[Federal Register Volume 65, Number 10 (Friday, January 14, 2000)]
[Rules and Regulations]
[Pages 2492-2502]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 00-983]



[[Page 2491]]



Part III





Department of Commerce





_______________________________________________________________________



Bureau of Export Administration



_______________________________________________________________________



15 CFR Parts 734, 740, et al.



Revisions to Encryption Items; Interim Final Rule

Federal Register / Vol. 65, No. 10 / Friday, January 14, 2000 / Rules 
and Regulations

[[Page 2492]]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

Bureau of Export Administration

15 CFR Parts 734, 740, 742, 770, 772, and 774

[Docket No. 000110010-0010-01]
RIN: 0694-AC11


Revisions to Encryption Items

AGENCY: Bureau of Export Administration, Commerce.

ACTION: Interim final rule; request for comments.

-----------------------------------------------------------------------

SUMMARY: This rule amends the Export Administration Regulations (EAR) 
to allow the export and reexport of any encryption commodity or 
software to individuals, commercial firms, and other non-government 
end-users in all destinations. It also allows exports and reexports of 
retail encryption commodities and software to all end-users in all 
destinations. Post-export reporting requirements are streamlined, and 
changes are made to reflect amendments to the Wassenaar Arrangement. 
This rule implements the encryption policy announced by the White House 
on September 16 and will simplify U.S. encryption export rules. 
Restrictions on terrorist supporting states (Cuba, Iran, Iraq, Libya, 
North Korea, Sudan or Syria), their nationals and other sanctioned 
entities are not changed by this rule.

DATES: This rule is effective January 14, 2000. Comments must be 
received on or before May 15, 2000.

ADDRESSES: Written comments on this rule should be sent to Frank J. 
Ruggiero, Regulatory Policy Division, Bureau of Export Administration, 
Department of Commerce, P.O. Box 273, Washington, DC 20044. Express 
mail address: Frank J. Ruggiero, Regulatory Policy Division, Bureau of 
Export Administration, Department of Commerce, 14th Street and 
Pennsylvania Ave, N.W., Room 2705, Washington, DC 20230.

FOR FURTHER INFORMATION CONTACT: James A. Lewis, Director, Office of 
Strategic Trade, at (202) 482-0092.

SUPPLEMENTARY INFORMATION:

Background:

    On September 16, 1999, the U.S. announced a new approach to its 
encryption export control policy. This approach rests on three 
principles: A technical review of encryption products in advance of 
sale, a streamlined post-export reporting system, and a process that 
permits the government to review exports of strong encryption to 
foreign governments. The full range of national interests continue to 
be served by this new policy: supporting law enforcement and national 
security, protecting privacy and promoting electronic commerce. 
Encryption export controls will be simplified and U.S. companies will 
have new opportunities to sell their products in the global 
marketplace.
    This regulation also implements changes for encryption items made 
by the Wassenaar Arrangement, including: conversion of Category 5--Part 
2 (Information Security) of the Commerce Control List (CCL) to a 
positive list; creation of a Cryptography Note and removal of 
encryption software from the General Software Note; decontrol of 64-bit 
mass market software and commodities, including components; and 
decontrol of certain 512-bit key management products.
    The EAR is amended as follows:
    1. In Sec. 734.2, Important EAR Terms and Principles, unrestricted 
encryption source code under Sec. 740.13(e), commercial encryption 
source code under Sec. 740.17(a)(5)(i) and retail products under 
Sec. 740.17(a)(3) are exempted from Internet download screening 
requirements in Sec. 734.2 (b)(9)(iii). A revised screening mechanism 
for other encryption products exported to government end-users is 
added. Please note that Sec. 734.2(b)(9) contains the relevant 
definitions for the export of encryption source code and object code 
software. In addition, cross-referencing changes are made to 
Secs. 734.7, 734.8, and 734.9.
    2. In Sec. 740.13, Technology and Software Unrestricted, changes 
are made to reflect amendments to the Wassenaar Arrangement. 
Specifically, encryption software is no longer eligible for mass market 
treatment under the General Software Note. Encryption commodities and 
software are now eligible for mass market treatment under the new 
Cryptography Note in Category 5--Part 2 of the CCL. This Note 
multilaterally decontrols mass market encryption commodities and 
software up to and including 64-bits. Such products, after review and 
classification by BXA, are classified under Export Commodity Control 
Numbers (ECCNs) 5A992 or 5D992, thereby releasing them from ``EI'' 
(Encryption Items) and ``NS'' (National Security) controls, and making 
them eligible for export and reexport to all destinations (see 
Sec. 742.15(b)(1)(iii) of the EAR). Once mass market encryption 
software and commodities are released from ``EI'' controls they may be 
eligible for de minimis and publicly available treatment (see part 734 
of the EAR).
    3. Also in Sec. 740.13, to, in part, take into account the ``open 
source'' approach to software development, unrestricted encryption 
source code not subject to an express agreement for the payment of a 
licensing fee or royalty for commercial production or sale of any 
product developed using the source code can, without review, be 
released from ``EI'' controls and exported and reexported under License 
Exception TSU. Intellectual property protection (e.g., copyright, 
patent, or trademark) would not, by itself, be construed as an express 
agreement for the payment of a licensing fee or royalty for commercial 
production or sale of any product developed using the source code. To 
qualify, exporters must notify BXA of the Internet location (e.g., URL 
or Internet address) or provide a copy of the source code by the time 
of export. These notifications are only required for the initial 
export; there are no notification requirements for end-users 
subsequently using the source code. Notification can be made by e-mail 
to [email protected].
    Review and classification are not required for foreign made 
products using this source code. Moreover, under Sec. 744.9, exporters 
of unrestricted encryption source code are not restrained from 
providing technical assistance to foreign persons working with such 
source code. In addition, exporters of source code are not subject to 
Internet download screening requirements under Sec. 734.2(b)(9)(iii). 
Posting of the source code on the Internet (e.g., FTP or World Wide Web 
site), where it may be downloaded by anyone, would not establish 
``knowledge'' (as that term is defined in the EAR) of a prohibited 
export or reexport. Such posting would not trigger ``red flags'' 
necessitating the affirmative duty to inquire under the ``Know Your 
Customer'' guidance provided in Supplement No. 3 to Part 732. 
Otherwise, compliance with EAR requirements as to prohibited exports 
and reexports still apply.
    4. In Sec. 740.17, Encryption Commodities and Software, language is 
added to implement the Administration's new policy. License Exception 
ENC (Encryption Commodities and Software) is revised as follows:
    a. Encryption items under ECCNs 5A002, 5D002 or 5E002 can be 
exported and reexported to foreign subsidiaries of U.S. companies, 
including the transfer of encryption technology to their foreign 
employees in the U.S., without technical review and classification. Any 
items developed by the U.S. company for sale or retransfer outside the 
U.S. company are subject to review and classification by BXA. Foreign 
companies with subsidiaries in the U.S.

[[Page 2493]]

can apply for Encryption Licensing Arrangements (ELAs) to obtain 
treatment equivalent to that extended to foreign subsidiaries of U.S. 
parent companies.
    b. A new paragraph, entitled ``Encryption commodities and 
software,'' is created to implement the broad authorization for 
encryption exports contained in the September 16 announcement. Under 
this paragraph, any encryption commodity, software or components of any 
key length classified under ECCNs 5A002 and 5D002 can be exported and 
reexported to individuals, commercial firms and other non-government 
end-users. Previous sector-specific liberalizations for banks and 
financial institutions, health and medical end-users and on-line 
merchants are subsumed into this new paragraph. Previous restrictions 
limiting exports to foreign commercial firms for internal company 
proprietary use are removed. In addition, foreign products developed 
from encryption components, while subject to the EAR, do not require 
review and classification prior to reexport. Exports and reexports to 
government end-users require a license.
    c. A new paragraph entitled ``Retail encryption commodities and 
software'' is created. Retail encryption commodities and software under 
ECCNs 5A002 and 5D002 are those which are widely available and can be 
exported and reexported to any end-user (including any Internet and 
telecommunications service provider), to provide products and services 
(e.g., e-commerce, client-server applications, or software 
subscriptions) to any end-user. The criteria to determine eligibility 
as a retail product include functionality, sales volume, distribution 
methods, ability to modify products and requirements for substantial 
support by the supplier. Substantial support for retail encryption 
commodities and software would mean a service contract or other 
significant vendor support beyond what is minimally necessary for the 
product's operation. Help desk calls are not considered substantial 
support. Refer to Sec. 740.17(a)(3) of the EAR for a detailed 
definition of retail encryption commodities and software (which may 
include components as well as encryption source code) and an 
illustrative, yet non-restrictive, list of such products. Finance-
specific, 56-bit non-mass market products with a key exchange greater 
than 512 bits and up to 1024 bits, network-based applications and other 
products which are functionally equivalent to retail products are 
considered retail products.
    Encryption software patches for retail products remain eligible 
under License Exception TSU and certain upgrades for retail products, 
where the cryptographic functionality has not changed, are authorized 
under License Exception ENC. Also, foreign products developed from 
retail encryption components, while subject to the EAR, require no 
technical review or license authorization prior to reexport; however, 
post-export reporting requirements exist. Retail encryption products 
are not subject to Internet download screening requirements listed in 
Sec. 734.2(b)(9)(iii); however, all other general prohibitions, such as 
those for the seven terrorist-supporting countries, apply.
    d. A new paragraph is added to License Exception ENC entitled 
``Telecommunications and Internet service providers.'' 
Telecommunications and Internet service providers can obtain and use 
any encryption product under this license exception to provide 
encryption services, including public key infrastructure services for 
the general public; however, provision of services specific to 
governments (e.g., running a virtual private network for a government 
agency), will require a license.
    e. A paragraph entitled ``Commercial encryption source code and 
general purpose encryption toolkits'' is added. You may export and 
reexport general purpose encryption toolkits and encryption source 
code, not released under Sec. 740.13, classified under ECCN 5D002, 
subject to the following provisions:
    (1) Commercial encryption source code which would be considered 
publicly available under Sec. 734.3 and which is subject to an express 
agreement for the payment of a licensing fee or royalty for commercial 
production or sale of any product developed using the source code, can 
be exported or reexported to any end-user. This source code, which 
includes some ``community'' source code, may be exported or reexported 
without review and classification, provided you have submitted to BXA, 
by the time of export, written notification of the Internet location 
(e.g., URL or Internet address) or a copy of the source code. These 
notifications are only required for the initial export; there are no 
notification requirements for end-users subsequently utilizing the 
source code. The notification can be sent via e-mail to 
[email protected].
    (2) Encryption source code which would not be considered publicly 
available may be exported or reexported to any non-government end-user 
after review and classification by BXA.
    (3) General purpose encryption toolkits may be exported and 
reexported after review and classification by BXA to any non-government 
end-user.

    Note to this paragraph: Neither review and classification nor 
reexport licensing requirements are required under this section for 
foreign finished products using U.S.-origin source code, toolkits 
and components; yet the foreign finished products remain subject to 
the EAR. Post-export reporting for foreign products developed for 
commercial sale with source code and general purpose encryption 
toolkits exported under this paragraph is limited to the name and 
address of the foreign manufacturer and certain non-proprietary 
technical information about the foreign product. Exporters should 
always be aware of the General Prohibitions identified in part 736 
of the EAR (e.g., prohibited exports and reexports to Denied Persons 
and embargoed destinations).

    f. Grandfathering and Upgrades in Key Length: Encryption 
commodities and software previously approved under a license, or 
eligible for License Exception ENC, excluding items previously approved 
only to U.S. subsidiaries, can be exported and reexported to non-
government end-users without additional review and classification. 
Previously classified financial-specific or certain 56-bit products are 
eligible for export and reexport to any end-users without an additional 
classification. All previously classified products can be upgraded 
provided the only change is in the key length used for confidentiality 
and key exchange. Exporters must, prior to export of an upgraded 
product, certify in a letter from a corporate official the only change 
is the key length for confidentiality or key exchange algorithms and 
there is no other change in cryptographic functionality.
    g. Exporters may export any product to any non-government end-user 
30 days after receipt by BXA of a complete classification request, 
unless otherwise notified by BXA. No exports to government end-users 
are allowed under this provision and BXA reserves the right to suspend 
eligibility in those instances where requested additional information 
has not been provided or when the classification review is not 
proceeding in an appropriate fashion.
    h. Reporting requirements under License Exception ENC are 
eliminated for many encryption items. Remaining reporting requirements 
are streamlined to reflect business models normally used by exporters. 
Note that reporting requirements for exports and reexports of 
encryption components can be adjusted or reduced, on a case-by-case 
basis, provided an exporter supplies BXA with sufficient information 
during the initial technical review of the U.S.

[[Page 2494]]

encryption component concerning its incorporation into a final foreign 
product. Examples include those components restricted by their design 
for use in certain types of products. BXA will notify exporters of such 
treatment in its classification determination. All required 
notifications, upgrade certifications and reports should be sent 
electronically or mailed to the addresses cited in this regulation.

    Note to this paragraph: Post-export reporting is required for 
certain exports to foreign banks and financial institutions.

    5. In part 740, Supplement No. 3 is removed. Supplement No. 3 
previously listed countries eligible to receive certain encryption 
products; such products are now eligible for export and reexport to all 
destinations.
    6. In Sec. 742.15, the licensing policy section for exports and 
reexports of encryption items is changed as follows:
    a. Review and classification are required by BXA before certain 
encryption items can be released from ``EI'' and ``NS'' controls under 
ECCNs 5A992, 5D992 and 5E992. These items include: 64-bit mass market 
encryption commodities and software; certain encryption items up to and 
including 56-bits; and asymmetric key exchange algorithms not exceeding 
512 bits or an elliptic curve at 112 bits. Encryption items under these 
ECCNs do not require a license or license exception and may be exported 
and reexported as ``NLR'' (No License Required).
    b. Upgrades: 40 and 56-bit DES or equivalent mass market 
commodities and software previously classified as eligible for License 
Exception ENC or TSU may be upgraded to 64-bits for the confidentiality 
algorithm. Exporters must, prior to export of an upgraded product, 
certify to BXA in a letter from a corporate official that the only 
change is the key length for confidentiality or key exchange algorithms 
and there is no other change in cryptographic functionality. Note that 
other mass market encryption commodities and software previously 
exported under License Exception ENC or TSU are now classified as 
either 5A992 or 5D992 and eligible for ``NLR'' treatment. Encryption 
items under 5A992, 5D992 and 5E992 are not subject to Internet download 
screening requirements listed in Sec. 734.2(b)(9)(iii).
    c. The licensing policies for exports and reexports of encryption 
items for banks and financial institutions, health and medical end-
users, and on-line merchants, as well as U.S. subsidiaries, are 
subsumed into a new licensing policy paragraph for all encryption items 
under ECCNs 5A002, 5D002 or 5E002 eligible for License Exception ENC. 
For U.S. subsidiaries, any encryption item (including technology 
classified under 5E002 to foreign employees located in the U.S.) is 
permitted for export or reexport under License Exception ENC without 
review and classification. Also, any encryption item, including 
components, under ECCNs 5A002 or 5D002 can be exported and reexported 
to non-government end-users in all destinations. Retail products under 
5A002 or 5D002 can be exported and reexported to all end-users.
    d. Licenses required for exports and reexports of encryption items 
to governments, or Internet and telecommunications service providers 
for the provision of services specific to governments, may be 
considered favorably for civil uses.
    e. Under Encryption Licensing Arrangements (ELAs), distributors and 
resellers can export and reexport under ELAs as long as they comply 
with restrictions contained in the ELA.
    7. In Sec. 770.2, Commodity interpretations, a new interpretation 
for ``Encryption commodity and software reviews'' is added. This 
interpretation clarifies which encryption items require a review and 
what a review entails.
    8. In part 772, Definition of terms, definitions for the following 
terms are added: Asymmetric Algorithm, Encryption Component, Government 
End-User, Open Cryptographic Interface and Symmetric Algorithm.
    9. In part 774, the Commerce Control List, ECCNs 5A002 and 5D002 
are revised to reflect changes in the Wassenaar Arrangement, and the 
Cryptography Note is added as Note 3 to Category 5--Part 2.
    In addition to these changes, BXA is making the following 
clarifications and interpretations for all encryption items subject to 
the EAR.
    1. The review and classification process is used to classify 
encryption items for their proper licensing mechanism and not to delay 
or deny a proposed transaction. Once a classification request is 
received, the item's specifications are reviewed and processed in 
accordance with Sec. 748.3 of the EAR to determine its classification. 
Once completed, exporters will receive a document by mail informing 
them of the product's technical classification and proper licensing 
mechanism. The EAR also provides an appeal process for exporters 
unsatisfied with BXA's product classification (see Sec. 756.2 of the 
EAR).
    2. It is BXA's intent to allow end-users of encryption items to 
provide their customers with encryption products and services. However, 
exports to Internet and telecommunications service providers are 
subject to restrictions when providing services specific to government 
end-users.
    3. It was not the intent of the new Wassenaar language for ECCN 
5A002 to be more restrictive concerning Message Authentication Codes 
(MAC). ``Data authentication equipment that calculates a Message 
Authentication Code (MAC) or similar result to ensure no alteration of 
text has taken place, or to authenticate users, but does not allow for 
encryption of data, text or other media other than that needed for the 
authentication'' continues to be excluded from control under 5A002. 
These commodities are controlled under ECCN 5A992.
    4. Note that Sec. 740.8, Key Management Infrastructure (KMI), 
authorizes the export and reexport of certain encryption software and 
commodities under License Exception KMI and will continue as an 
eligible licensing mechanism for encryption products.
    5. A number of companies have expressed concern that the European 
Union (EU) may implement a general authorization permitting encryption 
items to be exported freely within the EU and other specified 
countries. If and when the EU implements such an authorization, the 
Administration will take the necessary steps to ensure U.S. exporters 
are not disadvantaged.
    6. Note that Serbia and the Taliban controlled areas of Afghanistan 
are embargoed destinations.
    7. Please refer to the BXA website at ``www.bxa.doc.gov'' for a 
detailed explanation of the EAR, the Commerce Control List, the 
licensing process and key terms used in this regulation. Although the 
Export Administration Act (EAA) expired on August 20, 1994, the 
President invoked the International Emergency Economic Powers Act and 
continued in effect the EAR, and, to the extent permitted by law, the 
provisions of the EAA in Executive Order 12924 of August 19, 1994, as 
extended by the President's notices of August 15, 1995 (60 FR 42767), 
August 14, 1996 (61 FR 42527), August 13, 1997 (62 FR 43629), August 
13, 1998 (63 FR 44121), and August 10, 1999 (64 FR 44101).

Rulemaking Requirements

    1. This interim final rule has been determined to be significant 
for purposes of E.O. 12866.
    2. Notwithstanding any other provision of law, no person is 
required to respond to, nor shall any person be subject to a penalty 
for failure to comply with a collection of information, subject to the 
requirements of the Paperwork

[[Page 2495]]

Reduction Act (PRA), unless that collection of information displays a 
currently valid OMB Control Number. This rule involves collections of 
information subject to the Paperwork Reduction Act of 1995 (44 U.S.C. 
3501 et seq.). These collections have been approved by the Office of 
Management and Budget under control numbers 0694-0088, ``Multi-Purpose 
Application'' and 0694-0104, ``Commercial Encryption Items Transferred 
from the Department of State to the Department of Commerce.'' The 
Department has submitted to OMB an emergency request for approval of 
the changes to the collection of information under OMB control number 
0694-0104.
    This interim final rule reduces the annual burden hours associated 
with collection 0694-0104 from 703 hours to 692 hours, and reduces 
collection 0694-0088 by 200 burden hours. For collection 0694-0104, it 
is estimated it will take companies 5 minutes to complete notifications 
for source code under License Exceptions TSU and ENC. It will take 
companies 15 minutes to complete upgrade notifications. For reporting 
under License Exception ENC and licenses for encryption items, it will 
take companies 4 hours to complete semi-annual reporting requirements.
    Comments on collection 0694-0104 are welcome, and will be accepted 
until April 13, 2000. Comments are invited on: (a) Whether the 
collection of information is necessary for the proper performance of 
the functions of the agency, including whether the information shall 
have practical utility; (b) the accuracy of the agency's estimate of 
the burden of the proposed collection of information; (c) ways to 
enhance the quality, utility, and clarity of the information to be 
collected; and (d) ways to minimize the burden of the collection of 
information on respondents, including through the use of automated 
collection techniques or other forms of information technology. 
Comments regarding these burden estimates or any other aspect of the 
collection of information, including suggestions for reducing the 
burdens, should be forward to Frank J. Ruggiero, Regulatory Policy 
Division, Office of Exporter Services, Bureau of Export Administration, 
Department of Commerce, P.O. Box 273, Washington, D.C. 20044, and David 
Rostker, Office of Management and Budget, OMB/OIRA, 725 17th Street, 
NW, NEOB Rm. 10202, Washington, D.C. 20503.
    3. This rule does not contain policies with Federalism implications 
sufficient to warrant preparation of a Federalism assessment under 
Executive Order 13132.
    4. The provisions of the Administrative Procedure Act (5 U.S.C. 
553) requiring notice of proposed Rulemaking, the opportunity for 
public participation, and a delay in effective date, are inapplicable 
because this regulation involves a military and foreign affairs 
function of the United States (Sec. 5 U.S.C. 553(a)(1)). Further, no 
other law requires that a notice of proposed rulemaking and an 
opportunity for public comment be given for this interim final rule. 
Because a notice of proposed rulemaking and an opportunity for public 
comment are not required to be given for this rule under 5 U.S.C. or by 
any other law, the analytical requirements of the Regulatory 
Flexibility Act (5 U.S.C. 601 et seq.) are not applicable.
    However, because of the importance of the issues raised by this 
regulation, it is issued in interim final form and comments will be 
considered in the development of final regulations. Accordingly, the 
Department of Commerce encourages interested persons who wish to 
comment to do so at the earliest possible time to permit the fullest 
consideration of their views.
    The period for submission of comments will close May 15, 2000. The 
Department will consider all comments received before the close of the 
comment period in developing final regulations. Comments received after 
the end of the comment period will be considered if possible, but their 
consideration cannot be assured. The Department will not accept public 
comments accompanied by a request that a part or all of the material be 
treated confidentially because of its business proprietary nature or 
for any other reason. The Department will return such comments and 
materials to the persons submitting the comments and will not consider 
them in the development of final regulations. All public comments on 
these regulations will be a matter of public record and will be 
available for public inspection and copying. In the interest of 
accuracy and completeness, the Department requires comments in written 
form. Comments should be provided with 5 copies.
    Oral comments must be followed by written memoranda, which will 
also be a matter of public record and will be available for public 
review and copying.
    The public record concerning these regulations will be maintained 
in the Bureau of Export Administration Freedom of Information Records 
Inspection Facility, Room 6881, Department of Commerce, 14th Street and 
Pennsylvania Avenue, N.W., Washington, DC 20230. Records in this 
facility, including written public comments and memoranda summarizing 
the substance of oral communications, may be inspected and copied in 
accordance with regulations published in Part 4 of Title 15 of the Code 
of Federal Regulations. Information about the inspection and copying of 
records at the facility may be obtained from the Bureau of Export 
Administration Freedom of Information Officer, at the above address or 
by calling (202) 482-0500.

List of Subjects

15 CFR Part 734

    Administrative practice and procedure, Exports, Foreign trade.

15 CFR Part 740

    Administrative practice and procedure, Exports, Foreign trade, 
Reporting and record keeping requirements.

15 CFR Parts 742, 770, 772, and 774

    Exports, Foreign Trade.

    Accordingly, parts 734, 740, 742, 770, 772, and 774 of the Export 
Administration Regulations (15 CFR parts 730 through 799) are amended 
as follows:
    1. The authority citation for part 734 continues to read as 
follows:

    Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 
E.O. 12924, 59 FR 43437, 3 CFR, 1994 Comp., p. 917; E.O. 12938, 59 
FR 59099, 3 CFR, 1994 Comp., p. 950; E.O. 13020, 61 FR 54079, 3 CFR, 
1996 Comp. p. 219; E.O. 13026, 61 FR 58767, 3 CFR, 1996 Comp., p. 
228; Notice of November 12, 1998, 63 FR 63589, 3 CFR, 1998 Comp., p. 
305; Notice of August 10, 1999, 64 FR 44101 (August 13, 1999).

    2. The authority citation for part 740 continues to read as 
follows:

    Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 
E.O. 12924, 59 FR 43437, 3 CFR, 1994 Comp., p. 917; E.O. 13026, 61 
FR 58767, 3 CFR, 1996 Comp., p. 228; Notice of August 10, 1999, 64 
FR 44101 (August 13, 1999).

    3. The authority citation for part 742 continues to read as 
follows:

    Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 
18 U.S.C. 2510 et seq.; 22 U.S.C. 3201 et seq.; 42 U.S.C. 2139a; 
E.O. 12058, 43 FR 20947, 3 CFR, 1978 Comp., p. 179; E.O. 12851, 58 
FR 33181, 3 CFR, 1993 Comp., p. 608; E.O. 12924, 59 FR 43437, 3 CFR, 
1994 Comp., p. 917; E.O. 12938, 59 FR 59099, 3 CFR, 1994 Comp., p. 
950; E.O. 13026, 61 FR 58767, 3 CFR, 1996 Comp., p. 228; Notice of 
November 12, 1998, 63 FR 63589, 3 CFR, 1998 Comp., p. 305; Notice of 
August 10, 1999, 64 FR 44101 (August 13, 1999).


[[Page 2496]]


    4. The authority citation for part 770 continues to read as 
follows:

    Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 
E.O. 12924, 59 FR 43437, 3 CFR, 1994 Comp., p. 917; E.O. 13026, 61 
FR 58767, 3 CFR, 1996 Comp., p. 228; Notice of August 10, 1999, 64 
FR 44101 (August 13, 1999).

    5. The authority citation for part 772 continues to read as 
follows:

    Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 
E.O. 12924, 59 FR 43437, 3 CFR, 1994 Comp., p. 917; E.O. 13026, 61 
FR 58767, 3 CFR, 1996 Comp., p. 228; Notice of August 10, 1999, 64 
FR 44101 (August 13, 1999).

    6. The authority citation for part 774 continues to read as 
follows:

    Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.; 
10 U.S.C. 7420; 10 U.S.C. 7430(e); 18 U.S.C. 2510 et seq.; 22 U.S.C. 
287c, 22 U.S.C. 3201 et seq., 22 U.S.C. 6004; 30 U.S.C. 185(s), 
185(u); 42 U.S.C. 2139a; 42 U.S.C. 6212; 43 U.S.C. 1354; 46 U.S.C. 
app. 466c; 50 U.S.C. app. 5; E.O. 12924, 59 FR 43437, 3 CFR, 1994 
Comp., p. 917; E.O. 13026, 61 FR 58767, 3 CFR, 1996 Comp., p. 228; 
Notice of August 10, 1999, 64 FR 44101 (August 13, 1999).

PART 734--[AMENDED]

    7. Section 734.2 is amended by revising paragraph (b)(9)(ii) and 
adding new paragraph (b)(9)(iii) to read as follows:


Sec. 734.2  Important EAR terms and principles.

* * * * *
    (b) * * *
    (9) * * *
    (i) * * *
    (ii) The export of encryption source code and object code software 
controlled for ``EI'' reasons under ECCN 5D002 on the Commerce Control 
List (see Supplement No. 1 to part 774 of the EAR), except for source 
code eligible for export under Secs. 740.13(e) and 740.17(a)(5)(i), 
includes downloading, or causing the downloading of, such software to 
locations (including electronic bulletin boards, Internet file transfer 
protocol, and World Wide Web sites) outside the U.S., or making such 
software available for transfer outside the United States, over wire, 
cable, radio, electromagnetic, photo optical, photoelectric or other 
comparable communications facilities accessible to persons outside the 
United States, including transfers from electronic bulletin boards, 
Internet file transfer protocol and World Wide Web sites, unless the 
person making the software available takes precautions adequate to 
prevent unauthorized transfer of such code.
    (iii) Subject to the General Prohibitions described in part 736 of 
the EAR, such precautions for Internet transfers of products eligible 
for export under Secs. 740.17(a)(2) (encryption software products), 
(a)(5)(ii) (certain encryption source code) and (a)(5)(iii) (encryption 
toolkits) shall include such measures as:
    (A) The access control system, either through automated means or 
human intervention, checks the address of every system outside of the 
U.S. or Canada requesting or receiving a transfer and verifies such 
systems do not have a domain name or Internet address of a foreign 
government end-user (e.g., ``.gov,'' ``.gouv,'' ``.mil'' or similar 
addresses);
    (B) The access control system provides every requesting or 
receiving party with notice that the transfer includes or would include 
cryptographic software subject to export controls under the Export 
Administration Regulations, and anyone receiving such a transfer cannot 
export the software without a license or other authorization; and
    (C) Every party requesting or receiving a transfer of such software 
must acknowledge affirmatively that the software is not intended for 
use by a government end-user, as defined in part 772, and he or she 
understands the cryptographic software is subject to export controls 
under the Export Administration Regulations and anyone receiving the 
transfer cannot export the software without a license or other 
authorization. BXA will consider acknowledgments in electronic form 
provided they are adequate to assure legal undertakings similar to 
written acknowledgments.


Sec. 734.4  [Amended]

    8. Section 734.4 is amended by revising the last sentence of 
paragraph (b) to read as follows: ``Certain encryption commodities, 
software and technology controlled under ECCNs 5A992, 5D992, and 5E992 
may be eligible for de minimis (refer to Sec. 742.15(b)(1)).''
    9. Section 734.7 is amended by revising paragraph (c) to read as 
follows:


Sec. 734.7  Published information and software.

* * * * *
    (c) Notwithstanding paragraphs (a) and (b) of this section, note 
that encryption software controlled under ECCN 5D002 for ``EI'' reasons 
on the Commerce Control List (refer to Supplement No. 1 to part 774 of 
the EAR) remains subject to the EAR (refer to Secs. 740.13(e) and 
740.17(a)(5)(i) of the EAR for release under license exception).


Sec. 734.8  [Amended]

    10. Section 734.8 is amended by revising the last sentence of 
paragraph (a) to read as follows: ``Note that the provisions of this 
section do not apply to encryption software controlled under ECCN 5D002 
for ``EI'' reasons on the Commerce Control List (refer to 
Secs. 740.13(e) and 740.17(a)(5)(i) of the EAR for release under 
license exception).''


Sec. 734.9  [Amended]

    11. Section 734.9 is amended by revising the last sentence to read 
as follows: ``Note that the provisions of this section do not apply to 
encryption software controlled under ECCN 5D002 for ``EI'' reasons on 
the Commerce Control List (refer to Secs. 740.13(e) and 740.17(a)(5)(i) 
of the EAR for release under license exception).''

PART 740--[AMENDED]

    12. Section 740.8 is amended by revising the address in paragraph 
(b)(2) to read as follows:


Sec. 740.8  Key management infrastructure (KMI).

* * * * *
    (b) * * *
    (2) * * *
    Attn: KMI Encryption Request Coordinator, 9800 Savage Road, Suite 
6131, Fort Meade, MD 20755-6000.
* * * * *
    13. Section 740.13 is amended by:
    a. By revising the introductory paragraph;
    b. By revising paragraph (d)(2); and
    c. By adding new paragraph (e) to read as follows:


Sec. 740.13  Technology and software--unrestricted (TSU)

    This license exception authorizes exports and reexports of 
operation technology and software; sales technology and software; 
software updates (bug fixes); ``mass market'' software subject to the 
General Software Note; and unrestricted encryption source code. Note 
that encryption software is not subject to the General Software Note 
(see paragraph (d)(2) of this section).
* * * * *
    (d) * * *
    (2) Software not eligible for this license exception. This license 
exception is not available for certain encryption software controlled 
under ECCN 5D002. (Refer to the Cryptography Note in Category 5--Part 2 
of the Commerce Control List for information

[[Page 2497]]

on Mass Market Encryption commodities and software. Also refer to 
Secs. 742.15(b)(1) and 748.3(b) of the EAR for information on item 
classifications for release from ``EI'' controls and ``NS'' controls).
* * * * *
    (e) Unrestricted encryption source code.
    (1) Encryption source code controlled under 5D002, which would be 
considered publicly available under Sec. 734.3(b)(3) and which is not 
subject to an express agreement for the payment of a licensing fee or 
royalty for commercial production or sale of any product developed with 
the source code, is released from ``EI'' controls and may be exported 
or reexported without review under License Exception TSU, provided you 
have submitted written notification to BXA of the Internet location 
(e.g., URL or Internet address) or a copy of the source code by the 
time of export. Submit the notification to BXA and send a copy to ENC 
Encryption Request Coordinator (see Sec. 740.17(g)(5) for mailing 
addresses). Intellectual property protection (e.g., copyright, patent 
or trademark) will not, by itself, be construed as an express agreement 
for the payment of a licensing fee or royalty for commercial production 
or sale of any product developed using the source code.
    (2) You may not knowingly export or reexport source code or 
products developed with this source code to Cuba, Iran, Iraq, Libya, 
North Korea, Sudan or Syria.
    (3) Posting of the source code on the Internet (e.g., FTP or World 
Wide Web site) where the source code may be downloaded by anyone would 
not establish ``knowledge'' of a prohibited export or reexport, 
including that described in paragraph (e)(2) of this section. In 
addition, such posting would not trigger ``red flags'' necessitating 
the affirmative duty to inquire under the ``Know Your Customer'' 
guidance provided in Supplement No. 3 to part 732 of the EAR.
    14. Section 740.17 is revised to read as follows:


Sec. 740.17  Encryption commodities and software (ENC).

    (a) Exports and reexports of certain encryption commodities and 
software. As enumerated in this section, you may export and reexport 
encryption commodities, software and components (as defined in part 772 
EAR) under License Exception ENC. License Exception ENC cannot be used 
if the encryption commodity or software provides an open cryptographic 
interface (as defined in part 772), unless the export is to a 
subsidiary of a U.S. company, as described in paragraph (a)(1) of this 
section.
    (1) Encryption commodities, software, and technology for U.S. 
subsidiaries. You may export and reexport any encryption item of any 
key length under ECCNs 5A002, 5D002 and 5E002 to foreign subsidiaries 
of U.S. companies (as defined in part 772) without review and 
classification. This includes source code and technology for internal 
company use, such as the development of new products. U.S. firms may 
also transfer under License Exception ENC encryption technology (5E002) 
to their foreign employees in the U.S. (except nationals of Cuba, Iran, 
Iraq, Libya, North Korea, Sudan or Syria) for internal company use, 
including the development of new products. All items produced or 
developed by U.S. subsidiaries with encryption commodities, software 
and technology exported under this paragraph are subject to the EAR and 
require review and classification before any sale or retransfer outside 
of the U.S. company.
    (2) Encryption commodities and software. You may export and 
reexport any encryption commodity, software and component after review 
and classification by BXA under ECCNs 5A002 and 5D002 to any 
individual, commercial firm or other non-government end-user. 
Encryption products classified under this paragraph require a license 
for export and reexport to government end-users (as defined in part 
772). The former restriction limiting exports or reexports to internal 
company proprietary use is removed.
    (3) Retail encryption commodities and software. You may export and 
reexport to any end-user encryption commodities, software and 
components which have been reviewed and classified as retail under 
ECCNs 5A002 and 5D002. Retail encryption commodities, software and 
components are products:
    (i) Generally available to the public by means of any of the 
following:
    (A) Sold in tangible form through retail outlets independent of the 
manufacturer;
    (B) Specifically designed for individual consumer use and sold or 
transferred through tangible or intangible means; or
    (C) Sold in large volume without restriction through mail order 
transactions, electronic transactions, or telephone call transactions; 
and
    (ii) Meeting all of the following:
    (A) The cryptographic functionality cannot be easily changed by the 
user;
    (B) Do not require substantial support for installation and use;
    (C) The cryptographic functionality has not been modified or 
customized to customer specification; and
    (D) Are not network infrastructure products such as high end 
routers or switches designed for large volume communications.
    (iii) Subject to the criteria in paragraphs (a)(3)(i) and (ii) of 
this section, retail encryption products include (but are not limited 
to) general purpose operating systems and their associated user-
interface client software or general purpose operating systems with 
embedded networking and server capabilities; non-programmable 
encryption chips and chips that are constrained by design for retail 
products; low-end routers, firewalls and networking or cable equipment 
designed for small office or home use; programmable database management 
systems and associated application servers; low-end servers and 
application-specific servers (including client-server applications, 
e.g., Secure Socket Layer (SSL)-based applications) that interface 
directly with the user; and encryption products distributed without 
charge or through free or anonymous downloads.
    (iv) Encryption products and network-based applications which 
provide functionality equivalent to other encryption products 
classified as retail will be considered retail.
    (v) Encryption products exported or reexported under paragraph 
(a)(3) of this section can be used to provide services to any entity.
    (vi) Finance-specific encryption commodities and software of any 
key length restricted by design (e.g., highly field-formatted with 
validation procedures and not easily diverted to other end-uses) and 
used to secure financial communications such as electronic commerce 
will be considered retail encryption products.
    (vii) 56-bit products with key exchange mechanisms greater than 512 
bits and up to and including 1024 bits, or equivalent products not 
classified as mass market, will be considered retail.
    (4) Internet and Telecommunications service providers. Certain 
restrictions apply to Internet and telecommunications service 
providers. Any Internet or telecommunications service provider can 
obtain retail products under License Exception ENC and use them to 
provide any service to any entity. Internet and telecommunications 
service providers can obtain and use any encryption product for their 
internal use and to provide any service under License Exception ENC. 
However, a license is required for the use of any product not

[[Page 2498]]

classified as retail to provide services specific to government end-
users, e.g., WAN, LAN, VPN, voice and dedicated-link services; 
application specific and e-commerce services and PKI encryption 
services specifically for government end-users only.
    (5) Commercial encryption source code and general purpose toolkits. 
You may export and reexport encryption source code not released under 
Sec. 740.13(e) or general purpose toolkits (application specific 
toolkits are covered under components, as defined in part 772), subject 
to the following provisions:
    (i) Encryption source code, which would be considered publicly 
available under Sec. 734.3(b)(3) of the EAR and which is subject to an 
express agreement for the payment of a licensing fee or royalty for 
commercial production or sale of any product developed using the source 
code, can be exported or reexported using License Exception ENC to any 
end-user without review and classification, provided you have submitted 
to BXA, by the time of export, written notification of the Internet 
location (e.g. URL or Internet address) or a copy of the source code. 
You may not knowingly export or reexport source code or products 
developed with this source code to Cuba, Iran, Iraq, Libya, North 
Korea, Sudan or Syria. Posting of the source code on the Internet 
(e.g., FTP or World Wide Web site) where the source code may be 
downloaded by anyone would not establish ``knowledge'' of a prohibited 
export or reexport. In addition, such posting would not trigger ``red 
flags'' necessitating the affirmative duty to inquire under the ``Know 
Your Customer'' guidance provided in Supplement No. 3 to part 732 of 
the EAR.
    (ii) Encryption source code which would neither be considered 
publicly available nor includes source code that when compiled provides 
an open cryptographic interface (see Sec. 740.17(f)), may be exported 
or reexported using License Exception ENC to any non-government end-
user after review and classification by BXA.
    (iii) General purpose encryption toolkits may be exported or 
reexported after review and classification by BXA under License 
Exception ENC to any non-government end-user.
    (iv) Any foreign product developed for commercial sale using 
encryption source code or general purpose toolkits exported under 
paragraph (a)(5) of this section is subject to reporting requirements 
under paragraph (g)(3) of this section. Foreign products developed by 
bundling or compiling of source code are not subject to this reporting 
requirement.
    (b) Ineligible destinations. No encryption item(s) may be exported 
or reexported under this license exception to Cuba, Iran, Iraq, Libya, 
North Korea, Sudan or Syria.
    (c) Transfers. Transfers of encryption items listed in paragraph 
(a) of this section to government end-users or end-uses within the same 
country are prohibited unless otherwise authorized by license or 
license exception.
    (d) Exports and reexports of foreign products incorporating U.S. 
encryption source code, components or general purpose encryption 
toolkits. Foreign products developed with or incorporating U.S.-origin 
encryption source code, components or toolkits remain subject to the 
EAR, but do not require review and classification by BXA and can be 
exported or reexported without further authorization.
    (e) Eligibility for License Exception ENC. (1) Review and 
classification. You may initiate review and classification of your 
encryption commodities and software as required by paragraph (a) of 
this section by submitting a classification request in accordance with 
the provisions of Sec. 748.3(b) and Supplement 6 to part 742 of the 
EAR. Indicate ``License Exception ENC'' in Block 9: Special purpose, on 
form BXA-748P. Submit the original request to BXA in accordance with 
Sec. 748.3 of the EAR and send a copy of the request to ENC Encryption 
Request Coordinator (see paragraph (g)(5) of this section for mailing 
addresses). Thirty days after receipt of a complete classification 
request by BXA, unless otherwise notified by BXA, exporters may export 
and reexport to any non-government end-user any encryption product 
eligible under paragraphs (a)(2), (a)(4) and (a)(5) of this section. No 
exports to government end-users are allowed under this provision, and 
BXA reserves the right to suspend eligibility to export while a 
classification is pending.
    (2) Grandfathering. Finance-specific and 56-bit products previously 
reviewed and classified by BXA can be exported or reexported to any 
end-user without further review. Other encryption commodities, software 
or components previously approved for export can be exported and 
reexported without further review to any non-government end-user under 
the provisions of Sec. 740.17 (a). This includes products approved 
under a license, an Encryption Licensing Arrangement, or previously 
classified as eligible to use License Exception ENC (except for those 
products which were only authorized for export to U.S. subsidiaries). 
Exports to government end-users require a license unless BXA has 
classified the product as a ``retail'' product under paragraph (a)(3) 
of this section.
    (3) Key Length Increases. Exporters can increase the key lengths of 
previously classified products and continue to export without another 
review. No other change in the cryptographic functionality is allowed.
    (i) Any product previously classified as 5A002 or 5D002 can, with 
any upgrade to the key length used for confidentiality or key exchange 
algorithms, be exported or reexported under provisions of License 
Exception ENC to any non-government end-user without an additional 
review. Another classification is necessary to determine eligibility as 
a ``retail'' product under paragraph (a)(3) of this section.
    (ii) Exporters must certify to BXA in a letter from a corporate 
official that the only change to the encryption product is the key 
length for confidentiality or key exchange algorithms and there is no 
other change in cryptographic functionality. Certifications must 
include the original authorization number issued by BXA and the date of 
issuance. BXA must receive this certification prior to any export of an 
upgraded product. The certification should be sent to BXA, with a copy 
sent to the ENC Encryption Request Coordinator (see paragraph (g)(5) of 
this section for mailing addresses).
    (f) Open cryptographic interfaces. License Exception ENC shall not 
apply to exports or reexports of encryption commodities, software and 
components (unless exported to a subsidiary of a U.S. company under 
paragraph (a)(1) of this section), if the encryption product provides 
an open cryptographic interface (as defined in part 772). This does not 
apply to source code that would be considered publicly available under 
Sec. 734.3(b)(3).
    (g) Reporting requirements. (1) No reporting is required for 
exports of:
    (i) Any encryption to U.S. subsidiaries;
    (ii) Finance-specific products;
    (iii) Encryption commodities or software with a symmetric key 
length not exceeding 64 bits or otherwise classified as qualifying for 
mass market treatment;
    (iv) Retail products exported to individual consumers;
    (v) Any export made via free or anonymous download; and
    (vi) Any export made from or to a U.S. bank, financial institution 
or their subsidiaries, affiliates, customers or contractors for banking 
or financial operations.

[[Page 2499]]

    (2) Exporters must provide all available information as follows:
    (i) For items exported to a distributor or other reseller, the name 
and address of the distributor or reseller and the quantity exported 
and, if collected in the normal course of business, the end-user's name 
and address;
    (ii) For items exported through direct sale, the name and address 
of the recipient and the quantity exported (except for retail products 
if the end-user is an individual consumer); and
    (3) For direct sales or transfers of encryption components, 
commercial source code described under Sec. 740.17(a)(5) or general 
purpose encryption toolkits to foreign manufacturers, you must submit 
the names and addresses of the manufacturers using such encryption 
components, commercial source code or general purpose encryption 
toolkits and a non-proprietary technical description of the products 
for which the component, source code or toolkit are being used (e.g., 
brochures, other documentation, descriptions or other identifiers of 
the final foreign product; the algorithm and key lengths used; general 
programming interfaces to the product, if known; any standards or 
protocols that the foreign product adheres to; and source code, if 
available).
    (4) Exporters of encryption commodities, software and components 
which were previously classified under License Exception ENC, or which 
have been licensed for export under an Encryption Licensing 
Arrangement, must comply with the reporting requirements of this 
section.
    (5) Beginning January 14, 2000, you must submit reports required 
under this section semi-annually to BXA, unless otherwise provided in 
this paragraph. For exports occurring between January 1 and June 30, a 
report is due no later than August 1. For exports occurring between 
July 1 and December 31, a report is due no later than February 1. For 
exports and reexports to Internet and telecommunications service 
providers of network infrastructure products (e.g., high-end routers or 
switches designed for large volume communications), reports are due by 
the time of export. Reports must include the classification or other 
authorization number. These reports must be provided in electronic form 
to BXA; suggested file formats for electronic submission include 
spreadsheets, tabular text or structured text. Exporters may request 
other reporting arrangements with BXA to better reflect their business 
models. Reports should be sent electronically to [email protected], or 
disks and CDs can be mailed to the following addresses:
    (i) Department of Commerce, Bureau of Export Administration, Office 
of Strategic Trade and Foreign Policy Controls, 14th Street and 
Pennsylvania Ave., N.W., Room 2705, Washington, DC 20230, Attn: 
Encryption Reports.
    (ii) A copy of the report should be sent to: Attn: ENC Encryption 
Request Coordinator, 9800 Savage Road, Suite 6131, Ft. Meade, MD 20755-
6000.
    (h) Distributors and resellers. U.S. or foreign distributors, 
resellers or other entities who are not original manufacturers of 
encryption commodities and software are permitted to use License 
Exception ENC only in instances where the export or reexport meets the 
applicable terms and conditions of Sec. 740.17.

PART 742--[AMENDED]

    15. Section 742.15 is revised to read as follows:


Sec. 742.15  Encryption items.

    Encryption items can be used to maintain the secrecy of 
information, and thereby may be used by persons abroad to harm national 
security, foreign policy and law enforcement interests. The U.S. has a 
critical interest in ensuring that important and sensitive information 
of the public and private sector is protected. Consistent with our 
international obligations as a member of the Wassenaar Arrangement, the 
U.S. has a responsibility to maintain control over the export of 
encryption items. As the President indicated in Executive Order 13026 
and in his Memorandum of November 15, 1996, export of encryption 
software, like export of encryption hardware, is controlled because of 
this functional capacity to encrypt information on a computer system, 
and not because of any informational or theoretical value that such 
software may reflect, contain, or represent, or that its export may 
convey to others abroad. For this reason, export controls on encryption 
software are distinguished from controls on other software regulated 
under the EAR.
    (a) License requirements. Licenses are required for exports and 
reexports to all destinations, except Canada, for items controlled 
under ECCNs having an ``EI'' (for ``encryption items'') under the 
``Control(s)'' paragraph. Such items include: encryption commodities 
controlled under ECCN 5A002; encryption software controlled under ECCN 
5D002; and encryption technology controlled under ECCN 5E002. Refer to 
part 772 of the EAR for the definition of ``encryption items''.
    (b) Licensing policy. The following licensing policies apply to 
items identified in paragraph (a) of this section. Except as otherwise 
noted, applications will be reviewed on a case-by-case basis by BXA, in 
conjunction with other agencies, to determine whether the export or 
reexport is consistent with U.S. national security and foreign policy 
interests. For subsequent bundling and updates of these items see 
paragraph (n) of Sec. 770.2 of the EAR.
    (1) Encryption commodities, software and technology under ECCNs 
5A992, 5D992 and 5E992. Certain encryption commodities, software and 
technology may, after classification by BXA as ECCNs 5A992, 5D992 or 
5E992, be released from ``EI'' or ``NS'' controls. Items controlled 
under these ECCNs are eligible for export and reexport to all 
destinations except Cuba, Iran, Iraq, Libya, North Korea, Sudan or 
Syria. Refer to Sec. 748.3(b)(3) of the EAR for additional information 
regarding classification requests. The following encryption items may 
be eligible for such treatment:
    (i) 56-bit encryption commodities, software and technology. 
Encryption commodities, software and technology up to and including 56-
bits with an asymmetric key exchange algorithm not exceeding 512 bits 
may be classified under ECCNs 5A992, 5D992 or 5E992.
    (ii) Key management products. Products which only provide key 
management with asymmetric key exchange algorithms not exceeding 512 
bits may be eligible for classification under ECCNs 5A992 or 5D992.
    (iii) 64-bit mass market encryption commodities and software. (A) 
Mass market encryption commodities and software with key lengths not 
exceeding 64-bit for the symmetric algorithm may be eligible for 
classification by BXA under ECCNs 5A992 or 5D992.
    Refer to the Cryptography Note (Note 3) to part 2 of Category 5 of 
the CCL for a definition of mass market encryption commodities and 
software. Key exchange mechanisms, proprietary key exchange mechanisms, 
or company proprietary commodities and software implementations may 
also be eligible for this treatment. Refer to Supplement No. 6 to part 
742 and Sec. 748.3(b)(3) of the EAR for additional information.
    (B) Mass market encryption commodities and software (e.g., 40 and 
56-bit DES or equivalent) previously eligible for License Exception TSU 
(or for hardware, ENC) may increase key lengths for the confidentiality 
algorithm up to 64 bits and still be exported as a mass market product 
without an additional review. Exporters must

[[Page 2500]]

certify to BXA in a letter from a corporate official the only change to 
the encryption product is the key length for confidentiality or key 
exchange algorithms and there is no other change in cryptographic 
functionality. Certifications must include the original authorization 
number issued by BXA and the date of issuance. BXA must receive this 
certification prior to any export of upgraded products. The 
certification should be sent to BXA, with a copy to ENC Encryption 
Request Coordinator at the following addresses:
    (1) Department of Commerce, Bureau of Export Administration, Office 
of Strategic Trade and Foreign Policy Controls, 14th Street and 
Pennsylvania Ave., N.W., Room 2705, Washington, DC 20230.
    (2) A copy of the report should be sent to: Attn: ENC Encryption 
Request Coordinator, 9800 Savage Road, Suite 6131, Ft. Meade, MD 20755-
6000.
    (iv) For classification of these encryption items under these 
ECCNs, mark ``NLR'' in Block 9: Special purpose, on Form BXA-748P, of 
your classification request.
    (2) Encryption commodities and software eligible for classification 
under ECCNs 5A002, 5D002 and 5E002 and qualified for License Exception 
ENC. Items classified by BXA as retail products under ECCNs 5A002 and 
5D002 are permitted for export and reexport to any end-user. All other 
encryption commodities, software and components classified by BXA under 
ECCNs 5A002 and 5D002 may be exported to any individual, commercial 
firm or other non-government end-user. Any encryption item (including 
technology classified under 5E002) will be permitted for export or 
reexport to U.S. subsidiaries (as defined in part 772). Products 
developed using U.S. encryption items are subject to the EAR. No 
exports are authorized to Cuba, Iran, Iraq, Libya, North Korea, Sudan 
or Syria.
    (3) Encryption licensing. Exporters may submit applications for 
licenses or Encryption Licensing Arrangements for exports and reexports 
of encryption items not eligible for license exception, including 
exports and reexports of encryption technology to strategic partners of 
U.S. companies (as defined in part 772). For Encryption Licensing 
Arrangements, the applicant must specify the sales territory and class 
of end-user. Encryption Licensing Arrangements granted for exports of 
unlimited quantities for all destinations except Cuba, Iran, Iraq, 
Libya, North Korea, Sudan or Syria, are valid for four years, and may 
require reporting.
    Licenses are required for exports of encryption items to 
governments, or Internet and telecommunications service providers for 
the provision of services specific to governments, and may be favorably 
considered for civil uses, e.g., social or financial services to the 
public; civil justice; social insurance, pensions and retirement; taxes 
and communications between governments and their citizens.
    16. Supplement No. 6 to Part 742 is revised to read as follows:

Supplement No. 6 to Part 742--Guidelines for Submitting a 
Classification Request for Encryption Items

    Classification requests for encryption items must be submitted on 
Form BXA-748P, in accordance with Sec. 748.3 of the EAR. Insert in 
Block 9: Special Purpose of the Form BXA-748P, the phrase ``License 
Exception ENC'' or ``NLR'', based on your classification request. 
Failure to insert this phrase will delay processing. In addition, the 
Bureau of Export Administration recommends that such requests be 
delivered via courier service to: Bureau of Export Administration, 
Office of Exporter Services, Room 2705, 14th Street and Pennsylvania 
Ave., NW, Washington, DC 20230. In addition, you must send a copy of 
the request and all supporting documents to: Attn: ENC Encryption 
Request Coordinator, 9800 Savage Road, Suite 6131, Fort Meade, MD 
20755-6000.
    (a) Requests for encryption items will be processed in thirty (30) 
days from receipt of a properly completed request.
    (b) To submit a classification request for a technical review of 
commodities and software, ensure that the information provided includes 
brochures or other documentation or specifications (to include 
applicable cryptographic source code) related to the technology, 
commodity or software, as well as any additional information which you 
believe would assist the review process. You must provide the following 
information in a cover letter to the classification request:
    (1) Clearly state at the top of the page either ``ENC'' or 
``NLR''--``30 Day Technical Review Requested;''
    (2) State that you have reviewed and determined that the commodity 
or software subject to the classification request meets the criteria of 
this Supplement;
    (3) State the name of the commodity or software product being 
submitted for review;
    (4) State how the commodity or software has been written to 
preclude user modification of the encryption algorithm, key management 
mechanism, and key space;
    (5) State that a duplicate copy has been sent to the ENC Encryption 
Request Coordinator;
    (6) Provide the following information for the commodity or software 
product:
    (i) Description of all encryption algorithms and key lengths, e.g. 
source code, and how the algorithms are used. If any combination of 
different algorithms are used in the same product, also state how each 
is applied to the data.
    (ii) Pre-processing information of plaintext data before encryption 
(e.g. compression of the data).
    (iii) Post-processing information of cipher text data after 
encryption (e.g. packetization of the encrypted data).
    (iv) For classification requests regarding object code or Java byte 
code, describe what techniques (including obfuscation, private access 
modifiers, final classes) are used to protect against decompilation and 
misuse.
    (v) For classification requests regarding components:
    (A) Reference the application for the components if known;
    (B) State if there is a general programming interface to the 
component;
    (C) State whether the component is constrained by function;
    (D) List any standards and protocols that the component adheres to;
    (E) Include a complete description of all functionalities and their 
accessibility; and
    (F) Encryption components need to be clearly identified to include 
the name of the manufacturer, component model number, or other 
identifier.
    (vi) For classification requests regarding source code:
    (A) If applicable, reference the executable product that has 
already received a technical review;
    (B) Include whether the source code has been modified and, if 
modified, provide the technical details on how the source code was 
modified;
    (C) Include a copy of the sections of the source code that contain 
the encryption algorithm, key management routines, and their related 
calls.

PART 770--[AMENDED]

    17. Section 770.2 is amended by adding new paragraph (n) to read as 
follows:


Sec. 770.2  Item interpretations.

* * * * *
    (n) Interpretation 14: Encryption commodity and software reviews. 
Classification of encryption

[[Page 2501]]

commodities or software is required to determine eligibility for all 
licensing mechanisms except source code (see Secs. 740.13(e) and 
740.17(a)(5)(i) of the EAR) and exports to subsidiaries of U.S. firms 
(see Sec. 740.17(a)(1)). Note that subsequent bundling, patches, 
upgrades or releases, including name changes, may be exported or 
reexported under the applicable provisions of the EAR without further 
technical review as long as the functional encryption capacity of the 
originally reviewed encryption product has not been modified or 
enhanced. This does not extend to products controlled under a different 
category on the CCL.
    18. Part 772 is amended by removing the definitions for ``Health/
medical end-user'' and ``On-line merchant'' and adding definitions for 
``asymmetric algorithm'', ``encryption component'', ``government end-
user'', ``open cryptographic interface'', and ``symmetric algorithm'' 
in alphabetical order, to read as follows:

PART 772--DEFINITIONS OF TERMS

* * * * *
    ``Asymmetric algorithm''. (Cat 5, Part II) A cryptographic 
algorithm using different, mathematically-related keys for encryption 
and decryption. A common use of ``asymmetric algorithms'' is key 
management.
* * * * *
    ``Encryption component''. Any encryption commodity or software 
(except source code), including encryption chips, integrated circuits, 
application specific encryption toolkits, or executable or linkable 
modules that alone are incapable of performing complete cryptographic 
functions, and is designed or intended for use in or the production of 
another encryption item.
* * * * *
    Government end-user (as applied to encryption items). A government 
end-user is any foreign central, regional or local government 
department, agency, or other entity performing governmental functions; 
including governmental research institutions, governmental corporations 
or their separate business units (as defined in part 772 of the EAR) 
which are engaged in the manufacture or distribution of items or 
services controlled on the Wassenaar Munitions List, and international 
governmental organizations. This term does not include: utilities 
(including telecommunications companies and Internet service 
providers); banks and financial institutions; transportation; broadcast 
or entertainment; educational organizations; civil health and medical 
organizations; retail or wholesale firms; and manufacturing or 
industrial entities not engaged in the manufacture or distribution of 
items or services controlled on the Wassenaar Munitions List.
* * * * *
    ``Open cryptographic interface''. A mechanism which is designed to 
allow a customer or other party to insert cryptographic functionality 
without the intervention, help or assistance of the manufacturer or its 
agents, e.g., manufacturer's signing of cryptographic code or 
proprietary interfaces. If the cryptographic interface implements a 
fixed set of cryptographic algorithms, key lengths or key exchange 
management systems, that cannot be changed, it will not be considered 
an ``open'' cryptographic interface. All general application 
programming interfaces (e.g., those that accept either a cryptographic 
or non-cryptographic interface but do not themselves maintain any 
cryptographic functionality) will not be considered ``open'' 
cryptographic interfaces.
* * * * *
    ``Symmetric algorithm''. (Cat 5, Part II) A cryptographic algorithm 
using an identical key for both encryption and decryption. A common use 
of ``symmetric algorithms'' is confidentiality of data.
* * * * *

PART 774--[AMENDED]

Supplement No. 1 to Part 774 [Amended]

    19. Supplement No. 1 to Part 774, Category 5--Telecommunications 
and Information Security, is amended:
    a. By revising, immediately following EAR 99, the heading for 
``Part 2--`Information Security,' '' removing the Note, and inserting 
in its place three new Notes;
    b. By revising the heading and the ``List of Items Controlled'' for 
ECCN 5A002; and
    c. By revising the Licensing Requirements section of ECCN 5D002 to 
read as follows:

Category 15--Telecommunications and ``Information Security''

* * * * *

II. ``Information Security''

    Note 1: The control status of ``information security'' 
equipment, ``software'', systems, application specific ``electronic 
assemblies'', modules, integrated circuits, components, or functions 
is determined in Category 5, Part 2 even if they are components or 
``electronic assemblies'' of other equipment.
    Note 2: Category 5, Part 2 encryption products, when 
accompanying their user for the user's personal use, are eligible 
for License Exceptions TMP or BAG.
    Note 3: Cryptography Note: ECCNs 5A002 and 5D002 do not control 
items that meet all of the following:
    a. Generally available to the public by being sold, without 
restriction, from stock at retail selling points by means of any of 
the following:
    1. Over-the-counter transactions;
    2. Mail order transactions;
    3. Electronic transactions; or
    4. Telephone call transactions;
    b. The cryptographic functionality cannot be easily changed by 
the user;
    c. Designed for installation by the user without further 
substantial support by the supplier;
    d. Does not contain a ``symmetric algorithm'' employing a key 
length exceeding 64-bits; and
    e. When necessary, details of the items are accessible and will 
be provided, upon request, to the appropriate authority in the 
exporter's country in order to ascertain compliance with conditions 
described in paragraphs (a) through (d) of this note. See 
Sec. 742.15(b)(1) of the EAR.
* * * * *


5A002  Systems, equipment, application specific ``electronic 
assemblies'', modules and integrated circuits for ``information 
security'', and other specially designed components therefor.

* * * * *

List of Items Controlled

    Unit: $ value.
    Related Controls: See also 5A992. This entry does not control: (a) 
``Personalized smart cards'' where the cryptographic capability is 
restricted for use in equipment or systems excluded from control 
paragraphs (b) through (f) of this note. Note that if a ``personalized 
smart card'' has multiple functions, the control status of each 
function is assessed individually; (b) receiving equipment for radio 
broadcast, pay television or similar restricted audience television of 
the consumer type, without digital encryption except that exclusively 
used for sending the billing or program-related information back to the 
broadcast providers; (c) portable or mobile radiotelephones for civil 
use (e.g., for use with commercial civil cellular radio communications 
systems) that are not capable of end-to-end encryption; (d) equipment 
where the cryptographic capability is not user-accessible and which is 
specially designed and limited to allow any of the following: (1) 
Execution of copy-protected ``software''; (2) access to any of the 
following: (a) Copy-protected read-only media; or (b) information 
stored in encrypted form on media (e.g., in connection with the 
protection of intellectual property rights) where the media is offered 
for sale in identical sets

[[Page 2502]]

to the public; or (3) one-time encryption of copyright protected audio/
video data; (e) cryptographic equipment specially designed and limited 
for banking use or money transactions; (f) cordless telephone equipment 
not capable of end-to-end encryption where the maximum effective range 
of unboosted cordless operation (e.g., a single, unrelayed hop between 
terminal and home basestation) is less than 400 meters according to the 
manufacturer's specifications.
    Related Definitions: (1) The term money transactions in paragraph 
(e) of Related Controls includes the collection and settlement of fares 
or credit functions.
    (2) For the control of global navigation satellite systems 
receiving equipment containing or employing decryption (e.g., GPS or 
GLONASS) see 7A005.
Items
    Technical Note: Parity bits are not included in the key length.

    a. Systems, equipment, application specific ``electronic 
assemblies'', modules and integrated circuits for ``information 
security'', and other specially designed components therefor:
    a.1. Designed or modified to use ``cryptography'' employing digital 
techniques performing any cryptographic function other than 
authentication or digital signature having any of the following:

    Technical Notes: 1. Authentication and digital signature 
functions include their associated key management function.
    2. Authentication includes all aspects of access control where 
there is no encryption of files or text except as directly related 
to the protection of passwords, Personal Identification Numbers 
(PINs) or similar data to prevent unauthorized access.
    3. ``Cryptography'' does not include ``fixed'' data compression 
or coding techniques.

    Note: 5A002.a.1 includes equipment designed or modified to use 
``cryptography'' employing analogue principles when implemented with 
digital techniques.

    a.1.a. A ``symmetric algorithm'' employing a key length in excess 
of 56-bits; or
    a.1.b. An ``asymmetric algorithm'' where the security of the 
algorithm is based on any of the following:
    a.1.b.1. Factorization of integers in excess of 512 bits (e.g., 
RSA);
    a.1.b.2. Computation of discrete logarithms in a multiplicative 
group of a finite field of size greater than 512 bits (e.g., Diffie-
Hellman over Z/pZ); or
    a.1.b.3. Discrete logarithms in a group other than mentioned in 
5A002a.1.b.2 in excess of 112 bits (e.g., Diffie-Hellman over an 
elliptic curve);
    a.2. Designed or modified to perform crypto analytic functions;
    a.3. [Reserved]
    a.4. Specially designed or modified to reduce the compromising 
emanations of information-bearing signals beyond what is necessary for 
the health, safety or electromagnetic interference standards;
    a.5. Designed or modified to use cryptographic techniques to 
generate the spreading code for ``spread spectrum'' or the hopping code 
for ``frequency agility'' systems;
    a.6. Designed or modified to provide certified or certifiable 
``multilevel security'' or user isolation at a level exceeding Class B2 
of the Trusted Computer System Evaluation Criteria (TCSEC) or 
equivalent;
    a.7. Communications cable systems designed or modified using 
mechanical, electrical or electronic means to detect surreptitious 
intrusion.
* * * * *


5D002  Information Security--``Software''.

License Requirements

    Reason for Control: NS, AT, EI.

------------------------------------------------------------------------
                Control(s)                          Country chart
------------------------------------------------------------------------
NS applies to entire entry................  NS Column 1
AT applies to entire entry................  AT Column 1
------------------------------------------------------------------------

    EI applies to encryption items transferred from the U.S. Munitions 
List to the Commerce Control List consistent with E.O. 13026 of 
November 15, 1996 (61 FR 58767) and pursuant to the Presidential 
Memorandum of that date. Refer to Sec. 742.15 of the EAR.

    Note: Encryption software is controlled because of its 
functional capacity, and not because of any informational value of 
such software; such software is not accorded the same treatment 
under the EAR as other ``software''; and for export licensing 
purposes, encryption software is treated under the EAR in the same 
manner as a commodity included in ECCN 5A002.

    Note: Encryption software controlled for ``EI'' reasons under 
this entry remains subject to the EAR even when made publicly 
available in accordance with part 734 of the EAR. See 
Secs. 740.13(e) and 740.17(5)(i) of the EAR for information on 
releasing certain source code which may be considered publicly 
available from ``EI'' controls.

    Note: After a technical review, 56-bit items, key management 
products not exceeding 512 bits and mass market encryption 
commodities and software eligible for the Cryptography Note (see 
Sec. 742.15(b)(1) of the EAR) may be released from ``EI'' and ``NS'' 
controls.

    License Exceptions: * * *
* * * * *
    20. Supplement No. 2 to part 774 (General Technology and Software 
Notes) is amended by revising the Note at the end of the Supplement to 
read as follows:

Supplement No. 2 to Part 774--General Technology and Software Notes

* * * * *
    Note: The General Software Note does not apply to ``software'' 
controlled by Category 5, Part 2 (``Information Security''). For 
``software'' controlled by Category 5, Part 2, see Supplement No. 1 
to Part 774, Category 5, Part 2, Note 3--Cryptography Note.

    Dated: January 11, 2000.
R. Roger Majak,
Assistant Secretary for Export Administration.
[FR Doc. 00-983 Filed 1-12-00; 9:04 am]
BILLING CODE 3510-33-P