Home >Policies and Regulations >Encryption >Encryption Policy Q&A
 

October 19, 2000

Encryption Policy

Questions and Answers

  1. Why is the Administration revising its encryption export policy?
     
  2. What is the encryption update based on?
     
  3. How does this new regulation compare with the regulations recently promulgated by the European Union?
     
  4. Will products using the newly proposed Advanced Encryption Standard standard be exportable?
     
  5. Will the Administration update the encryption policy again this year?
     
  6. Are Canadian subsidiaries included in the new policy of immediate export to the EU plus an additional eight countries?
     
  7. What happens to the pending license applications and classification requests that were submitted before this regulation was published?
     
  8. Is an open cryptographic interface the same as a "crypto-with-a-hole" product?
     
  9. What are some differences between "open" and "closed" cryptographic interfaces?
     
  10. What if my product contains encryption that must be "activated" prior to use?
     
  11. Can you self-classify an encryption item?
     
  12. What is the difference between a notification and classification request?
     
  13. What are the technical parameters for mass market products in the newly created Cryptography Note?
     
  14. Where do I send classification requests, key length increase certification letters, post-export reports and notifications?
     
  15. Can I increase the key length of my product without another review? How about if my product received "retail" eligibility?
     
  16. Are all encryption items "grandfathered"?
     
  17. Is there a review of the foreign product developed with U.S. encryption?
     
  18. May I use License Exception ENC to export encryption technology to my foreign parent that is not located in a Supplement 3 to Part 740 country?
     
  19. Where do network management products fit into the new policy?
     
  20. If I incorporate open source cryptography (eligible for License Exception TSU) into my product and then sell it, is the end-product also eligible for License Exception TSU?
     
  21. Do I have to post my source code in order to make it publicly available?
     
  22. For Internet exports, what constitutes reasonable and sufficient screening procedures to implement any restrictions that do exist under the regulations on exports to foreign government end-users?
     
  23. Does posting encryption source or object code on the Internet constitute an export under the EAR?
     
  24. Does the mere posting of publicly available source code establish knowledge of any prohibited export or reexport?
     
  25. Would posting to a "newsgroup" site fall within the types of eligible Internet posting methods for publicly available source code eligible under Section 740.13(e), License Exception TSU?
     
  26. Can an academic who creates an encryption source code program make it available on the Internet, for example to students or academic colleagues, without restriction on access?
     
  27. Will an intellectual property protection, such as a copyright, by itself, be construed as an express agreement for the payment of a licensing fee or royalty for the commercial production or sale of any product developed using the source code that would make encryption source code not eligible for export under License Exception TSU for publicly available "unrestricted" source code?
     
  28. Am I required under the EAR to actively screen for terrorist-supporting destinations?
     
  29. What is the purpose of the review and classification?
     
  30. Should I submit one classification request for my encryption product?
     
  31. Do I have to submit source code for a review and classification of my encryption product?
     
  32. When does the 30-day clock start for classification requests?
     
  33. If after 30 days I do not hear from BXA, and I export my encryption product, will it delay or influence my "retail" classification request?
     
  34. How do I track the process of my classification request?
     
  35. What encryption items will be considered for de minimis provision treatment?
     
  36. What is the effect of allowing some encryption product to be eligible for de minimis?
     
  37. How is the "retail" section of License Exception ENC implemented?
     
  38. Can you elaborate on the criteria used for defining "retail" products? Is it based on the distribution model and not the strength of the encryption?
     
  39. What "amount" is required for a product to qualify as "sold in large volume"?
     
  40. What is the difference between the definitions of "retail" and "mass market"?
     
  41. What is meant by the term "equivalent functionality" in the "retail" criteria?
     
  42. Could you elaborate on what constitutes a low-end server, router or firewall in the "retail" criteria?
     
  43. What types of services require a license?
     
  44. Do I still need to report exports of "network infrastructure" products to Telecommunications and Internet Service Providers by the time of export? What are some examples of "network infrastructure" products?
     
  45. Why is reporting still required?
     
  46. What does the new exception for single processor computers, laptops and hand-held devices mean for reporting?
     
  47. How do I determine whether the export of my "retail" product is being purchased and used by an individual, or is being purchased and used by an individual for multiple commercial use?
     
  48. What do you mean by "if collected" in the reporting requirements?
     
  49. If I want to export encryption components, toolkits and source code (other than to my U.S. subsidiaries) that's neither considered publicly available nor qualifying under the "retail" definition, what are my obligations under this new policy?
     
  50. Can you expand on what my specific reporting obligations are when exporting encryption components, toolkits and source code that's not publicly available?
     
  51. Can exporters request adjustments to the reporting requirements to better reflect their business models from BXA?
     
  52. How do I determine if my customer is a "government end-user"?
     
  53. If a U.S. company and foreign government end-user both own a percentage of a foreign company, is that company considered a "government end-user"?
     
  54. What still requires a license prior to export or reexport?
     
  55. May I use License Exception ENC to export encryption items to Cuba, Iran, Iraq, Libya, North Korea, Sudan or Syria?
     
  56. Can I submit an ELA for government end-users? How about for exports of technology?
     
  57. What is the licensing policy for exports of encryption products to government end-users?
     
  58. Are there export control restrictions on transfers of encryption items within the same country?
     
  59. If I am sending encryption technology to a U.S. subsidiary under License Exception ENC, what are my obligations under this new policy?
     
  60. If I want to export encryption commodities and software (in object code) that I know does not meet the "retail" definition, what are my obligations under this new policy?
     
  61. Do I need a license in order to provide source code to international standards organizations?
     
  62. Why is this regulation a "final rule"? Can I still comment on it?

General Policy

1. Why is the Administration revising its encryption export policy?

In 1998, the Vice President promised that we would continue to review our encryption policy and make the necessary updates taking into account market demand and advances in information technology while protecting the needs of privacy, national security and law enforcement. On September 16, 1999, the U.S. announced a new approach to its encryption control policy. The core of the export part of this policy rests on three principles: a technical review of encryption products in advance of sale, a streamlined post-export reporting system that takes into account industry's distribution models, and review of some exports to foreign government end-users. An implementing regulation was published on January 14, 2000 and the public commentary period was 120 days. The Administration committed to ensure U.S. exporters would not be disadvantaged by steps the European Union took to create a "free-trade zone". We reviewed the comments, and on July 17, 2000, the Administration announced further changes to our policy, and on October 19, 2000, we published a final encryption rule. The October rule permits most encryption products to be exported to the 15 nations of the European Union and 8 other trading partners, including Australia, Japan, New Zealand, Norway, Switzerland, Czech Republic, Poland, and Hungary. The new regulation tracks with recent regulations adopted by the European Union, thus assuring continued competitiveness of U.S. industry in international markets.

2. What is the encryption update based on?

In January 2000, we implemented an interim-final regulation based a new paradigm described above. At that time, we committed to take the necessary steps to ensure the U.S. exporters are not disadvantaged as a result of the European Union’s implementation of their dual-use regulation. The October rule makes our policy comparable to the EU’s and implements other updates based on industry’s comments to the January interim-final rule.

3. How does this new regulation compare with the regulations recently promulgated by the European Union?

This regulation allows American encryption exporters to effectively compete, consistent with the Administration’s January 2000 commitment. Exporters can now ship immediately, without waiting for a response, to EU countries and certain other major trading partners after filing a classification request with BXA. This covers all encryption products except cryptanalytic items (i.e., those specifically designed to break codes).

4. Will products using the newly proposed Advanced Encryption Standard standard be exportable?

These products will be exportable under License Exception ENC to all but sanctioned or embargoed countries.

5. Will the Administration update the encryption policy again this year?

In developing both the January and October 2000 regulations, the Administration worked closely with stakeholders to assure a workable and balanced approach. The October regulation is the final revised rule and implements changes based largely on public comments. While minor adjustments or clarifications may be needed, our intent is to allow both government and industry sufficient time to gain experience with the new regulation to continue to ensure workability. Industry will be able to take full advantage of the incorporated updates.

Specific Policy

6. Are Canadian subsidiaries included in the new policy of immediate export to the EU plus an additional eight countries?

Encryption items do not require authorization when exported to Canada. Canadian subsidiaries, for clarification purposes, are also included in the new policy allowing exports to the European Union and an additional eight countries under License Exception ENC after filing a classification request.

7. What happens to the pending license applications and classification requests that were submitted before this regulation was published?

The October regulation also contains a grandfathering@ clause, similar to the one in our January regulation, that allows exporters to use License Exception ENC to end-users located in the countries listed in Supplement 3 to Part 740 and non-government end-users outside of these countries if their encryption commodity or software was previously reviewed under a license, Encryption Licensing Arrangement or received License Exception ENC eligibility. However, to determine if your product qualifies for retail@, a separate classification and review is required by BXA. Additionally, pending applications will be reviewed under the new policy.

8. Is an open cryptographic interface the same as a "crypto-with-a-hole" product?

Yes. Any product that contains an interface that is not fixed and that permits a third party to insert cryptographic functionality, needs a binding mechanism to be considered a closed interface. Products that contain an open cryptographic interface may now be exported to end-users located in Supplement 3 to Part 740 countries under License Exception ENC. Exporters are encouraged to review the definition for "open cryptographic interface" in Part 772.

9. What are some differences between "open" and "closed" cryptographic interfaces?

Open cryptographic interfaces (OCIs) allow customers or other parties to insert their own cryptography, such as algorithms and key exchange mechanisms, without any intervention, help, or assistance from the manufacturer or its agents. An encryption product with an OCI provides an "open door" for the use of encryption that has not been authenticated or otherwise enabled for use with the product. By contrast, an encryption product which uses digital signatures, static binding, or other proprietary means to restrict access to the underlying cryptography is said to have a "closed" cryptographic interface.

10. What if my product contains encryption that must be "activated" prior to use?

The term "dormant cryptography" refers to items which, at the time of export, contain embedded cryptographic parts or components which are rendered functionally inert or inactive by design. This dormant cryptography must be "activated" or "enabled" (typically using special components or software purchased separately) by the manufacturer before it can be used to encrypt data. Items with "dormant cryptography", and the associated commodities, software, or technology by which the cryptography is enabled, are controlled under the EAR and subject to all applicable EI, NS, and AT controls.

11. Can you self-classify an encryption item?

Two categories of encryption items can be self-classified under ECCNs 5A992, 5D992 or 5E992. These items continue to be subject to AT1 controls. Encryption commodities and software specified under related controls under ECCN 5A002 on the Commerce Control List (CCL) do not require review (i.e., access control systems, data authentication equipment, certain smart cards, certain cellular telephones, etc.). The October regulation allows exporters to self-classify certain encryption commodities, software and technology under ECCN 5A992, 5D992 or 5E992. Encryption items eligible for this treatment are encryption items with key lengths up to and including 56-bits with an asymmetric key exchange algorithm not exceeding 512 bits; products which only provide key management with asymmetric key exchange algorithms not exceeding 512 bits; and mass market encryption commodities and software with key lengths not exceeding 64-bits for the symmetric algorithm. The Cryptography Note (Note 3) to part 2 of Category 5 of the CCL defines mass market encryption commodities and software. Before exporting these items, you must submit to BXA and the ENC Encryption Request Coordinator the information described in Supplement 6 to Part 742. All other encryption items controlled under ECCNs 5A002, 5D002 and 5E002 require a review, either through a classification request or a license (both an individual license and an ELA), by BXA. (This review requirement does not apply to publicly available source code eligible under Sections 740.13(e) and 740.17(b)(4)(i), which require written notification by the time of export. Also, exports to U.S. subsidiaries do not require a review when used for internal purposes (see Section 740.17(b)(1))

Reminder: We do suggest that you have these items formally classified by BXA if you are unsure of the proper classification.

12. What is the difference between a notification and classification request?

A classification request is a formal submission to BXA in which BXA will respond with an official classification of the item submitted. For encryption, we also review the item for license exception eligibility, such as License Exception ENC or KMI. A notification, on the other hand, is a requirement that certain information be submitted to BXA. While such information may be spot-checked for compliance, BXA will not issue an official response. The exporter is responsible for classifying his/her product correctly and submitting in information specified in Supplement 6 to Part 742. Two types of product notifications are implemented by the October rule (1) NLR self-classifications; and (2) applications for the export of beta test encryption software. Both require submission of the information described Supplement 6 to Part 742 to BXA prior to export. Exporters should submit the notification electronically to BXA to crypt@bxa.doc.gov.

13. What are the technical parameters for mass market products in the newly created Cryptography Note?

The Cryptography Note in Part 774 states that ECCNs 5A002 and 5D002 do not control encryption items that meet certain distribution and technical criteria. The technical criteria are that the cryptographic functionality cannot be easily changed by the user, the product is designed for installation by the user without further substantial support by the supplier, and the product does not contain a "symmetric algorithm" using a key length greater than 64-bit. Note that exporters may now self classify items that meet the criteria of the Cryptography Note after submitting the information in Supplement 6 to Part 742. Technical information on the product must be available, upon request, to BXA.

14. Where do I send classification requests, key length increase certification letters, post-export reports and notifications?

(A) For commodity classification requests, send the original BXA Form 748P, 748P-A (if applicable) and support documents to the Bureau of Export Administration, U.S. Department of Commerce, 14th Street and Pennsylvania Avenue, N.W., Room 2705, Washington, D.C. 20444, Attn: "Application Enclosed". A copy of the entire application (forms and supporting documents) must also be mailed to Attn: ENC Encryption Request Coordinator, 9800 Savage Road, Suite 6131, Ft. Meade, MD 20755-6000. Failure to follow these instructions for submitting commodity classification requests will result in delays.

(B) For post-export reports, certification letters, and notifications, you may submit them electronically viae-Mail (suggested file formats include Spreadsheets, tabular text or structured text), or send it in electronic form (e.g., disk or CDROM) to the Department of Commerce, Bureau of Export Administration, Office of Strategic Trade and Foreign Policy Controls, 14th Street and Pennsylvania Avenue, N.W., Room 2625, Washington, DC 20230, Attn: Encryption Reports. A copy must also be mailed to Attn: ENC Encryption Request Coordinator, 9800 Savage Road, Suite 6131, Ft. Meade, MD 20755-6000. Please indicate the type of report, certification, or notification on the subject line as indicated in licensing guidance on this web page.

15. Can I increase the key length of my product without another review? How about if my product received "retail" eligibility?

You may increase the confidentiality or key exchange algorithm's key length of your encryption product without another review, e.g., 56-bit DES to 168-bit 3DES, and be eligible for export under License Exception ENC to any end-user located in the Supplement 3 to Part 740 countries and any non-government end-user outside of these destinations. However, no other change in the encryption functionality is permitted under this provision in the EAR. A letter certifying the key length increase should be sent to BXA. You may also register a key length upgrade via letter for products that were classified as "retail".

16. Are all encryption items "grandfathered"?

Most encryption items are "grandfathered" if they were previously reviewed under a license, Encryption License Arrangement (ELA) or classified as eligible to use License Exception ENC. You may now use License Exception ENC to export to any end-user located in the Supplement 3 to Part 740 countries and to non-government end-users outside the EU+8. The only classifications that can not be "grandfathered" are ones granted to U.S. subsidiaries under License Exception ENC prior to the January 2000 regulation.

17. Is there a review of the foreign product developed with U.S. encryption?

No, a review of the foreign product is not required. For instance, the foreign "enabled" product is not subject to review. However, and limited reporting is required as specified in §740.17(e)(3). In case of a product developed by a U.S. subsidiary, the developed encryption product requires a review and classification, since the original export to the U.S. subsidiary was not reviewed by BXA.

18. May I use License Exception ENC to export encryption technology to my foreign parent that is not located in a Supplement 3 to Part 740 country?

License Exception ENC, as it pertains to exports of technology (not products), can only be used if the end-user meets the definition of U.S. subsidiary (as defined in Part 772 of the EAR). Exporters may submit ELAs to export technology to their foreign parent or subsidiaries; however, the foreign product developed with this technology is not subject to a review and licensing by BXA.

19. Where do network management products fit into the new policy?

Safe, efficient, and reliable public networks are essential our national critical infrastructure, and for the sustained growth of global electronic commerce. Many system administration, Public Key Infrastructure (PKI), and other products that are designed for the secure management, configuration, or administration of public networks, but which themselves are not capable of encrypting high volume communications across the network, have been made eligible for export as "retail" products. Further, when licenses are required for exports to governments for network management products that are not classified as retail, they will be considered favorably for civil end uses.

20. If I incorporate open source cryptography (eligible for License Exception TSU) into my product and then sell it, is the end-product also eligible for License Exception TSU?

Commercial encryption products, both retail and non-retail, which implement "EI"-controlled cryptographic functionality (such as 128-bit symmetric encryption), are not eligible for License Exception TSU. Commercial products may incorporate encryption from any number of sources, including commercial toolkits, open source encryption libraries, or proprietary components. All commercial encryption products that do not provide an open cryptographic interface are eligible for export under license exception ENC, regardless of the source of the underlying encryption.

21. Do I have to post my source code in order to make it publicly available?

No. Source code does not have to be posted on the Internet in order to be considered publicly available. For instance, source code distributed at open sessions of international standards bodies is considered to have been made publicly available.

Internet Posting and Sales

22. For Internet exports, what constitutes reasonable and sufficient screening procedures to implement any restrictions that do exist under the regulations on exports to foreign government end-users?

The web site must be configured to check the Internet Protocol (IP) address of the person requesting the encryption product for transfer or download to ensure that the requester's address is not a foreign government domain name. In addition, the receiver of the encryption download or transfer must indicate that the software is not intended to be used by a government end-user. The web site must also inform the receiver or requestor the software is subject to the EAR, and it cannot be transferred without a license or other authorization. See Section 734.2(b)(9)(iii).

23. Does posting encryption source or object code on the Internet constitute an export under the EAR?

Yes, it can as the definition of the export of encryption source code and object code software under the provisions of section 734.2(b)(9) includes such action. For publicly available source code under sections 740.13(e) and 740.17(b)(4)(i), while such source code is exempted under section 734.2(b)(9)(ii) and (iii), and is thus not subject to those provisions (including screening procedures), the source code nonetheless remains subject to the EAR. Please note that section 734.2(b)(9)(i) defines "export" to include the actual shipment, transfer, or transmission out of the United States or transfer in the United States to an embassy or affiliate of a foreign country. For all other encryption source code and object code software, posting constitutes an export unless the person making the software available on the Internet takes precautions to prevent unauthorized transfers.

24. Does the mere posting of publicly available source code establish knowledge of any prohibited export or reexport?

Posting of publicly available source code on the Internet (e.g., FTP or World Wide Web site), where it may be downloaded by anyone, would not establish "knowledge" (as that term is defined in the EAR) of a prohibited export or reexport, i.e., an export or reexport that would otherwise require a license. Such posting would not trigger "red flags" necessitating the affirmative duty to inquire under the "Know Your Customer" guidance provided in Supplement No. 3 to Part 732. Compliance with EAR requirements as to prohibited exports and reexports (see the General Prohibitions in Part 736) still apply. So, for example, a license would be required for you to e-mail or directly transfer such source code to a national located in a prohibited country (e.g., Sudan) or to a prohibited end-user (e.g., an entity listed on BXA's Entity List found at Supplement No. 4 to Part 744).

25. Would posting to a "newsgroup" site fall within the types of eligible Internet posting methods for publicly available source code eligible under Section 740.13(e), License Exception TSU?

Yes. The listing of eligible Internet postings described in License Exception TSU, e.g., FTP and World Wide Web site, is illustrative in nature, not exclusive.

26. Can an academic who creates an encryption source code program make it available on the Internet, for example to students or academic colleagues, without restriction on access?

Yes, under the revised regulations, encryption source code that would be publicly available (and posting to the Internet itself would make it publicly available), and which is not subject to an express agreement for the payment of a licensing fee or royalty for the commercial production or sale of any product developed using the source code, would be eligible under License Exception TSU for "unrestricted" source code. Under this policy, the software may be exported without prior submission to the government for technical review (although concurrent notification of the export is required). In addition, software exported under this exception may be posted to the Internet without restriction and would not be subject to any requirement to screen for access. Also, such posting would not constitute knowledge of an export to a prohibited destination under the EAR, including one of the seven terrorist states. A license requirement would apply only to knowing exports and reexports (i.e., direct transfer or e-mail) of the software to prohibited end-users and destinations. In addition, exporters are not restrained from providing technical assistance (as described in Section 744.9) to foreign persons working with such source code.

27. Will an intellectual property protection, such as a copyright, by itself, be construed as an express agreement for the payment of a licensing fee or royalty for the commercial production or sale of any product developed using the source code that would make encryption source code not eligible for export under License Exception TSU for publicly available "unrestricted" source code?

No.

28. Am I required under the EAR to actively screen for terrorist-supporting destinations?

In your business practice, it is prudent to use a standard of care to ensure that you will not violate any of the prohibition identified in the EAR. The EAR does not require a person posting software on the Internet to implement screening procedures for the terrorist countries. For publicly available source code exported under a license exception, once such source code is posted to the Internet, a license requirement exists or remains for "knowing" transfers (i.e., direct transfer or e-mail) to a prohibited end-user or destination. For any "retail" or other encryption software exported under a license exception by means of Internet posting, export restrictions to the seven terrorist states remain in place and exporters should take the steps necessary to prevent an export in violation of such restrictions. The "Know Your Customer" guidance in Supplement No. 3 to Part 732 provides companies with guidelines on how to comply with their responsibilities under the EAR. Please note that section 734.2(b)(9)(iii) contains screening procedures to prevent the transfer of certain encryption software to foreign government end-users.

Classifications

29. What is the purpose of the review and classification?

U.S. origin encryption hardware, software, and technology items, which are controlled for "EI" reasons under the Export Administration Regulations (EAR), may be exported under license or license exception. Through commodity review and classification, BXA determines the export eligibility of "EI" items. Other Information Security commodities and technology, which are released from "EI" controls, do not require authorization for export under license or license exception ENC, and therefore do not require formal classification by BXA.

30. Should I submit one classification request for my encryption product?

One classification request should be submitted for eligibility to export under License Exception ENC. We envision that a product will qualify for either "retail" or "non-retail" treatment, and therefore, exporters should submit one classification and not separate ones for authorization to export under each provision of License Exception ENC.

31. Do I have to submit source code for a review and classification of my encryption product?

For certain products, government review of source code may be required as provided in Supplement 6 to part 742. As with all transactions, the U.S. government considers this information confidential. Please note that publicly available source eligible under sections 740.13(e) and 740.17(b)(4)(i) does not require prior review and classification but rather written notification by the time of export.

32. When does the 30-day clock start for classification requests?

The 30-day clock begins on the day BXA receives your classification request, and it is logged into our system. You should check the automated system "STELA" by calling 202-482-2752. Your application must be in the system for 30 calendar days before you can use the provision to export and reexport to any non-government end-user located outside the countries listed in Supplement 3 to part 740 any encryption product eligible under License Exception ENC unless otherwise notified by BXA.

33. If after 30 days I do not hear from BXA, and I export my encryption product, will it delay or influence my "retail" classification request?

No, your classification request will not be delayed or treated any differently than any other application.

34. How do I track the process of my classification request?

You may call "STELA" to determine if your classification request is entered into our system at 202-482-2752. If you do not hear from us, your request is moving through the review process. Please read the relevant parts of the Export Administration Regulation (EAR) to determine where your product fits within the encryption policy and Supplement 6 to Part 742 of the (EAR) before you submit your classification request. Also, additional guidance is located on the web page. for submitting notifications, license applications and classification requests. If we have any questions or need more information, we will contact you.

35. What encryption items will be considered for de minimis provision treatment?

Examples of encryption items that may be considered for de minimis include software programs such as e-mail, browsers, games, word processing, database, financial applications or utilities that are designed for, bundled with, or pre-loaded on single CPU computers, laptops, hand-held devices, or components. Also, components or software designed for use in retail communication devices such as wireless devices or smart cards, or decontrolled products. Exporters applying for de minimis eligibility must explain why the part or component would qualify for de minimis treatment in the support documents included with the classification request. De minimis eligibility continues to apply to encryption items controlled under ECCNs 5A992, 5D992 and 5E992.

36. What is the effect of allowing some encryption product to be eligible for de minimis?

This change, when implemented, will allow certain retail encryption products, such as components which will be incorporated into foreign-made consumer items, to be made eligible for de minimis treatment after a review for national security interests. Exporters cannot make this determination on their own. They need written confirmation from BXA that their product is eligible for de minimis. Then, if the U.S.-origin component as embedded in the foreign product meets the de minimus calculations, it is no longer subject to US export regulations. Note that this rule does not affect de minimis calculations.

"Retail" Products

37. How is the "retail" section of License Exception ENC implemented?

A classification is necessary to determine whether an encryption product qualifies as "retail". The review process is similar to what has been done in the past, however, exporters should review the retail section of License Exception ENC and address how their products meet the listed criteria. BXA will work with exporters to gather any additional necessary information. We strive for this review and classification to take no longer than other classification requests.

38. Can you elaborate on the criteria used for defining "retail" products? Is it based on the distribution model and not the strength of the encryption?

Criteria:
The "retail" section of License Exception ENC contains four sets of encryption products.

The first set is encryption commodities or software that are generally available to the public by being (1) sold through retail outlets, (2) specially designed for individual consumer use, or (3) which are or will be sold in large volume without restrictions through mail order, electronic or telephone sales. For encryption products to qualify as "retail" under this first part, your encryption product has to be distributed in one of these three ways. However, these products cannot:

(a) allow the cryptographic functionality to be easily changed by the user, (b) require substantial support to install and use, (c) be modified or customized for the customer and (d) be designed to be used as network infrastructure products. If your product meets the above criteria, then it may be considered "retail". The regulation contains an illustrative but not restricted list of examples of the types of products that are considered "retail" under this section. All of this is taken into account to qualify for "retail", it is not based on the key length of the encryption items.

The second set is those products that function similarly to other products classified as "retail". The products are reviewed for their overall functionality and not simply their security functions. We intend to compare products which are similar in function, but may be incorporated differently, i.e., bundled vs. standalone.

The third set of products is finance-specific products that are restricted by design for such functions as e-commerce and financial transactions. These products are highly field formatted and are not capable of performing general purpose encryption, such as e-mail messaging. Inclusion in this category is not based on the algorithm keysize. Also included in this set are non-mass market 56-bit products with asymmetric key exchanges between 512 to 1024-bits. These products are based on the key length of the encryption. Exporters may submit a classification request for this set of products and export immediately.

The last set is items which would be controlled only because they incorporate components or software which provide short-range wireless encryption functions. These items may be exported without review and classification by BXA and without reporting under the retail provisions of License Exception ENC. These include consumer products, for example, audio devices, cameras and videos, computer accessories, hand held devices, mobile phones and consumer appliances (e.g., refrigerators, washing machines and microwave ovens) that communicate with each other via short range wireless technologies. Examples of these types of technology are Bluetooth and HomeRF. A review and classification is still required for the components and software that is used to develop the end- products.

39. What "amount" is required for a product to qualify as "sold in large volume"?

A "retail" encryption product that is "sold in large volume" is produced and widely available through various distribution methods. While there is not an exact amount, most products that will qualify under this set are produced in the thousands of units per month. Additionally, we are now permitting new products that will be sold in large volume to qualify for this criterion on a case-by-case basis. Exporters should include in their support documents projections of sales. For instance, the introduction of a new firewall product’s sales may be based on the sales of the existing firewall product line. Most likely, however, it will take time for a start-up company to establish its products in the marketplace, these will be reviewed on a case-by-case basis.

40. What is the difference between the definitions of "retail" and "mass market"?

We recognize that certain encryption products are distributed through various channels, making it impossible, in practical terms, to control who the end-user may be. We have accommodated several of industry's aims by creating a new regulatory category called "retail". While the "retail" and the category "mass market" are not equivalent, the retail definition includes significant flexibility. In practice, many products are classified as retail.

41. What is meant by the term "equivalent functionality" in the "retail" criteria?

The term "equivalent functionality" is not limited to comparing two products' encryption security features. Rather it is the overall functionality of the entire product. We compare products that function similarly, regardless if the product contains embedded capabilities or is a standalone item.

42. Could you elaborate on what constitutes a low-end server, router or firewall in the "retail" criteria?

Since January, we have allowed many low-end servers, routers and firewalls that are designed for small office networks or home offices to qualify for "retail". These products are sold in large volume and widely available through various distribution methods. These are encryption products that are not designed to handle large throughput or network traffic.

Telecommunications and Internet Service Providers

43. What types of services require a license?

In certain instances, a license is required to provide encryption services to government end-users outside of the countries located in Supplement 3 to Part 740. Under License Exception ENC, Internet and telecommunications service providers may use retail products to provide service to any end-user. However, they will require a license to provide services using products not classified as retail to government end-users outside of the countries located in Supplement 3 to Part 740. Examples are WANs, LANs, VPNs, voice and dedicated-link services; application specific and e-commerce services, and PKI encryption services specifically for government end-users only.

44. Do I still need to report exports of "network infrastructure" products to Telecommunications and Internet Service Providers by the time of export? What are some examples of "network infrastructure" products?

No, exports to Telcos and ISPs are now in accordance with the semi-annual requirement. Examples of "network infrastructure" products include high-end switches or routers, which are designed for large volume communications.

Reporting Requirements

45. Why is reporting still required?

Reporting is essential to protect our national security interests. Changes in this regulation have streamlined and reduced the reporting requirement to that which is most important.

46. What does the new exception for single processor computers, laptops and hand-held devices mean for reporting?

This new exception means that no reporting is required for exports of single processor computers, laptops and hand-held devices when pre-loaded or bundled with encryption software.

47. How do I determine whether the export of my "retail" product is being purchased and used by an individual, or is being purchased and used by an individual for multiple commercial use?

When an individual buys a "retail" product, there is no reporting requirement. However, companies may determine this in a variety of ways, e.g., the number of seats or user licenses purchased, screening for business vs. individual uses, etc.

48. What do you mean by "if collected" in the reporting requirements?

During the normal course of business, exporters may gain information about the ultimate end-user depending on their contractual relationship with the distributor or reseller. In these instances, BXA would like that information included in their reports. This clause is not designed to alter or strain the exporter's current business practice.

49. If I want to export encryption components, toolkits and source code (other than to my U.S. subsidiaries) that's neither considered publicly available nor qualifying under the "retail" definition, what are my obligations under this new policy?

You are required to submit a classification request to BXA prior to exporting the commodity or software. However, for exports to the Supplement 3 to Part 740 countries, you may export immediately after you submit a completed classification. For non-government end-users outside of these destinations, you may export after your classification request has been in our system for 30 days. There are some post-export reporting requirements; however, there are no further licensing restrictions. Additionally, no review of the foreign developed product is required.

50. Can you expand on what my specific reporting obligations are when exporting encryption components, toolkits and source code that's not publicly available?

When sold to foreign manufacturers, post-export reporting is limited to the name and address of the manufacturer plus any non-proprietary information of the foreign products developed when manufactured for commercial sale. This information might include brochures, other documentation, descriptions or other identifiers of the final foreign product; the algorithm and key lengths used; general programming interfaces to the product, if known; any standards or protocols that the foreign product adheres to; and source code, if available. If for the manufacturer's internal use, only the name and address is required.

51. Can exporters request adjustments to the reporting requirements to better reflect their business models from BXA?

Exporters may request adjustments to the reporting requirements in a letter submitted to BXA. The information provided must include the specific products and reasons justifying why adjustments should be approved. These requests will be reviewed on a case-by-case basis, and BXA will issue a formal response to the exporter.

Government End-Users

52. How do I determine if my customer is a "government end-user"?

The January regulation added a definition of "government end-user" in Part 772. The definition covers government organizations at the central, regional, and local levels, which are departments, agencies, or entities performing governmental functions. Review the definition carefully for examples of organizations that are included in the definition and organizations which are not. For example, a governmental corporation that manufactures or distributes items or services controlled on the Wassenaar Munitions List is a "government end-user." (You can access the Wassenaar Munitions List at the following URL address: www.wassenaar.org.) Excluded from the definition are organizations that may be wholly or partially government-owned, but have certain specific purposes. Such organizations include utilities, such as gas, electricity, telecommunications providers and Internet service providers; transportation, such as train systems, subway systems and airport authorities, broadcast or entertainment, such as television broadcasters; educational organizations, such as schools, colleges and universities; civil health and medical organizations, such as hospitals and clinics; retail or wholesale firms; and manufacturers or industrial entities that do not manufacture or distribute Wassenaar List items or services.

If you are unsure of whether a particular end-user meets the definition, you may submit an advisory opinion request to the Bureau of Export Administration, or submit a license application for your transaction.

53. If a U.S. company and foreign government end-user both own a percentage of a foreign company, is that company considered a "government end-user"?

In such cases involving foreign government ownership, exporters must review the definition of "government end-user" to see if the foreign company qualifies. However, control or involvement of a foreign government in the foreign subsidiary of the U.S. company does not constitute ownership.

Licensing Policy (Outside the Supplement 3 to Part 740 Countries)

54. What still requires a license prior to export or reexport?

Licenses are required to export and reexport certain items to end-users located outside of the Supplement 3 to Part 740 countries. Examples include technology controlled under ECCN 5E002, encryption products that contain an open cryptographic interface (OCI) and products that do not qualify as "retail" when exported to government end-users. In addition, all exports to the terrorist or embargoed countries require a license.

55. May I use License Exception ENC to export encryption items to Cuba, Iran, Iraq, Libya, North Korea, Sudan or Syria?

You must apply for a license to export encryption items to the above-noted terrorist-supporting countries as well as other embargoed destinations, e.g., Serbia and the Taliban controlled areas of Afghanistan. For specific information, you may contact BXA's Office of Strategic Trade & Foreign Policy Controls or, depending on the country, the Treasury's Office of Foreign Asset Controls (URL: www.treas.gov/ofac).

56. Can I submit an ELA for government end-users? How about for exports of technology?

In general, you will have to submit individual licenses for exports of encryption products to entities that meet the "government end-user" definition. However, applications for ELAs for government end users may be considered on a case-by-case basis. In such applications, you should be as specific as possible concerning the country or countries, the government entity or entities who will be using the products, and the end-use of the product.

Exporters may submit applications for ELAs for exports of encryption technology to strategic partners of U.S. companies. In addition, foreign companies with subsidiaries in the United States may apply for ELAs to export encryption technology to its worldwide locations. All ELA applications will be reviewed on a case-by-case basis and are valid for four years.

57. What is the licensing policy for exports of encryption products to government end-users?

The licensing policy for exports of encryption products to entities that meet the "government end-user" definition is described in Section 742.15(b)(3). Applications for civil end uses, such as social or financial services to the public, civil justice, social insurance pensions and retirement, taxes, and communications between governments and their citizens will be favorably considered. This reflects the existing licensing practice for government end-users. Applications for other end-uses will be reviewed on a case-by-case basis.

58. Are there export control restrictions on transfers of encryption items within the same country?

In-country transfers of encryption items (which have not been classified as retail) to foreign government end-users are prohibited unless otherwise authorized by license or license exception.

59. If I am sending encryption technology to a U.S. subsidiary under License Exception ENC, what are my obligations under this new policy?

You are not required to submit any documentation to BXA prior to export. A review and classification is required before any sale or transfer outside of the U.S. company with limited reporting requirements.

60. If I want to export encryption commodities and software (in object code) that I know does not meet the "retail" definition, what are my obligations under this new policy?

You are required to submit a classification request to BXA prior to exporting the commodity or software. However, for exports to end-users located in the Supplement 3 to Part 740 countries, you may export immediately after you submit a completed classification. For non-government end-users outside of these destinations, you may export after your classification request has been in our system for 30 days. There are some post-export reporting requirements; however, there are no further licensing restrictions. Exporters should also review section 740.17(e)(2) regarding "grandfathering" of existing products, in which case an additional classification is not required.

61. Do I need a license in order to provide source code to international standards organizations?

Source code provided to an international standards body for distribution at open meetings is considered to have been made publicly available. However, if you provide proprietary source code to a standards body with a stipulation that the code is not made public (e.g. restricted to a select group of committee members), then your code is not considered publicly available.

62. Why is this regulation a "final rule"? Can I still comment on it?

The January rule implemented the Administration's new approach to encryption policy and was published as an interim final with a request for comments. The October rule implements the Administration’s commitment to make our policy comparable to our European Union partners, and took into account the comments on the January regulation. Although there is no formal comment period, public comments on this regulation are welcome on a continuing basis.

 

                          

 
FOIA | Disclaimer | Privacy Policy Statement | Information Quality
Department of Commerce | Contact Us