Michael Pender U.S. Department of Commerce December 14, 2011.

Slides:



Advertisements
Similar presentations
RP Designs Semi-Custom e-Commerce Package. Overview RP Designs semi- custom e-commerce package is a complete website solution. Visitors can browse a catalog.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Chapter 1 Business Driven Technology
U.S.-India Dual-Use Export Policies and Procedures November 2004.
Export Control Overview John R. Murphy Business Development Manager Sartomer Company October 4, 2004 Boston, MA.
Misty Rutter Global Trade Business Engagement October 6, 2010
1 Encryption Update Ken Delaporta, Director of Operations and Export Compliance.
PACE Technologies – 3601 E. 34 th St. Tucson, AZ Telephone: FAX: ExitNextBack
EXPORT ADMINISTRATION REGULATIONS (EAR) Research and Economic Development MAY 28, 2013 John Jacobs.
Lesson-8 Information System Building Blocks
How to Determine If You Need a Commerce Export License Relatively small percentage of total U.S. exports require a Validated License Most products are.
U.S. Trade Controls: Important Considerations for Canadian Technology Companies Before the Canadian Information Technology Law Association Jack A. Levy.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
1 CS 502: Computing Methods for Digital Libraries Lecture 25 Access Management.
© 2003, Educational Institute Chapter 11 System Selection Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
ISIC Rev.4 draft, Section K “Information and communication” United Nations Statistics Division WS-ECE 09/04.
Bureau of Industry and Security U.S. Department of Commerce Dual-Use Export Controls and the Commerce Control List.
UCAR/NCAR/UCP Export Compliance EOL MAC FL
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Modernizing Export Controls ABA International Law Section Matthew S. Borman Acting Assistant Secretary for Export Administration Bureau of Industry and.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
U.S. Dual-Use Export Controls for the Aerospace Industry
JDF in the Inter-Enterprise Workflow Achieving JDF workflow automation.
Company Profile ► Our Expertise Here at SIEMSTECH we have a passion for designing and implementing integrated, network-centric technology solutions across.
Le Bourget June 17, 2009 U.S. Dual-Use Export Controls for the Aerospace Industry Gene Christiansen Kelly Gardner U.S. Department of Commerce Bureau of.
Information Technology Networked Computer Systems –Linking individual computers to create an organizational network for communication and information.
Exporting and Logistics: Special Issues for Business Chapter 15 McGraw-Hill/Irwin© 2005 The McGraw-Hill Companies, Inc. All rights reserved.
Deemed Exports by Margaret Jones Hopson September 16, 2008.
On-Line Information Systems Choice, Criteria and Design ESTELLA ADAMIDOU, ARISTEA – ALEXANDRA PRIGKOU MSc in Finance and Financial Information Systems.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
The UK WEEE Regulations What do I need to do? The WEEE Regulations What do I need to do? Outline Objectives of the WEEE Regulations What is WEEE An overview.
CHAPTER 6 Business-to-Business Markets: How and Why Organizations Buy M A R K E T I N G Real People, Real Choices Fourth Edition.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
Department of Commerce (DOC) Department of Commerce (DOC) Bureau of Industry and Security (BIS) Bureau of Industry and Security (BIS) George H. Loh George.
Dealing with Commercial Entities: Selected Export Control Issues 2003 ECCO Training Seminar June 4, 2003 Peter L. FlanaganEric D. Brown
Steps in the Exporting Process
Advertising and Sales Promotion ©2013 Cengage Learning. All Rights Reserved. Chapter 5.
ISO/IEC 27001:2013 Annex A.8 Asset management
AES Seminar Compliance with the Export Administration Regulations (EAR) in AES EEI Filings.
1 WSPP EC SLIDES FOR AGENDA ITEMS 3 AND 4 WSPP SERVICE SCHEDULE C WSPP Service Schedule C includes a provision allowing interruption “to meet Seller’s.
© 2009 South-Western, Cengage LearningMARKETING 1 Chapter 12 BUSINESS-TO-BUSINESS MARKETING 12-1Business-to-Business Exchanges 12-2Making Business Purchase.
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Main tasks of system analysis ? 1-study exit=sting information system 2-identify problem 3-spelify system requirement 4-asalysis decision ========= How.
Management Information Systems, 4 th Edition 1 I. Sharing Information Systems Vertical market –A market in which the goods of one business are used as.
Andreas Teuchert, Arrow Central Europe GmbH Munich, 21st January, 2014 Encryption Export Controls.
Ecommerce Application Development For Online Selling Via Web and Mobile Application Electronic commerce, commonly known as e-commerce, is a type of industry.
Office of Export Enforcement Bureau of Industry and Security (BIS) U.S. Department of Commerce Anthony Levey Special Agent in Charge Los Angeles Field.
CONTENTS exporting machinery, apparatus, partial products etc. free of charge used for the purpose of urgent repairs.
Overview of Department of Commerce Export Controls for Chemical and Biological Items.
WASTE BATTERIES AND ACCUMULATORS REGULATIONS 2009.
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE Chapter 11 1 CHAPTER Computer Systems Business Applications of.
6-1 Business-to-Business Marketing Marketing of goods and services that businesses and organizations buy for purposes other than personal consumption –Manufacturers.
Classification of Items on the Commerce Control List
Export Control Laura Langton, PhD Export Control Manager
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Designing a Production Plan
Information Systems: Concepts and Management
Management Information Systems
Virtual Private Networks (VPN)
12 E-Commerce Overview.
Chapter 19 Managerial Accounting
Chapter 2 The Sources of Software
E-Commerce in Agribusiness
Copyright, Designs and Patents Act 1988
Handout 5: Business markets
Automating Profitable Growth™
Chapter 3 Software.
Presentation transcript:

Michael Pender U.S. Department of Commerce December 14, 2011

 What are encryption items that require authorization to export?  When is authorization required for exporting encryption items?  What kinds of export authorization are available?  How to apply for authorization to export an encryption item  Differences between a “review request” and a ‘notification’  Differences between ‘restricted’, ‘unrestricted’ and “mass market” encryption items

 Any item exported from the United States  Reexports of U.S. origin items  Foreign-made products incorporating greater than de minimis U.S. controlled content  Certain foreign-made direct product of U.S. technology

 Remote access to a system  Encrypted data  Music/video/multimedia (we control the software and equipment that encrypts/decrypts, not the content)  Compression  Coding techniques for reliable transmission (e.g. CDMA, parity bits)  Medical devices

 Note 4 adopted by Wassenaar  Encryption used for “primary function” that is NOT computing, networking, communications, information security  Examples: ◦ Piracy and theft prevention for software, music, etc. ◦ Household utilities and appliances ◦ Printing, reproduction, imaging and video recording or playback—not videoconferencing ◦ Business process modeling and automation (e.g., supply chain management, inventory, scheduling and delivery) ◦ Industrial, manufacturing or mechanical systems (e.g., robotics, heavy equipment, facilities systems such as fire alarm, HVAC) ◦ Automotive, aviation, and other transportation systems

 Considerations: ◦ General purpose vs. application specific ◦ “Primary function” of the product  Results in an EAR99 classification or classification under a different category of the control list  Other reasons for decontrol result in classification of 5A992/5D992 (5A002 decontrol notes/ authentication only) ◦ Use of encryption

 Items that are identified in Category 5, Part 2 of the Commerce Control List  Items designed or modified to use cryptography whose primary function is: ◦ “Information security” ◦ Computing ◦ Communications ◦ Networking  Not ‘fixed’ coding or other schemes for ensuring reliable transmission of information that don’t involve hidden or obscured information

 Controlled for EI, NS and AT reasons (Wassenaar): ◦ 5A002 : hardware ◦ 5D002 : software ◦ 5E002 : technology  Controlled for NS and AT reasons (Wassenaar): ◦ 5B002: test equipment  Controlled for AT reasons only (U.S. unilateral): ◦ 5A992 : hardware ◦ 5D992 : software ◦ 5E992 : technology

 License exception TSU – EAR part ◦ Used for “publicly available” items ◦ Required ‘notification’  License exception ENC – EAR part ◦ Registration ◦ Self-Classification ◦ Encryption Review  Mass Market Review – EAR part  Other license exceptions ◦ TMP – EAR part ◦ GOV – EAR part ◦ BAG – EAR part

 The source code must be available to the general public ◦ available at no charge or ◦ available at a charge that does not exceed the cost of reproduction and distribution ◦ no limitations on further distribution  Required notifications ◦ Described in (e) ◦ to and

 License Exception ENC ◦ ‘restricted’ items (740.17(b)(2)) ◦ ‘unrestricted’ items (740.17(b)(3)) ◦ “self-classifiable” items (740.17(b)(1))  Terms like ‘retail’ are not used anymore.

 Described in EAR part (b) ◦ Items that are not listed in (b)(2) or (b)(3)(iii) ◦ Meets the criteria in Note 3 to Category 5, part II  Generally available to the public by being sold, without restriction, from stock at retail selling points…  The cryptographic functionality cannot be easily changed by the user;  Designed for installation without further substantial support by the supplier; and  When necessary, details are available…

 Classification by BIS/NSA Required ◦ “Restricted” and “unrestricted” items under ENC and listed mass market items (740.17(b)(2)/(b)(3) and (b)(3))  Self-classification Permitted ◦ “Other” items (740.17(b)(1) and (b)(1)

 Company registration required for 5A002/5D002/E002 items and mass market items  One registration per company, not per product  Exporters may rely on manufacturer’s registration/product classification…but BIS won’t provide that information

 All “other” ( (b)(1) and (b)(1)items  Submitted by to NSA and BIS  Submitted in.cvs (comma separated values) format  Six specified data fields: name of product, model number, manufacturer, ECCN, ENC or mass market, item type (of 49 listed)

 Individual validated licenses (IVLs) ◦ Specific transactions involving identified parties receiving specific goods and for a specific purpose ◦ Typically have a 2 year validity period  Encryption Licensing Arrangements (ELAs) ◦ Generally involves unlimited sales of specific goods to government end users in a certain country or group of countries ◦ Typically have a 4 year validity period  No License Required (NLR) transactions ◦ Sometimes a license is still required…

 Broad authorization for exports not eligible for License Exception ENC (most “restricted” items to government end users in non- “ENC favorable treatment” countries)  “Less sensitive” government end users - “worldwide” ELAs  “More sensitive” government end users – “single country” ELAs  4-year validity  Semi-annual sales reporting

 May include self-classified items  5A992, 5D992, 5E992  No License Required (NLR)  Controlled to AT countries: Cuba, Sudan, Syria, North Korea and Iran  No review by BIS is required

 BIS encryption web site:  EAR on the web: ◦  Specific questions: ◦ Information Technology Controls Division  (202)