Tech Law Journal

Capitol Dome
News, records, and analysis of legislation, litigation, and regulation affecting the computer, internet, communications and information technology sectors

TLJ Links: Home | Calendar | Subscribe | Back Issues | Reference
Other: Thomas | USC | CFR | FR | FCC | USPTO | CO | NTIA | EDGAR


Draft of Promote Reliable On Line Transactions to Encourage Commerce and Trade (PROTECT) Act.
Re: encryption.

Sponsor: Sen. John McCain (R-AZ).
Date introduced: April 14, 1999.
Source: Office of Sen. Conrad Burns (R-MT).

Editors Notes:
(1) Tech Law Journal created this document by scanning a paper copy of the bill, and converting it into HTML.
(2) The draft used is file named "S:\WPSHR\LEGCNSL\XYWRITE\COMMS\ENCRYPT.2", and dated "April 12, 1999 (4:26 p.m.)".
(2) The draft used lists four sponsors in print (McCain, Burns, Wyden, and Leahy), and two in a handwritten insertion ("Abraham, Kerry").

Copyright 1999 Tech Law Journal. All rights reserved.


106TH CONGRESS
1ST SESSION

S. _____

To promote electronic commerce by encouraging and facilitating the use of encryption in interstate commerce consistent with the protection of national security, and for other purposes.

IN THE SENATE OF THE UNITED STATES

APRIL ___, 1999

Mr. McCAIN (for himself, Mr. BURNS, Mr. Wyden and Mr. LEAHY) introduced the following bill; which was read twice and referred to the Committee on ___________

A BILL

To promote electronic commerce by encouraging and facilitating the use of encryption in interstate commerce consistent with the protection of national security, and for other purposes.

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,

SECTION 1. SHORT TITLE.

This Act may be cited as the "Promote Reliable On Line Transactions to Encourage Commerce and Trade (PROTECT) Act of 1999".

SEC. 2. PURPOSES.

The purposes of this Act are---

[begin page 2]

(1) to promote electronic growth foster electronic commerce;

(2) create consumer confidence in electronic commerce;

(3) meet the needs of businesses and individuals using electronic networks;

(4) prevent crime; and

(5) improve national security by facilitating the widespread use of encryption and assisting the United States Government in developing the capability to respond to the challenges posed by new technological developments.

SEC. 3. FINDINGS.

Congress Ends the following:

(1) The ability to digitize information makes carrying out tremendous amounts of commerce and personal communication electronically possible.

(2) Miniaturization, distributed computing, and reduced transmission costs make communication via electronic networks a reality.

(3) The explosive growth in the Internet and other computer networks reflects the potential growth of electronic commerce and personal communication.

[begin page 3]

(4) The Internet and the global information infrastructure have the potential to revolutionize the way individuals and businesses conduct business.

(5) The full potential of the Internet for the conduct of business cannot be realized as long as it is an insecure medium in which confidential business information and sensitive personal information remain at risk of unauthorized viewing, alteration, and use.

(6) The United States' critical infrastructures increasingly rely on vulnerable commercial information systems and electronic networks and represent a growing risk to national security and public safety because the security and privacy of those systems and networks is not assured.

(7) Encryption of information enables businesses and individuals to protect themselves, their commercial information and networks, and the United States' critical infrastructures against unauthorized viewing, alteration, and abuse ensuring the security, confidentiality, authenticity, and integrity of information.

(8) American computer software and hardware, communications, and electronics businesses are leading the world technology revolution, and the American [begin page 4] information technology industry is a vital sector of the United States economy. These businesses have developed in the commercial marketplace, and are prepared to offer immediately to computer users worldwide, a variety of communications and computer hardware and software that provide strong, robust, and easy-to-use encryption.

(9) Notwithstanding American preeminence in information technology, many foreign companies currently manufacture products and services that are comparable in quality and capabilities to United States products and frequently provide stronger encryption. These foreign companies are competing fiercely with United States companies for sales not only of the encryption product or service, but also for the ultimate product that uses the encryption capability, including applications ranging from online banking to electronic mail to banking.

(10) The leading survey of available encryption products reports that, as of December, 1997, there were 656 foreign encryption products (out of 1619 encryption products produced worldwide) available from 474 vendors in 29 different foreign countries.

(11) To promote economic growth, foster electronic commerce, meet the needs of businesses and [begin page 5] individuals using electronic networks, prevent crime, and improve national security, Americans should be free to continue using lawfully any encryption products and programs, and American companies should be free to sell, license, or otherwise distribute such encryption products and programs worldwide so long as national security is not put at risk.

(12) The United States government should promote the use of the United States encryption products and expedite its work with the industry to update the United States Data Encryption Standard (DES).

(13) NIST has proposed requirements and established procedures for adopting a new, stronger, private sector--developed Advanced Encryption Standard (AES).

(14) Similar to DES, it is anticipated that AES will become an international encryption standard adopted by individuals and companies worldwide.

(15) NIST has requested candidate algorithms, evaluated candidate algorithms, and encouraged public comment at each step of the process. NIST's open and public process for developing and testing the new AES should be applauded and supported.

[begin page 6]

(16) Further demonstrating the worldwide availability, use, and sophistication of encryption abroad, only 5 of the 15 AES candidate algorithms submitted to NIST for evaluation that complied with all requirements and procedures for submission were proposed by companies and individuals in the United States. The remaining 10 candidate algorithms were proposed by individuals and companies from 11 different countries (Australia's LOKI97; Belgium's RIJNDAEL; Canada's CAST-256  and DEAL; Costa Rica's FROG; France's DFC; Germany's MAGENTA; Japan's E2; Korea's CRYPTON; and the United Kingdom, Israel, and Norway's SERPENT algorithms).

(17) NIST's efforts to create the AES to replace DES are important to the development of adequate global information security to a degree that Congress should explicitly authorize and support NIST's efforts and establish a deadline of January 1, 2002, for finalizing the new standard.

(18) Once NIST finalizes AES, the Federal Government should permit all United States products meeting the new AES standards or its equivalent to be exported worldwide to ensure global security and to permit United States companies to compete [begin page 7] effectively with their foreign competitors consistent with the national security requirements of the United States.

(19) The United States Government has legitimate law enforcement and national security objectives, which can be met by permitting American companies to compete globally, while at the same time recognizing the challenges to law enforcement and national security posed by quickly advancing technological developments and providing for research, development, and adoption of new technology to respond to these challenges.

(20) As part of its efforts to fight crime with technology and ensure the safety of commercial networks, the United States government should establish a mechanism for facilitating communications with experts in information security industries, including cryptographers, engineers, software publishers, and others involved in the design and development of information security products and should ensure that such sums as necessary are appropriated to ensure and enhance national security and law enforcement.

(21) The United Government also should expand and expedite its computer security research activities [begin page 8] at NIST and the Federal laboratories, work with industry to recommend priority activities at university research facilities, and fund scholarships in information security.

SEC. 4. DEFINITIONS.

In this Act:

(1) COMPUTER HARDWARE.---The term "computer hardware" includes computer systems, equipment, application-specific assemblies, smart cards, modules, integrated circuits, printed circuit board assemblies, and devices that incorporate 1 or more microprocessor-based central processing units that are capable of accepting, storing, processing, or providing output of data.

(2) ENCRYPT AND ENCRYPTION.---The term "encrypt" and "encryption" means the scrambling (and descrambling) of wire communications, electronic communications, or electronically stored information, using mathematical formulas or algorithms to preserve the confidentiality, integrity, or authenticity of, and prevent unauthorized recipients from accessing or altering, such communications or information.

(3) ENCRYPTION PRODUCT.---The term "encryption product"---

[begin page 9]

(A) means computer hardware, computer software, or technology with encryption capabilities; and

(B) includes any subsequent version of or update to an encryption product, if the encryption capabilities are not changed.

(4) EXPORTABLE.---The term "exportable" means the ability to transfer, ship, or transmit to foreign users.

(5) GENERALLY AVAILABLE OR GENERAL AVAILABILITY.---The terms "generally available" or "general availability" mean---

(A) in the case of computer hardware or computer software (including encryption products), computer' hardware, or computer software that is---

(i) distributed via the Internet;

(ii) widely offered for sale, license, or transfer (without regard to whether it is offered for consideration), including over-the-counter retail sales, mail order transactions, telephone order transactions, electronic distribution, or sale on approval;

(iii) preloaded on computer hardware that is widely available; or

[begin page 10]

(iv) assembled from computer hardware or computer software components that are generally available;

(B) not designed, developed, or tailored by the manufacturer for specific purchasers, except that the purchaser or user may---

(i) supply certain installation parameters needed by the computer hardware or computer software to function properly with the computer system of the user or purchaser; or

(ii) select from among options contained in the computer hardware or computer software; and (C) are available in more than 1 country through a means described in subparagraph (A).

(6) KEY.---The term "key" means the variable information used in a mathematical formula, code, or algorithm, or any component thereof, used to decrypt wire communications, electronic communications, or electronically stored information, that has been encrypted.

(7) LICENSE EXCEPTION.---The term "license exception" means an authorization by the Bureau of [begin page 11] Export Administration of the Department of Commerce that allows the export or re-export, under stated conditions, of items subject to the Export Administration Regulations that otherwise would require a license.

(8) NIST.---The term "NIST" means the National Institute of Standards and Technology in the Department of Commerce.

(9) ON-LINE MERCHANT.---The -term "on-line merchant" means either a person or a company or other entity engaged in commerce that, as part of its business, uses electronic means to conduct commercial transactions in goods (including, but not limited to, software and all other forms of digital content) or services, whether delivered in tangible or electronic form.

(10) PERSON.---The term "person" has the meaning given the term in section 2510(1) of title1, United States Code.

(11) PUBLICLY AVAILABLE OR PUBLIC AVAILABILITY.---The terms "publicly available" or "public availability" mean---

(A) information that is generally accessible to the interested public in any form; or

[begin page 12]

(B) technology and software that are already published or will be published, arise during, or result from fundamental research, are educational, or are included in certain patent applications.

(12) RECOVERABLE PRODUCT.---The term "recoverable product" means an encryption product that---

(A) incorporates an operator-controlled management interface enabling real-time access to specified network traffic prior to encryption, or after decryption, at a designated access point under the control of the network owner or operator (utilizing a protocol such as IPSec);

(B) permits access to data prior to encryption, or after decryption, at a server under the control of a network owner or operator (utilizing a protocol such as SSL, TLS, or Kerberos);

(C) includes a key or data recovery system which, when activated, enables a system administrator or user to recover plaintext or keys to decrypt data transmitted or stored in encrypted form; or

[begin page 13]

(D) offers the system administrator or end-user the capability to create a duplicate key (or keys) for archival and other purposes.

(13) SECRETARY.---The term Secretary" means the Secretary of Commerce.

(14) STATE.---The term "State" means any State of the United States and includes the District of Columbia and any commonwealth, territory, or possessions of the United States.

(15) STRATEGIC PARTNERS.---The term "strategic partners" means 2 or more entities that---

(A) have a business need to share the proprietary information of 1 or more United States companies; and

(B) are contractually bound to one another; or

(C) have an established pattern on continuing or recurring contractual relations.

(16) TECHNICAL ASSISTANCE.---The term "technical assistance" includes assistance such as instructions, skills training, working knowledge, and consulting services, and may involve transfer of technical data.

(17) TECHNICAL DATA.---The term "technical data" may include data such as blueprints, plans, [begin page 14] diagrams, models, formulae, tables, engineering designs and specifications, manuals, and instructions written or recorded on other media or devices such as disk, tape, or read-only memories.

(18) TECHNICAL REVIEW.---The term "technical review" means a review by the Secretary of an encryption product, based on information about a product's encryption capabilities supplied by the manufacturer, that an encryption product works as represented.

(19) UNITED STATES PERSON.---The term "United States person" means any---

(A) United States citizen; or

(B) legal entity that---

(i) is organized under the laws of the United States, or any States, the District of Columbia, or any commonwealth, territory, or possession of the United States; and

(ii) has its principal place of business in the United States.

(20) UNITED STATES SUBSIDIARY.---The term "United States subsidiary" means---

(A) a foreign branch of a United States company; or

[begin page 15]

(B) a foreign subsidiary or entity of a United States entity in which---

(i) a United States company or entity beneficially owns or controls (whether directly or indirectly) 25 percent or more of the voting securities of the foreign subsidiary or entity, if no other person owns or controls (whether directly or indirectly) an equal or larger percentage;

(ii) the foreign subsidiary or entity is operated by a United States company or entity pursuant to the provisions of an exclusive management contract;

(iii) the majority of the members of the Board of Directors of the foreign subsidiary or entity also are members of the comparable governing body of the United States company or entity;

(iv) a United States company or entity has the authority to appoint the majority of the members of the Board of Directors of the foreign subsidiary; or

(v) a United States company or entity has the authority to appoint the Chief Operating [begin page 16] officer of the foreign subsidiary or entity.

TITLE I---DOMESTIC ENCRYPTION PROVISIONS

SEC. 101. DEVELOPMENT AND DEPLOYMENT OF ENCRYPTION A VOLUNTARY PRIVATE SECTOR ACTIVITY.

(a) STATEMENT OF POLICY.---The use, development, manufacture, sale, distribution, and importation of encryption products, standards, and services for purposes of assuring the confidentiality, authenticity, or integrity of electronic information shall be voluntary and market driven.

(b) LIMITATION ON REGULATION.---Neither the Federal Government nor a State may establish any conditions, ties, or links between encryption products, standards, and services used for confidentiality, and those used for authenticity or integrity purposes.

SEC. 102. SALE AND USE OF ENCRYPTION LAWFUL.

Except as otherwise provided by this Act, it is lawful for any person within any State, and for any United States person in a foreign country, to develop, manufacture, sell, distribute, import, or use any encryption product, regardless of the encryption algorithm selected, encryption length chosen, existence of key recovery, or [begin page 17] other plaintext access capability, or implementation or medium used.

SEC. 103. MANDATORY GOVERNMENT ACCESS TO PLAINTEXT PROHIBITED.

(a) IN GENERAL.---No department, agency, or instrumentality of the United States or of any State may---

(1) require that;

(2) set standards for;

(3) condition any approval on;

(4) create incentives for; or

(5) tie any benefit to, a requirement that, a decryption key, access to a key, key recovery information, or any other plaintext access capability be---

(A) required to be built into computers hardware or software for any purpose;

(B) given to any other person (including a department, agency, or instrumentality of the United States or an entity in the private sector that may be certified or approved by the United States or a State); or

(C) retained by the owner or user of an encryption key or any other person, other than for encryption products for the use of the [begin page 18] United States Government or a State government.

(b) EXISTING ACCESS PROTECTED.---Subsection (a) does not affect the authority of any investigative or law enforcement officer, or any member of the intelligence community (as defined in section 3 of the National Security Act of 1947 (50 U.S.C. 401a)), acting under any law in effect on the date of enactment of this Act, to gain access to encrypted communications or information.

TITLE II---GOVERNMENT PROCUREMENT

SEC. 201. POLICY.

It is the policy of the United States---

(1) to permit the public to interact with government through commercial networks and infrastructure; and

(2) to protect the privacy and security of any electronic communication from, or stored information obtained from, the public.

SEC. 202. FEDERAL PURCHASES OF ENCRYPTION PRODUCTS.

(a) IN GENERAL.---Any department, agency, or instrumentality of the United States may purchase encryption products for use by officers and employees of [begin page 19] the United States to the extent and in the manner authorized by law.

(b) INTEROPERABILITY REQUIRED.---No department, agency, or instrumentality of the United States, nor any department, agency, or political subdivision of a State, may purchase an encryption product for its use unless the product will interoperate with other commercially-available encryption products, including products without a decryption key, access to a key, key recovery information, or any other plaintext access capability.

(c) CITIZENS NOT REQUIRED TO PURCHASE SPECIFIED PRODUCT.---No department, agency, or instrumentality of the United States, nor any department, agency, or political subdivision of a State, may require any person in the private sector to use any particular encryption product or methodology, including products with a decryption key, access to a key, key recovery information, or any other plaintext access capability, to communicate with, or transact business with, the government.

[begin page 20]

TITLE III---ADVANCED ENCRYPTION STANDARD

SEC. 301. DEADLINE FOR FINAL SELECTION OF ALGORITHM OR ALGORITHMS BY NIST.

(a) AES PROCESS.---The NIST shall continue and complete the AES process initiated on January 2, 1997, including---

(1) establishing performance requirements,

(2) setting procedures for submitting, testing, evaluating, and judging proposals; and

(3) finally selecting one or more new private sector-developed encryption algorithms.

(b) DEAD DEADLINE.---Notwithstanding subsection (a), NIST shall make a final selection of one or more new private sector-developed encryption algorithms by January 1, 2002.

SEC. 302. COMMERCE DEPARTMENT ENCRYPTION STANDARDS AND EXPORTS AUTHORITY RESTRICTED.

(a) REGULATORY AUTHORITY.---Except as otherwise provided in this Act, the Secretary of Commerce may not promulgate or enforce any regulation, adopt any standard, or carry out any policy that establishes an encryption standard for use by businesses or other entities other than [begin page 21] for computer systems operated by a department, agency, or other entity of the United States government.

(b) EXPORT AUTHORITY.---Except as otherwise provided in this Act, the Secretary of Commerce may not promulgate or enforce any regulation, adopt any standard, or carry out any policy relating to encryption that has the effect of imposing government-designed encryption standards on the private sector by restricting the export of encryption products.

TITLE IV---IMPROVEMENT OF GOVERNMENTAL TECHNOLOGICAL CAPABILITY

SEC. 401. INFORMATION TECHNOLOGY LABORATORY.

Section 20(b) of the National Institute or Standards and Technology Act (15 U.S.C. 278g-3(b)) is amended---

(1) by striking "and" at the end of paragraph (4);

(2) by striking "policy.'' in paragraph (5) and inserting "policy;"; and

(3) by adding at the end thereof the following:

"(6) to obtain information regarding the most current information security hardware, software, telecommunications, and other electronic capabilities;

[begin page 22]

"(7) to research and develop new and emerging techniques and technologies to facilitate lawful access to communications and electronic information;

"(8) to research and develop methods to detect and prevent unwanted intrusions into commercial computer networks, particularly those interconnected with computer systems of the United States government;

(9) to provide assistance in responding to information security threats and vulnerabilities at the request of other departments, agencies, and instrumentalities of the United States and State governments; and

"(10) to facilitate the development and adoption of the best information security practices by departments, agencies, and instrumentalities of the United States, the States, and the private sector.".

SEC. 402. ADVISORY BOARD ON COMPUTER SYSTEM SECURITY AND PRIVACY.

Section 21(b) of the National Institute of Standards and Technology Act (15 U.S.C. 278g-4(b)) is amended---

(1) by redesignating paragraphs (2) and (3) as paragraphs (4) and (5), respectively; and

(2) by inserting after paragraph (1) the following:

[begin page 23]

"(2) to provide a forum for communication and coordination between industry and the Federal Government regarding information security issues;

"(3) to foster the aggregation and dissemination of general, nonproprietary, and non-confidential developments in important information security technologies, including encryption, by regularly reporting that information to appropriate Federal agencies to keep law enforcement and national security agencies abreast of emerging technologies so they are able effectively to meet their responsibilities;".

SEC. 403. AUTHORIZATION OF APPROPRIATIONS.

There are authorized to be appropriated to such departments and agencies as may be appropriate such sums as may be necessary to ensure that United States law enforcement agencies and agencies responsible for national security are able to complete any missions or goals authorized in law regardless of technological advancements in encryption and digital technology.

TITLE V---EXPORT OF ENCRYPTION PRODUCTS. 

SEC. 501. COMMERCIAL ENCRYPTION PRODUCTS.

(a) IN GENERAL.---This title applies to all encryption products, without regard to the encryption algorithm selected, encryption key chosen, exclusion of plaintext access [begin page 24] capability, or implementation or medium used, except those encryption products specifically designed or modified for military use (including command, control, and intelligence applications).

(b) AUTHORITY OF SECRETARY OF COMMERCE.---Subject to the other provisions of this title, and notwithstanding any other provision of law, the Secretary of Commerce has exclusive authority to control the exportation of encryption products described in subsection (a). In exercising that authority, the Secretary shall consult with the Secretary of State and the Secretary of Defense.

SEC. 502. PRESIDENTIAL AUTHORITY.

(a) TERRORIST AND EMBARGO CONTROLS.---Nothing in this Act limits the authority of the President under---

(1) the Trading with the Enemy Act (50 U.S.C. App. 1 et seq.); or

(2) the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.), but only to the extent that the authority of that Act is not exercised to extend controls imposed under the Export Administration Act of 1979 (50 U.S.C. 2401 et seq.)---

(A) to prohibit the export of encryption products to any country, corporation, or other entity that has been determined to---

[begin page 25]

(i) provide support for acts of terrorism; or

(ii) pose an immediate threat to national security; or

(B) to impose an embargo on exports to, or imports from, a specific country, corporation, or entity.

(b) SPECIAL DENIALS FOR SPECIFIC REASONS. The Secretary of Commerce shall prohibit the exportation of particular encryption products to an individual or organization in a foreign country identified by the Secretary if the Secretary determines that there is substantial evidence that the encryption products may be used or modified for military or terrorist use, including acts against the national security of, public safety of, or the integrity of the transportation, communications, or other essential systems of interstate commerce in, the United States.

(c) OTHER EXPORT CONTROLS.---An encryption product is subject to any export control imposed on that product for any reason other than the existence of encryption capability. Nothing in this title alters the Secretary of Commerce's ability to control exports of products for reasons other than encryption.

[begin page 26]

SEC. 503. EXPORTATION OF ENCRYPTION PRODUCTS WITH NOT MORE THAN 64--BIT KEY LENGTH.

An encryption product that utilizes a key length or 64 bits or less, may be exported without an export license or an export license exception, and without any other restriction (other than a restriction imposed under this title).

SEC. 504. EXPORTABILITY OF CERTAIN ENCRYPTION PRODUCTS UNDER A LICENSE EXCEPTION.

(a) LICENSE EXCEPTIONS.---Except as otherwise provided under this title, the export or re-export of the following products shall be exportable under license exception:

(1) Recoverable products.

(2) Encryption products to legitimate and responsible entities or organizations and their strategic partners, including---

(A) firms whose shares are publicly traded in global markets;

(B) firms subject to a governmental regulatory scheme;

(C) United States subsidiaries or affiliates of United States corporations;

(D) firms or organizations that are required by law to maintain plaintext records of communications or otherwise maintain such [begin page 27] records as part of their normal business practice;

(E) firms or organizations that are audited annually under widely accepted accounting principles;

(F) strategic partners of United States companies; and

(G) on-line merchants who use encryption products to support electronic commerce, including protecting commercial transactions as well as non-public information exchange necessary to support such transactions.

(3) Encryption products sold or licensed to foreign governments that are members of the North Atlantic Treaty Organization, Organization for Economic Cooperation and Development, and Association of Southeast Asian Nations.

(4) Any computer hardware or computer software that does not itself provide encryption capabilities, but that incorporates or employs in any form interface mechanisms for interaction with other computer hardware and computer software, including encryption products.

(5) Any technical assistance or technical data associated with the installation and maintenance of [begin page 28] encryption products, or products incorporating, enabling or employing encryption products, if such products are exportable under this title.

(b) LICENSE EXCEPTION PROCESSING PERIOD INCLUDING ONE-TIME TECHNICAL REVIEW.---Encryption products and related computer services shall be made eligible for a license exception after a one-time technical review. Exporters' requests for license exceptions, including the one-time technical review, must be processed within 15 working days from receipt of a request. If the exporter is not contacted within this 15-day processing period, the exporter's request for a license exception will be deemed granted, and the exporter may export the encryption products or related computer services under the license exception.

SEC. 505. EXPORTABILITY OF ENCRYPTION PRODUCTS EMPLOYING A KEY LENGTH GREATER THAN 64 BITS.

(a) EXPORT RELIEF FOR ENCRYPTION PRODUCTS. Encryption products, or products that incorporate or employ in any form, implementation, or medium an encryption product, are exportable under a license exception if---

[begin page 29]

(1) the Secretary determines that the product or service is exportable under the Export Administration Act of 1979 (50 U.S.C. 2401 et seq.); or

(2) the Encryption Export Advisory Board described in subsection (b) determines, and the Secretary agrees, that the product or service is

(A) generally available;

(B) publicly available; or

(C) an encryption product utilizing the same or greater key length or otherwise providing comparable security is, or will be within the next 12 months generally or widely available outside the United States from a foreign supplier.

(b) BOARD DETERMINATION OF EXPORTABILITY.---

(1) ENCRYPTION EXPORT ADVISORY BOARD.---There is hereby established an Encryption Export Advisory Board comprised of---

(A) a Chairman, who shall be the Under Secretary of Commerce for Export Administration;

(B) 7 individuals appointed by the President, as follows---

(i) 1 representative from the National Security Agency;

[begin page 30]

(ii) 1 representative from the Central Intelligence Agency;

(iii) 1 representative from the Office of the President; and

(iv) 4 representatives from the private sector who have expertise in the development, operation, or marketing of information technology products; and

(C) 4 representatives from the private sector who have expertise in the development, operation, or marketing of information technology products appointed by the Congress, as follows---

(i) 1 representative appointed by the Majority Leader of the Senate;

(ii) 1 representative appointed by the Minority Leader of the Senate;

(iii) 1 representative appointed by the Speaker of the House of Representatives; and

(iv) 1 representative appointed by the Minority Leader of the House of Representatives.

(2) PURPOSE.---The Board shall evaluate and make recommendations by majority vote within 30 [begin page 31] days with respect to general availability, public availability, or foreign availability whenever an application for a license exception based on general availability, public availability, or foreign availability has been submitted to the Secretary.

(3) MEETINGS.---The Board shall meet at the call of the Under Secretary upon a request for a determination, but at least every 30 days if a request is pending. The Federal Advisory Committee Act (5 U.S.C. App.) does not apply to the Board or to meetings held by the Board under this subsection.

(4) ACTION BY THE SECRETARY.---The Board shall make recommendations to the Secretary. The Secretary shall specifically approve or disapprove of each finding of availability within 30 days of receiving the recommendation and shall notify the Board and publish the finding in the Federal Register. The Secretary shall explain in detail the reasons for any disapproval, including why and how continued controls will be effective in achieving their purpose and the amount of lost sales and loss in market share of United States encryption products.

(5) JUDICIAL REVIEW.---Notwithstanding any other provision of law, a decision by the Secretary disapproving of a Board finding of availability shall [begin page 32] be subject to judicial review under the Administrative Procedure Act (5 U.S.C. 551 et seq.).

(6) PRESIDENTIAL OVERRIDE.---The Board shall report to the President within 30 days after each meeting. The President may override any Board determination of exportability and control the export and re-export of specified encryption products to specific countries or individuals if he determines that such exports or re-exports would harm United States national security, including United States capabilities in fighting drug trafficking, terrorism, or espionage. If the President overrides a Board determination of exportability and decides to control the export or re-export of any encryption product, the President must inform the Board and Congress and detail the reasons for such controls within 30 days of the determination. The action of the president under this paragraph is not subject to judicial review.

(c) RELY ON DETERMINATION OF BOARD.---The manufacturer or exporter of an encryption product or a product incorporating or employing an encryption product may rely upon the Board's determination that the product is generally available or publicly available or if a comparable foreign encryption product is available, and shall [begin page 33] not be held liable or responsible or subject to sanctions for any export of such products under the license exception.

(d) LICENSE EXCEPTION PROCESSING PERIOD INCLUDING ONE-TIME TECHNICAL REVIEW.---Encryption products and related computer services shall be made eligible for a license exception after a one-time technical review. Exporters' requests for license exceptions, including the one-time technical review, must be processed within 15 working days from receipt of a request. If the exporter is not contacted within this 15---day processing period, the exporter's request for a license exception will be deemed granted, and the exporter may export the encryption products or related computer services under the license exception.

(e) GRANDFATHERING OF PRIOR DETERMINATIONS.---Any determination by the Secretary prior to enactment of this Act that an encryption product with greater than a 64-bit key length, or product incorporating or employing such an encryption product, and related services, is eligible for export and re-export either without a license or under a license, a license exception, or an encryption licensing arrangement will remain in effect after passage of this Act.

[begin page 34]

SEC. 506. EXPORTABILITY OF ENCRYPTION PRODUCTS EMPLOYING AES OR ITS EQUIVALENT.

Upon adoption of the AES, but not later than January 1, 2002, the Secretary may no longer impose United States encryption export controls on encryption products if the encryption algorithm and key length employed were incorporated in the AES, or have an equivalent strength, and such product shall be exportable without the need for an export license or license exception, and without restrictions other than those permitted under this Act.

SEC. 507. ELIMINATION OF REPORTING REQUIREMENTS.

The Secretary may not impose any reporting requirements on any encryption product not subject to United States export controls or exported under a license exception.

 

Subscriptions | FAQ | Notices & Disclaimers | Privacy Policy
Copyright 1998-2008 David Carney, dba Tech Law Journal. All rights reserved.
Phone: 202-364-8882. P.O. Box 4851, Washington DC, 20008.