that multiple layers
of encryption may be applied and removed throughout the transit of the
data. The Department disagrees with this comment. Use of paragraph
(a)(5) requires that the technical data subject to the ITAR be
continuously encrypted at all times while outside of an authorized
security boundary. The Department is aware that there are many ways
that this provision can be implemented; some of which would allow an
entity to run anti-virus or other security scans prior to allowing the
data onto its servers. As long as that initial encryption layer remains
intact, the addition or removal of subsequent layers of encryption,
which may or may not meet the FIPS 140-2 standard, is not relevant to
the application of this section.
One commenter requested that the Department include the electronic
storage in the United States and transfer from the United States of
non-U.S. origin technical data by non-U.S. persons within the
activities that are not an export, reexport, or retransfer, even when
not encrypted. The Department disagrees with this comment. Non-U.S.
origin technical data transiting or stored in the United States that is
encrypted in the manner described in paragraph (a)(5) (i.e., it remains
encrypted at all times between originator and recipient, including at
any time while in the United States), does not require authorization
from the Department, unless it originates in or is sent to a country
listed in Sec. 126.1 or the Russian Federation.
One commenter stated that paragraph (a)(5) in this rule does not
authorize the export of technical data in a physical medium and
requested that the Department revise paragraph (a)(5) to allow the
shipment or carriage of technical data in a physical medium that has
been properly encrypted. The Department notes that the comment
mischaracterizes the activity. The movement or storage of controlled
technical data in a properly encrypted state outside of the United
States is not an export as defined in Sec. 120.17(a)(1), the specific
concern raised by the commenter, or a controlled event of any type, and
does not require authorization. The Department notes that paragraph
(a)(5) is not limited to electronic transmissions and the shipment or
carriage of technical data in a physical medium is not a controlled
event, so long as all of the conditions are met.
One commenter requested that the Department expand paragraph (a)(5)
to cover tokenization, as well as encryption. Tokenization is a process
whereby individual elements of a document, be they letters, words,
diagrams, or pictures, are replaced by a representative token. As
described by the commenter, the tokens are assigned randomly and a key
of the document is created. The document may not be returned to the
original text from the tokens without use of the specific key for that
document. This process is different from encryption, in that encryption
uses an algorithm to encode the document, such that representative
characters are assigned according to a mathematical formula that can,
at least theoretically, be deciphered through analysis of the encrypted
text. The Department will not add tokenization. There is no NIST or
other comparable standard that the Department can reference to set a
minimum threshold for implementation of tokenization.
One commenter suggested that the Department encourage other
jurisdictions to adopt a provision similar to paragraph (a)(5) in their
export control systems. The Department agrees, and has already engaged
in discussions with allies regarding paragraph (a)(5).
One commenter requested that the Department add shipping to and
within the territory of an approved end-user as an activity that is not
an export, reexport, or retransfer. The Department disagrees with this
comment. A shipment to the territory of an approved end-user is an
export or reexport that requires authorization. Shipments within the
territory of an authorized end-user will likewise require authorization
if the shipment is to someone other than the authorized end-user or for
activities other than the authorized end-use.
One commenter requested that the Department create a definition of
``basic technical data'' and include the sharing of such information in
this section, analogizing to the sharing of the owner's manual for a
car. The Department disagrees with this comment. The export of
technical data requires authorization from the Department. If the
Department were to define some portion of technical data that does not
warrant control, the Department would revise Sec. 120.6 or Sec.
120.10 to exclude it.
One commenter suggested that the Department include shipments to
military post offices in this section, noting that the National
Industrial Security Program Operating Manual (NISPOM) treats transfers
to military post offices as domestic transfers. The Department
disagrees with this comment. The export of a defense article shipped to
a military post office via the U.S. Postal Service is accomplished by
the U.S. military and therefore may be authorized without a license via
Sec. 126.4 of the ITAR, so long as the other terms and conditions of
that provision are met.
2. Revised Definitions of Export, Reexport, Retransfer, and Temporary
Import
As stated above, the Department moves the language of Sec.
120.17(a)(6), which articulates that it is not an export to launch
items into space, to Sec. 120.52(a)(1), and simplifies the language.
In its place, the Department adds a new Sec. 120.17(a)(6) in order to
include within the definition of export the release through the use of
access information of previously encrypted technical data as described
in Sec. 120.50(a)(3) (to a foreign person, no matter where located)
and (a)(4) (causing the technical data to be in an unencrypted form out
of the United States). The Department added a citation to Sec. 120.54
to Sec. Sec. 120.17(a), 120.18, 120.19(a), and 120.51(a), which define
export, temporary import, reexport, and retransfer, respectively, to
exclude from those definitions activities identified in Sec. 120.54.
In addition, the Department takes this opportunity to revise Sec.
120.17(a) in order to mirror the construction of the other definitions
of controlled activities and lead with the defined term of ``export.''
3. Definition of Access Information
The Department adds new Sec. 120.55 to define ``access
information.'' Access information allows access to encrypted technical
data in an unencrypted form, such as decryption keys, network access
codes, and passwords. An authorization is required to release technical
data through access information to the same extent that an
authorization is required to export the technical data when it is
unsecured by encryption.
Several commenters requested that the Department adopt the
knowledge requirement that was included in the BIS companion rule and
now appears in EAR Sec. 734.19. The Department disagrees with this
comment. As provided in Sec. Sec. 120.50(b) and 120.54(b), an existing
authorization for the release of technical data to the foreign person
must be in
[[Page 70891]]
place prior to the provision of access information to the foreign
person that will allow the transition of the encrypted technical data
to an unencrypted state.
4. Revised Definition of Release
The Department adds two new subparagraphs to paragraph (a) and a
new paragraph (b) to the definition of release in Sec. 120.50 in order
to clarify what constitutes a release of technical data, a controlled
event requiring authorization from the Department, and the provision of
access information that may result in the release of technical data.
Paragraph (a)(3) makes it a release of technical data to use access
information to cause or enable a foreign person to access, view, or
possess technical data in unencrypted form. Paragraph (a)(4) makes it a
release of technical data to use access information in a foreign
country to cause technical data to be in unencrypted form, including
when such actions are taken by U.S. persons abroad. Most U.S. persons
will be authorized to release the technical data abroad to themselves
or over their employer's virtual private network through the exemption
at ITAR Sec. 125.4(b)(9).
The 2015 proposed rule proposed a new paragraph (a)(5) to make it a
release to provide access information to a foreign person that can
cause or enable access, viewing, or possession of technical data in
unencrypted form. It also proposed a Note to paragraph (a) in order to
clarify the license requirement regarding technical data secured by the
access information when a release occurs under the proposed paragraphs
(a)(3), (a)(4), or (a)(5).
In a change from the 2015 proposed rule, the Department now
includes at paragraph (b) language derived from the proposed paragraph
(a)(5) and Note included in that draft. The new paragraph (b) clarifies
that the provision of access information to a foreign person is not
itself a controlled event; there is no need for an application by the
access information provider, or for the Department to issue an
authorization, for the provision of access information. However, in
order for the Department to effectively control the release of
technical data to a foreign person in certain circumstances, paragraph
(b) requires an authorization for a release of technical data to a
foreign person before providing the access information to that foreign
person, if that access information can cause or enable access, viewing,
or possession of the unencrypted technical data. In the absence of an
authorization for the release of technical data in such circumstances,
the provision of access information to a foreign person is a violation
of ITAR Sec. 127.1(b)(1) for failure to abide by a rule or regulation
contained in this subchapter.
Furthermore, causing or enabling a foreign person to access, view,
or possess unencrypted technical data may constitute a separate
violation of ITAR Sec. 127.1(a), if the exporter (or reexporter or
retransferrer) in question has not received prior authorization from
the Department in the form of a license or other authorization (e.g.,
exemption). As stated in ITAR Sec. 120.54(b), in order for the
sending, taking, or storing technical data to meet the requirements of
end-to-end encryption and therefore to constitute an activity that is
not a controlled event under ITAR Sec. 120.54(a)(5), the intended
recipient must be the originator, a U.S. person in the United States,
or otherwise authorized to receive the technical data in an unencrypted
form.
The Department recognizes that the 2015 proposed rule contained
draft language for a new Sec. 127.1(b)(4) that would have listed the
types of controlled events involving the secured unclassified technical
data described in this interim final rule's Sec. 120.54(a)(5). The
Department did not receive any public comments on this proposed
amendment. Nevertheless, once the Department decided to establish a new
definition for ``access information'' in Sec. 120.55 that is distinct
from the definition of technical data in Sec. 121.10, it seemed more
appropriate to include descriptions of the relevant controlled events
under the definition of release in Sec. 120.50 because that provision
was added to the ITAR in order to describe more effectively the
controlled disclosure of information. Moreover, this construction is
analogous to how the EAR defines the term ``access information'' in EAR
Sec. 772.1 and uses that term in Sec. 734.19 to describe controlled
events related to ``activities that are not exports, reexports, or
retransfers'' under Sec. 734.18.
Finally, the Department adds and reserves Sec. Sec. 120.52 and
120.53.
Regulatory Analysis and Notices
Administrative Procedure Act
This rulemaking is exempt from section[thinsp]553 (Rulemaking) and
section[thinsp]554 (Adjudications) of the Administrative Procedure Act
(APA) pursuant to 5 U.S.C. 553(a)(1) as a military or foreign affairs
function of the United States Government. Although the Department is of
the opinion that this interim final rule is exempt from the rulemaking
provisions of the APA, the Department published this rule as a proposed
rule (80 FR 31525) with a 60-day provision for public comment,
published an interim final rule (81 FR 35611) with a 30-day provision
for public comment and three-month delayed effective date for certain
provisions thereof, and now as another interim final rule with a 30-day
provision for public comment and three-month delayed effective date for
the provisions identified herein. Those publications were without
prejudice to the Department's determination that controlling the import
and export of defense services is a foreign affairs function.
Regulatory Flexibility Act
Since the Department is of the opinion that this rulemaking is
exempt from the rulemaking provisions of 5 U.S.C. 553, there is no
requirement for an analysis under the Regulatory Flexibility Act.
Unfunded Mandates Reform Act of 1995
This rulemaking does not involve a mandate that will result in the
expenditure by State, local, and tribal governments, in the aggregate,
or by the private sector, of $100 million or more in any year and it
will not significantly or uniquely affect small governments. Therefore,
no actions were deemed necessary under the provisions of the Unfunded
Mandates Reform Act of 1995.
Small Business Regulatory Enforcement Fairness Act of 1996
For purposes of the Small Business Regulatory Enforcement Fairness
Act of 1996 (the ``Act''), a major rule is a rule that the
Administrator of the OMB Office of Information and Regulatory Affairs
finds has resulted or is likely to result in: (1) An annual effect on
the economy of $100,000,000 or more; (2) a major increase in costs or
prices for consumers, individual industries, federal, state, or local
government agencies, or geographic regions; or (3) significant adverse
effects on competition, employment, investment, productivity,
innovation, or on the ability of United States-based enterprises to
compete with foreign-based enterprises in domestic and foreign markets.
The Department does not believe this rulemaking is a major rule
within the meaning of the Act. The means of solving the issue of data
protection are already both familiar to and extensively used by the
affected public in protecting sensitive information.
[[Page 70892]]
Executive Orders 12372 and 13132
This rulemaking will not have substantial direct effects on the
States, on the relationship between the national government and the
States, or on the distribution of power and responsibilities among the
various levels of government. Therefore, in accordance with Executive
Order 13132, it is determined that this rulemaking does not have
sufficient federalism implications to require consultations or warrant
the preparation of a federalism summary impact statement. The
regulations implementing Executive Order 12372 regarding
intergovernmental consultation on Federal programs and activities do
not apply to this rulemaking.
Executive Orders 12866 and 13563
Executive Orders 12866 and 13563 direct agencies to assess costs
and benefits of available regulatory alternatives and, if regulation is
necessary, to select regulatory approaches that maximize net benefits
(including potential economic, environmental, public health and safety
effects, distributed impacts, and equity). The executive orders stress
the importance of quantifying both costs and benefits, of reducing
costs, of harmonizing rules, and of promoting flexibility. This
rulemaking has been designated a ``significant regulatory action,''
although not economically significant, under section 3(f) of Executive
Order 12866. Accordingly, the rulemaking has been reviewed by the
Office of Management and Budget (OMB).
Executive Order 12988
The Department has reviewed the rulemaking in light of sections
3(a) and 3(b)(2) of Executive Order 12988 to eliminate ambiguity,
minimize litigation, establish clear legal standards, and reduce
burden.
Executive Order 13175
The Department has determined that this rulemaking will not have
tribal implications, will not impose substantial direct compliance
costs on Indian tribal governments, and will not preempt tribal law.
Accordingly, Executive Order 13175 does not apply to this rulemaking.
Executive Order 13771
This final rule is not subject to the requirements of Executive
Order 13771 because it is issued with respect to a military or foreign
affairs function of the United States.
Paperwork Reduction Act
This rulemaking does not impose any new reporting or recordkeeping
requirements subject to the Paperwork Reduction Act, 44 U.S.C. Chapter
35; however, the Department seeks public comment on any unforeseen
potential for increased burden.
List of Subjects in 22 CFR 120
Arms and munitions, Classified information, Exports.
Accordingly, for the reasons set forth above, title 22, chapter I,
subchapter M, part 120 of the Code of Federal Regulations is amended as
follows:
PART 120--PURPOSE AND DEFINITIONS
0
1. The authority citation for part 120 continues to read as follows:
Authority: Secs. 2, 38, and 71, Pub. L. 90-629, 90 Stat. 744
(22 U.S.C. 2752, 2778, 2797); 22 U.S.C. 2794; 22 U.S.C. 2651a; Pub.
L. 105-261, 112 Stat. 1920; Pub. L. 111-266; Section 1261, Pub. L.
112-239; E.O. 13637, 78 FR 16129.
0
2. Section 120.17 is amended by revising paragraphs (a) introductory
text and (a)(6) to read as follows:
Sec. 120.17 Export.
(a) Export, except as set forth in Sec. 120.54, Sec. 126.16, or
Sec. 126.17, means:
* * * * *
(6) The release of previously encrypted technical data as described
in Sec. 120.50(a)(3) and (4) of this subchapter.
* * * * *
0
3. Section 120.18 is revised to read as follows:
Sec. 120.18 Temporary import.
Temporary import, except as set forth in Sec. 120.54, means
bringing into the United States from a foreign country any defense
article that is to be returned to the country from which it was shipped
or taken, or any defense article that is in transit to another foreign
destination. Temporary import includes withdrawal of a defense article
from a customs bonded warehouse or foreign trade zone for the purpose
of returning it to the country of origin or country from which it was
shipped or for shipment to another foreign destination. Permanent
imports are regulated by the Attorney General under the direction of
the Department of Justice's Bureau of Alcohol, Tobacco, Firearms, and
Explosives (see 27 CFR parts 447, 478, 479, and 555).
0
4. Section 120.19 is amended by revising paragraph (a) introductory
text to read as follows:
Sec. 120.19 Reexport.
(a) Reexport, except as set forth in Sec. 120.54, Sec. 126.16, or
Sec. 126.17, means:
* * * * *
0
5. Section 120.50 is amended as follows:
0
a. By removing the word ``or'' at the end of paragraph (a)(1);
0
b. By removing the period and adding in its place a semi-colon at the
end of paragraph (a)(2); and
0
c. By adding paragraphs (a)(3) and (4) and (b).
The additions read as follows:
Sec. 120.50 Release.
(a) * * *
(3) The use of access information to cause or enable a foreign
person, including yourself, to access, view, or possess unencrypted
technical data; or
(4) The use of access information to cause technical data outside
of the United States to be in unencrypted form.
(b) Authorization for a release of technical data to a foreign
person is required to provide access information to that foreign
person, if that access information can cause or enable access, viewing,
or possession of the unencrypted technical data.
0
6. Section 120.51 is amended by revising paragraph (a) introductory
text to read as follows:
Sec. 120.51 Retransfer.
(a) Retransfer, except as set forth in Sec. 120.54, Sec. 126.16,
or Sec. 126.17, means:
* * * * *
Sec. 120.52 [Reserved]
0
7. Add reserved Sec. 120.52.
Sec. 120.53 [Reserved]
0
8. Add reserved Sec. 120.53.
0
9. Section 120.54 is added to read as follows:
Sec. 120.54 Activities that are not exports, reexports, retransfers,
or temporary imports.
(a) The following activities are not exports, reexports,
retransfers, or temporary imports:
(1) Launching a spacecraft, launch vehicle, payload, or other item
into space.
(2) Transmitting or otherwise transferring technical data to a U.S.
person in the United States from a person in the United States.
(3) Transmitting or otherwise transferring within the same foreign
country technical data between or among only U.S. persons, so long as
the transmission or transfer does not result in a release to a foreign
person or
[[Page 70893]]
transfer to a person prohibited from receiving the technical data.
(4) Shipping, moving, or transferring defense articles between or
among the United States as defined in Sec. 120.13 of this subchapter.
(5) Sending, taking, or storing technical data that is:
(i) Unclassified;
(ii) Secured using end-to-end encryption;
(iii) Secured using cryptographic modules (hardware or software)
compliant with the Federal Information Processing Standards Publication
140-2 (FIPS 140-2) or its successors, supplemented by software
implementation, cryptographic key management, and other procedures and
controls that are in accordance with guidance provided in current U.S.
National Institute for Standards and Technology (NIST) publications, or
by other cryptographic means that provide security strength that is at
least comparable to the minimum 128 bits of security strength achieved
by the Advanced Encryption Standard (AES-128);
(iv) Not intentionally sent to a person in or stored in a country
proscribed in Sec. 126.1 of this subchapter or the Russian Federation;
and
Note to paragraph (a)(5)(iv): Data in-transit via the internet
is not deemed to be stored.
(v) Not sent from a country proscribed in Sec. 126.1 of this
subchapter or the Russian Federation.
(b)(1) For purposes of this section, end-to-end encryption is
defined as:
(i) The provision of cryptographic protection of data, such that
the data is not in an unencrypted form, between an originator (or the
originator's in-country security boundary) and an intended recipient
(or the recipient's in-country security boundary); and
(ii) The means of decryption are not provided to any third party.
(2) The originator and the intended recipient may be the same
person. The intended recipient must be the originator, a U.S. person in
the United States, or a person otherwise authorized to receive the
technical data, such as by a license or other approval pursuant to this
subchapter.
(c) The ability to access technical data in encrypted form that
satisfies the criteria set forth in paragraph (a)(5) of this section
does not constitute the release or export of such technical data.
0
9. Section 120.55 is added to read as follows:
Sec. 120.55 Access Information.
Access information is information that allows access to encrypted
technical data subject to this subchapter in an unencrypted form.
Examples include decryption keys, network access codes, and passwords.
Christopher A. Ford,
Assistant Secretary, International Security and Nonproliferation, U.S.
Department of State.
[FR Doc. 2019-27438 Filed 12-23-19; 8:45 am]
BILLING CODE 4710-25-P