[Federal Register: December 13, 1996 (Volume 61, Number 241)] [Rules and Regulations] [Page 65642-65467] From the Federal Register Online via GPO Access [wais.access.gpo.gov] ======================================================================= ----------------------------------------------------------------------- DEPARTMENT OF COMMERCE Bureau of Export Administration 15 CFR Parts 734, 740, 742, 762 and 774 [Docket No. 960918265-6296-02] RIN 0694-AB09 Licensing of Key Escrow Encryption Equipment and Software AGENCY: Bureau of Export Administration, Commerce. ACTION: Interim final rule. ----------------------------------------------------------------------- This interim final rule amends the Export Administration Regulations (EAR) by imposing national security controls on Key escrow information security (encryption) equipment and software transferred from the U.S. Munitions List to the Commerce Control List following a commodity jurisdiction determination by the Department of State. This interim final rule also amends the EAR to exclude key escrow items from the de minimis provisions for items exported from abroad and to exclude key escrow encryption software from mass market eligibility. Further, key escrow encryption software is subject to the EAR even when made publicly available. DATES: Effective date. This rule is effective December 13, 1996. Comment date: Comments, should be submitted on or before January 13, 1997. ADDRESSES: Written comments should be sent to Nancy Crowe, Regulatory Policy Division, Office of Exporter Services, Bureau of Export Administration, Room 2705, 14th Street and Pennsylvania Avenue, N.W., Washington, D.C. 20230. FOR FURTHER INFORMATION CONTACT: James A. Lewis, Office of Strategic Trade and Foreign Policy Controls, Telephone (202) 482-0092. SUPPLEMENTARY INFORMATION: Background In August 1995 the United States decided to ease export licensing requirements for key escrow encryption software products. As part of this decision to allow the export of these products, draft criteria were developed for key escrow products and for key holders. Products that conform to these criteria will be considered for transfer from the U.S. Munitions List to the Commerce Control List following a case-by- case determination by the Department of State through the commodity jurisdiction procedures. Once transferred, key escrow encryption items will be controlled for national security reasons. A license will be required from the Department of Commerce to all destinations, except Canada. This is an initial step in liberalizing the treatment of encryption exports. The Bureau of Export Administration is preparing regulations to further implement the Administration's encryption policies, which will be published in the Federal Register in the near future. These further measures are based upon the Administration's October 1, 1996 announcement of plans to make it easier for Americans to use stronger encryption products to protect their privacy, intellectual property and other valuable information, and the November 15, 1996, Presidential Memorandum and Executive Order 13026 (15 November 1996, 61 FR 58767) (Memorandum) directing that all encryption items controlled on the U.S. Munitions List, except those specifically designed, developed, configured, adapted, or modified for military applications, be transferred to the Commerce Control List. The plan to make it easier for Americans to use stronger encryption products to protect their privacy, intellectual property and other valuable information envisions a worldwide key management infrastructure with the use of key recovery and key escrow encryption items to promote electronic commerce [[Page 65463]] and secure communications while protecting national security and public safety. The Memorandum sets forth certain additional provisions with respect to controls on such encryption items to be imposed by the Department of Commerce. The Executive Order also provides for appropriate controls on the export and foreign dissemination of encryption items controlled on the U.S. Munitions List that are placed on the Commerce Control List. This interim final rule amends that EAR to reflect the new licensing policy for key escrow encryption items. The Bureau of Export Administration will accept license applications for the export and reexport of key escrow encryption items in unlimited quantities for all destinations except to embargoed destinations and destinations the Secretary of State has determined to support international terrorism. Such applications will receive favorable consideration provided that, prior to the export or reexport, a key holder satisfactory to the Department of Commerce has been identified (see new Supplement No. 5 part 742) and procedures for safeguarding the key as described in a Supplement No. 5 to part 742 are established to the satisfaction of the Department of Commerce and are maintained after export or reexport as required by the EAR and any license conditions. In addition, the key escrow system must meet the criteria identified in a new Supplement No. 4 to part 742. This interim final rule also amends part 734 of the EAR to reflect that key escrow encryption software will be subject to the EAR even when made publicly available, and to exclude key escrow encryption software and items from the de minimis provision for items. Further, this interim final rule amends part 740 of the EAR to exclude key escrow encryption software from the mass market provisions of License Exception TSU, and amends part 762 of the EAR to clarify the additional records that must be kept for compliance with the recordkeeping provisions of the EAR. Finally, this interim final rule also amends Supplement No. 1 to part 774 (the Commerce Control List) by clarifying that once transferred from the U.S. Munitions List (USML) to the Commerce Control List (CCL) following a case-by-case determination by the Department of State through the commodity jurisdiction procedures, key escrow encryption items and software are controlled on the CCL under Export Control Classification Numbers 5A002.a and 5D002.c.1 respectively. This rule involves no new curtailment of exports, because the transfer or removal of items from the United States Munitions List to the CCL maintains a continuity of controls. Therefore, the provisions regarding the impact of new controls do not apply, and contract sanctity also does not apply to this imposition of controls. Although the Export Administration Act (EAA) expired on August 20, 1994, the President invoked the International Emergency Economic Powers Act and continued in effect, to the extent permitted by law, the provisions of the EAA and the EAR in Executive Order 12924 of August 19, 1994, notice of August 15, 1995 (60 FR 42767), and notice of August 14, 1996 (60 FR 42527). 1. This interim final rule has been determined to be significant for purposes of E.O. 12866. 2. Notwithstanding any other provision of the law, no person is required to respond to, nor shall any person be subject to a penalty for failure to comply with a collection of information, subject to the requirements of the Paperwork Reduction Act, unless that collection of information displays a currently valid OMB Control Number. This rule involves collections of information subject to the Paper work Reduction Act of 1980 (44 U.S.C. 3501 et seq.). These collections have been approved by the Office of Management and Budget under control number 0694-0088. 3. This rule does not contain policies with Federalism implications sufficient to warrant preparation of a Federalism assessment under Executive Order 12612. 4. The provisions of the Administrative Procedure Act (5 U.S.C. 553) requiring notice of proposed rulemaking, the opportunity for public participation, and a delay in effective date, are inapplicable because this regulation involves a military and foreign affairs functions of the United States (Sec. 5 U.S.C. 553(a)(1)). Further, no other law requires that a notice of proposed rulemaking and an opportunity for public comment be given for this interim final rule. Because a notice of proposed rulemaking and an opportunity for public comment are not required to be given for this rule under 5 U.S.C. or by any other law, the requirements of the Regulatory Flexibility Act (5 U.S.C 601 et seq.) are not applicable. However, because of the importance of the issues raised by these regulations, this rule is issued in interim final form and comments will be considered in the development of final regulations. Accordingly, the Department encourages interested persons who wish to comment to do so at the earliest possible time to permit the fullest consideration of their views. The period for submission of comments will close January 13, 1997. The Department will consider all comments received before the close of the comment period in developing final regulations. Comments received after the end of the comment period will be considered if possible, but their consideration cannot be assured. The Department will not accept public comments accompanied by a request that a part or all of the material be treated confidentially because of its business proprietary nature or for any other reason. The Department will return such comments and materials to the person submitting the comments and will not consider them in the development of final regulations. All public comments on these regulations will be a matter of public record and will be available for public inspection and copying. In the interest of accuracy and completeness, the Department requires comments in written form. Oral comments must be followed by written memoranda, which will also be a matter of public record and will be available for public review and copying. Communications from agencies of the United States Government or foreign governments will not be made available for public inspection. The public record concerning these regulations will be maintained in the Bureau of Export Administration, Freedom of Information Records Inspection Facility, Room 4525, Department of Commerce, 14th Street and Pennsylvania Avenue, N.W., Washington, DC 20230. Records in this facility, including written public comments and memoranda summarizing the substance of oral communications, may be inspected and copied in accordance with regulations published in Part 4 of Title 15 of the Code of Federal Regulations. Information about the inspection and copying of records at the facility may be obtained from Margaret Cornejo, Bureau of Export Administration, Freedom of Information Officer, at the above address or by calling (202) 482-5653. List of Subjects 15 CFR Part 734 Administrative practice and procedure, Exports, Foreign trade. 15 CFR Part 740 Administration practice and procedure, Exports, Foreign trade, Reporting and recordkeeping requirements. [[Page 65464]] 15 CFR Parts 742 and 774 Exports, Foreign trade. 15 CFR Part 762 Administrative practice and procedure, Business and industry, Confidential business information, Export, Foreign trade, Reporting and recordkeeping requirements. Accordingly, parts 734, 740, 742, 762 and 774 of the Export Administration Regulations (15 CFR Parts 730-799) are amended as follows: 1. The authority citation for 15 CFR part 734 continues to read as follows: Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; E.O. 12924, 59 FR 43437, 3 CFR, 1994 Comp., p. 917; E.O. 12938, 59 FR 59099, 3 CFR, 1994 Comp., p. 950; Executive Order 13026 (November 15, 1996, 61 FR 58767); Notice of August 15, 1995 (60 FR 42767, August 17, 1995); and Notice of August 14, 1996 (61 FR 42527). 2. The authority citation for 15 CFR part 740 continues to read as follows: Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; E.O. 12924, 59 FR 43437, 3 CFR, 1994 Comp., p. 917; Executive Order 13026 (November 15, 1996, 61 FR 58767); Notice of August 15, 1995 (60 FR 42767, August 17, 1995); and Notice of August 14, 1996 (61 FR 42527). 3. The authority citation for 15 CFR part 742 continues to read as follows: Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 18 U.S.C. 2510 et seq.; 22 U.S.C. 3201 et seq.; 42 U.S.C. 2139a; E.O. 12058, 43 FR 20947, 3 CFR, 1978 Comp., p. 179; E.O. 12851, 58 FR 33181, 3 CFR, 1993 Comp., p. 608; E.O. 12924, 59 FR 43437, 3 CFR, 1994 Comp., p. 917; E.O. 12938, 59 FR 59099, 3 CFR, 1994 Comp., p. 950; Executive Order 13026 (November 15, 1996, 61 FR 48767); Notice of August 15, 1995 (60 FR 42767, August 17, 1995); and Notice of August 14, 1996 (61 FR 42527). 4. The authority citation for 15 CFR part 762 continues to read as follows: Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; E.O. 12924, 59 FR 43427, 3 CFR, 1994 Comp., p. 917; Executive Order 13026 (November 15, 1996, 61 FR 58767); Notice of August 15, 1995 (60 FR 42767, August 17, 1995); and Notice of August 14, 1996 (61 FR 42527). 5. The authority citation for 15 CFR part 774 continues to read as follows: Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 10 U.S.C. 7420; 10 U.S.C. 7430(e); 18 U.S.C. 2510 et seq.; 22 U.S.C. 287c; 22 U.S.C. 3201 et seq.; 22 U.S.C. 6004; Sec. 201, Pub. L. 104- 58, 109 Stat. 557 (30 U.S.C. 185(s)); 30 U.S.C. 185(u); 42 U.S.C. 2139a; 42 U.S.C. 6212; 43 U.S.C. 1354; 46 U.S.C. app. 466c; 50 U.S.C. app. 5; E.O. 12924, 59 FR 43437, 3 CFR, 1994 Comp., p. 917; Executive Order 13026 (November 15, 1996, 61 FR 58767); Notice of August 15, 1995 (60 FR 42767, August 17, 1995); and Notice of August 14, 1996 (61 FR 42527). PART 834--[AMENDED] 6. Section 734.3 is amended by redesignating paragraphs (b)(3)(i) through (b)(3)(iv) as paragraphs (b)(3)(i)(A) through (b)(3)(i)(D), and adding a new paragraph (b)(3)(ii) to read as follows: Sec. 734.3 Items subject to the EAR. * * * * * (b) * * * (3) * * * (ii) Key escrow encryption software controlled under ECCN 5D002.c.1 remains subject to the EAR even when made publicly available (see Supplement No. 1 to part 774 of the EAR). * * * * * 7. Section 734.4 is amended by revising paragraph (b) and revising paragraph (h) to read as follows: Sec. 734.4 De minimis U.S. content. * * * * * (b) There is no de minimis level for the reexport of foreign- origin items that incorporate the following: (1) Items controlled by ECCN 9A004.a; or (2) Key escrow encryption software controlled under ECCN 5D002.c.1 or equipment designed or modified to use key escrow encryption items controlled under ECCN 5A002.a. transferred from the U.S. Munitions List following a case-by-case determination by the Department of State through the commodity jurisdiction procedure. * * * * * (h) Notwithstanding the provisions of paragraphs (c) and (d) of this section, U.S.-origin technology controlled by ECCN 9E003a.1 through a.12, and .f, and related controls, and key escrow encryption software controlled under ECCN 5D002.c.1 do not lose their U.S.-origin when redrawn, used, consulted, or otherwise commingled abroad in any respect with other software or technology of any other origin. Therefore, any subsequent or similar software or technology prepared or engineered abroad for the design, construction, operation, or maintenance of any plant or equipment, or part thereof, which is based on or uses any such U.S.-origin software or technology is subject to the EAR. 8. Section 734.7 is amended by revising paragraph (b) to read as follows: Sec. 734.7 Published information and software. * * * * * (b) Software and information is published when it is available for general distribution either for free or at a price that does not exceed the cost of reproduction and distribution. See Supplement No. 1 to this part, Questions G(1) through G(3). Note that key escrow encryption software controlled under ECCN 5D002.c.1 remains subject to the EAR even when made publicly available (see Supplement No. 1 to part 774 of the EAR). PART 740--[AMENDED] 9. Section 740.12 is amended by redesignating paragraph (d)(2) as paragraph (d)(3) and adding a new paragraph (d)(2) to read as follows: Sec. 740.12 Technology and software--unrestricted (TSU). * * * * * (d) * * * (2) Software not eligible for this License Exception. This License Exception is not available for key escrow encryption software controlled by ECCN 5D002.c.1. * * * * * PART 742--[AMENDED] 10. Part 742 is amended by adding a new Sec. 742.15, and new Supplements 4 and 5 to read as follows: Sec. 742.15 Key escrow encryption items. (a) License requirements. Licenses are required for all destinations, except Canada, for key escrow encryption software controlled under ECCN 5D002.c.1; and equipment designed or modified to use key escrow encryption items controlled under ECCN 5A002.a (b) Licensing policy. BXA will accept license applications for the export and reexport of key escrow encryption software controlled by ECCN 5D002.c.1 and equipment designed or modified to use key escrow encryption software controlled by ECCN 5A002.a in unlimited quantities for all destinations except Country Groups E:1 and E:2 (see Supplement No. 1 to part 742), Iran, Syria, and Sudan. Such applications will receive favorable consideration provided that, prior to the export or reexport, keys are escrowed with a key holder satisfactory to the Department of Commerce (see Supplement No. 5 to this part) and procedures for safeguarding the key as described in Supplement No. 5 to this part are established to the satisfaction of the Department of Commerce and are maintained after export or reexport as required by the EAR and any license conditions. In addition, the key escrow system must meet the criteria identified in Supplement No. 4 to this part. This includes a legally binding arrangement [[Page 65465]] between the exporter or reexporter and the key holder, satisfactory to BXA, which ensures that appropriate key escrow safeguard procedures will be carried out by the key holder. If the exporter or reexporter intends to be the key holder, then the exporter or reexporter must meet all of the requirements of a key holder. Continuing compliance by the key holder with the key safeguard procedures shall be made a condition of any license issued. Because BXA will be relying on representations and undertakings of the key holder to make decisions on license applications, the key holder is required to comply with all applicable record requirements in the EAR, including the record retention requirements. In addition, the key holder shall be required to carry out the key holding obligations as approved by BXA, and any violation of any of the key holding obligations shall also constitute a violation of the EAR. Applicants should list in their license applications those countries for which they seek approval to export or reexport, or identify that you seek export or reexport to all destinations except Country Groups E:1 and E:2, Iran, Syria, and Sudan. (c) Contract sanctity. Contract sanctity provisions are not available for license applications reviewed under this section. (d) [Reserved] * * * * * Supplement No. 4 to Part 742--Key Criteria Key Recovery Feature (1) The key(s) required to decrypt the product's key escrow cryptographic functions ciphertext shall be accessible through a key escrow feature. (2) The product's key escrow cryptographic functions shall be inoperable until the key is or the keys are escrowed in accordance with the criteria identified in Supplement 5 to this part. (3) The product's key escrow cryptographic functions ciphertext shall contain, in an accessible format and with a reasonable frequency, the identity of the key escrow holder(s) and information sufficient for the recovery holder(s) to identify the keys required to decrypt the ciphertext. (4) The product's key escrow feature shall allow access to the key(s) needed to decrypt the product's ciphertext regardless of whether the product generated or received the ciphertext. (5) The product's key escrow feature shall allow for the recovery of multiple decryption keys during the period of authorized access without requiring repeated presentations of access authorization to the key escrow holder(s). Key Length Feature (6) The product's key escrow functions shall use an unclassified encryption algorithm. Interoperability Feature (7) The product's cryptographic functions shall interoperate only with other key escrow products that meet these criteria, and shall not interoperate with products whose key escrow feature has been altered, bypassed, disabled, or otherwise rendered inoperative. Key escrow products shall interoperate with non-key escrow products only when the key escrow product permits access to the keys or other escrowed material/information needed to decrypt ciphertext generated or received by the key escrow product. Design, Implementation and Operational Assurance (8) The product shall be resistant to efforts to disable or circumvent the attributes described in criteria one through seven. Supplement No. 5 to Part 742-Key Holder Requirements; Safeguard Procedures; Key Escrow Procedures This Supplement sets forth criteria that BXA, in consultation with other departments and agencies, will use to approve key holders to support approval of the export or reexport of key escrow encryption items controlled by ECCNs 5A002.a and 5D002.c.1. Any arrangements between the exporter or reexporter and the key holder reflects the provisions contained in this Supplement in a manner satisfactory to BXA. This Supplement also outlines the criteria for employing key holder personnel and key escrow procedures. An applicant for a license to export or reexport key escrow encryption items shall provide, or cause the proposed key holder to provide, to BXA sufficient information concerning any proposed key holder arrangements permit BXA to evaluate the key holder's safeguard procedures, suitability and trustworthiness to maintain the confidentiality of the key and key components, and its key escrow procedures. The key holder may be the applicant for the export or reexport license or another party legally obligated to the applicant to provide recovery services, as approved by BXA. BXA retains the right, in addition to any other remedies, to revoke export or reexport licenses if a key holder no longer meets these criteria. The safeguard procedures, procedures related to the key holder's suitability and trustworthiness, and key escrow procedures of the key holder generally shall be made terms and conditions of the export or reexport license for key escrow encryption software if granted. BXA may require the key holder to provide a representation that it will comply with such terms and conditions. (a) Key holder requirements. (1) To become a qualified key holder, the key holder's personnel involved in the recovery of keys with access to escrowed keys or key escrow access request information, or in responding to key escrow requests, and persons in control of the key holder with access or authority to obtain access to keys or key components must be suitable and trustworthy as determined by the Bureau of Export Administration prior to export or reexport of the recovery product, and BXA may evaluate and determine the suitability and trustworthiness of such personnel thereafter from time to time. Evidence of an individual's suitability and trustworthiness could include: (i) Information indicating the individual(s); (A) Have no felony convictions or pending felony charges; (B) Are not currently serving a term of probation; (C) Have satisfactorily performed any positions of a fiduciary nature, for example have had no violations of surety or performance bonds; and (D) Have favorable results of criminal background and credit checks; or (ii) Have an active U.S. government security clearance of secret or higher issued or updated within the last five years. (2) Suitable evidence of the key holder's corporate viability and financial responsibility (e.g. a certificate of good standing from the state of incorporation, credit reports, and errors/ omissions insurance) must be submitted with an application to export or reexport key escrow item. (3) Key holder operating procedures shall provide for the designation of individual(s) to be responsible as security and operations officers. (4) Upon the request of BXA, key holders shall provide to BXA information concerning compliance with or violations of federal, state, and local laws and regulations determined by BXA to be relevant to the evaluation of trustworthiness of the key holders, its personnel, and persons in control of the key holder. (5) Policies and procedures shall be designed and implemented to preclude disclosure of keys or key components to additional persons in control not previously authorized by BXA. For purposes of these criteria in this Supplement No. 5, a person in control is each of the following: (i) A person with the power, direct or indirect, whether exercised or not exercised, and whether or not exercisable, through the ownership of the key holder's securities, by contractual arrangements or other means, to direct or decide matters affecting the management or operations of the key holder in a manner which may result in the unauthorized disclosure of a key or key component or a breach of the terms and conditions of an export or reexport license; (ii) A person with ownership or beneficial ownership, direct or indirect, of 5 percent or more of the key holder's voting securities; (iii) A person with ownership or beneficial ownership, direct or indirect, of 25 percent or more of the key holder's non-voting securities; (iv) Management positions, such as directors, officers, or executive personnel of the key holder held by non U.S. citizens; (v) A person with the power, direct or indirect, to control the election, appointment, or tenure of directors, officers, or executive personnel of the key holder; or (vi) A person with a contract, agreement, understanding, or arrangement to manage the key holder. [[Page 65466]] (b) Safeguard procedures. (1) Key holders must implement safeguard procedures that assure the confidentiality, integrity, and availability of the key to key escrow encryption software or key products. (i) Procedures to assure the confidentiality of this information may include: (A) Encrypting all keys or key components while in storage, transmission, or transfer; or (B) Applying reasonable measures to limit access to the recovery database (e.g. using keyed or combination locks on the entrances to recovery facilities and limiting the personnel with knowledge of or access to the keys/combinations). (ii) Procedures to assure the integrity of the recovery database (i.e. assuring the recovered key/key components are protected against unauthorized changes) may include the use of access controls based on an appropriate use of database password controls, digital signatures, system auditing, and physical access restrictions. (iii) Procedures to assure the availability of the recovery database (i.e. assuring recovered keys/key components are retrievable at any time) may include system redundance, physical security, and the use of cryptography to control access. (2) Policies and procedures shall be designed and implemented so that a failure by a single person, procedures, or mechanism does not compromise key or key component confidentiality, integrity and availability. Such measures could include two person control of access to recoverable keys, split keys, and back-up capabilities. (3) Key holders shall implement policies that protect against unauthorized disclosure of information regarding the identity of owners or end users of encryption products whose keys are recoverable, the fact that a key or key component was requested or provided, and the identity of a requester. Procedures to assure the confidentiality of this information could include those described in paragraph (a)(1)(i). (4) Policies and procedures shall be designed and implemented to provide notice to BXA of a compromise of the confidentiality of a key or key component, or other safeguards. (c) Key escrow procedures. (1) In the event the key holder dissolves or otherwise terminates recovery operations, or if BXA determines that there is a risk of such dissolution or termination, or if BXA determines the key holder is no longer suitable or trustworthy, then the key holder must transfer all of its recovery equipment and recovered information to another key holder that is approved by the Bureau of Export Administration. (2) Key holders will maintain the ability to make the key available in accordance with appropriate State and Federal legal authority until notified otherwise by BXA. Key holders shall make requested keys and key components available, to the extent required by the request, within two hours from the time they receive a request from a government agency acting under appropriate legal authority that requires or compels the key holder to produce the key or key components. The requesting government agency will be responsible for obtaining the keys or key components from the key holder. (3) Key holders shall enter keys and key components into the recovery data base upon receipt of new or replacement keys and key components. (4) Key holders must agree to maintain data regarding key requests received, keys and key components released, database changes, system administration access, dates of such events, etc., for purposes of audits by BXA. PART 762--[AMENDED] 11. Section 762.2 is amended by redesignating paragraphs (b)(6) through (b)(35) as paragraphs (b)(7) through (b)(36) and adding a new paragraph (b)(6) to read as follows: Sec. 762.2 Records to be retained. * * * * * (b) * * * (6) Section 742.15; * * * * * PART 774--[AMENDED] 12. In Supplement No. 1 to part 774 (the Commerce Control List), Category 5 (Telecommunications and Information Security), II. Information Security, ECCNs 5A002 and 5D002 are revised to read as follows: Supplement No. 1 to Part 774--The Commerce Control List * * * * * II. Information Security * * * * * 5A002 Systems, equipment, application specific ``electronic assemblies'', modules or integrated circuits for ``information security'', and specially designed components therefor. License Requirements Reason for Control: NS, AT, EI ------------------------------------------------------------------------ Control(s) Country chart ------------------------------------------------------------------------ NS applies to entire entry............. NS Column 1. AT applies to entire entry............. AT Column 1. ------------------------------------------------------------------------ License Exceptions LVS: N/A GBS: N/A CIV: CPSC List of Items Controlled Unit: value Related Controls: N/A RElated Definitions: N/A Items: a. Designed or modified to use ``cryptography'' employing digital techniques to ensure ``information security''; Note: 5A002.a includes controls key escrow encryption items transferred from the U.S. Munitions List following a case-by-case determination by the Department of State through the commodity jurisdiction procedure. (See Sec. 742.15 of the EAR) b. Designed or modified to perform cryptoanalytic functions; c. Designed or modified to use ``cryptography'' employing analog techniques to ensure ``information security''; Note: 5A002.c does not control the following: 1. Equipment using ``fixed'' band scrambling not exceeding 8 bands and in which the transpositions change not more frequently than once every second; 2. Equipment using ``fixed'' band scrambling exceeding 8 bands and in which the transpositions change not more frequently than once every ten seconds; 3. Equipment using ``fixed'' frequency inversion and in which the transpositions change not more frequently than once every second; 4. Facsimile equipment; 5. Restricted audience broadcast equipment; and 6. Civil television equipment. d. Designed or modified to suppress the compromising emanations of information-bearing signals; Note: 5A002.d does not control equipment specially designed to suppress emanations for reasons of health and safety. e. Designed or modified to use cryptographic techniques to generate the spreading code for ``spread spectrum'' or hopping code for ``frequency agility'' systems; f. Designed or modified to provide certified or certifiable ``multilevel security'' or user isolation at a level exceeding Class Be of the Trusted Computer System Evaluation Criteria (TCSEC) or equivalent; g. Communications cable systems designed or modified using mechanical, electrical or electronic means to detect surreptitious intrusion. Note: 5A002 does not control: a. ``Personalized smart cards'' or specially designed components therefor, with any of the following characteristics: 1. Not capable of message traffic encryption or encryption of user-supplied data or related key management functions therefor; or 2. When restricted for use in equipment or systems excluded from control under the note to 5A002.c, or under paragraphs b through h of this note. b. Equipment containing ``fixed'' data compression or coding techniques; c. Receiving equipment for radio broadcast, pay television or similar restricted audience television of the consumer type, without digital encryption and where digital decryption is limited to the video, audio or management functions; d. Portable or mobile radiotelephones for civil use (e.g., for use with commercial civil cellular radiocommunications systems) that are not capable of end-of-end encryption; [[Page 65467]] e. Decryption functions specially designed to allow the execution of copy-protected ``software'', provided the decryption functions are not user-accessible; f. Access control equipment, such as automatic teller machines, self-service statement printers or point of sale terminals, that protects password or personal identification numbers (PIN) or similar data to prevent unauthorized access to facilities but does not allow for encryption of files or text, except as directly related to the password or PIN protection; g. Data authentication equipment that calculates a Message Authentication Code (MAC) or similar result to ensure no alteration of text has taken place, or to authenticate users, but does not allow for encryption of data, text or other media other than that needed for the authentication; h. Cryptographic equipment specially designed and limited for use in machines for banking or money transactions, such as automatic teller machines, self-service statement printers or point of sale terminals. * * * * * 5D002 Information Security Software License Requirements Reason for Control: NS, AT ------------------------------------------------------------------------ Control(s) Country chart ------------------------------------------------------------------------ NS applies to entire entry............. NS Column 1. AT applies to entire entry............. AT Column 1. ------------------------------------------------------------------------ Note: Key escrow encryption software controlled under 5D002.c.1. remains subject to the EAR even when made publicly available in accordance with Sec. 734.7 of the EAR, and it is not eligible for mass market treatment under License Exception TSU for mass market software. See Sec. 742.15(b)(1) of the EAR. License Exceptions GBS: N/A CIV: N/A List of Items Controlled Unit: $ value Related Controls: NA Related Definitions: N/A Items: a. ``software'' specially designed or modified for the ``development'', ``production'' or ``use'' of equipment or ``software'' controlled by 5A002, 5B002 or 5D002. b. ``Software'' specially designed or modified to support ``technology'' controlled by 5E002. c. Specific ``software'' as follows: c.1. ``Software'' having the characteristics, or performing or simulating the functions of the equipment controlled by 5A002 or 5B002; Note: 5D002.c.1 includes controls key escrow encryption software transferred from the U.S. Munitions List following a case-by-case determination by the Department of State through the commodity jurisdiction procedure. See Sec. 742.15 of the EAR. c.2. ``Software'' to certify ``software'' controlled by 5D002.c.1; c.3. ``Software'' designed or modified to protect against malicious computer damage, e.g., viruses; Note: 5D002 does not control: a. ``Software'' required'' for the ``use'' of equipment excluded from control under the Note to 5A002. b. ``Software'' providing any of the functions of equipment excluded from control under the Note to 5A002. 13. Supplement No. 2 to Part 774 is amended by revising the 2. General Software Note to read as follows: Supplement No. 2 to Part 774--General Technology and Software Notes * * * * * 2. General Software Note. License Exception TSU (mass market software) is available to all destinations, except Cuba, Iran, Libya, North Korea, Sudan, and Syria, for release of software that is generally available to the public by being: a. Sold from stock at retail selling points, without restriction, by means of: 1. Over the counter transactions; 2. Mail order transactions; or 3. Telephone call transactions; and b. Designed for installation by the user without further substantial support by the supplier. Note: License Exception TSU for mass market software does not apply to key escrow encryption software controlled under ECCN 5D002.c.1. that has been transferred from the U.S. Munitions list following a commodity jurisdiction determination by the Department of State. Dated: December 6, 1996. Sue E. Eckert, Assistant secretary for Export Administration. [FR Doc. 96-31583 Filed 12-12-96; 8:45 am] BILLING CODE 3510-33-M