This category covers encryption commodities and software incorporating symmetric encryption with key sizes up to and including 56 bits, such as DES or equivalent e. Products can use the same or double key size for symmetric key exchange with a symmetric algorithm, and up to and including bit keys for key exchange with an asymmetric algorithm e. They can be hardware or software, but must not allow the alteration of the cryptographic functionality by the user or any program.
Exports of non-mass market products to foreign military and government end-users must be reported. Mass market bit encryption. This category has all of the constraints as the preceding, plus the additional constraint of being classified as mass market, that is, available to the public through retail sales outlets and through phone and mail-order transactions.
The software or hardware must be designed for installation by the user without further substantial support by the supplier. Products with other algorithms, including company proprietary algorithms, may be eligible for day processing. There are no reporting requirements for mass market products. Software updates. Software updates for the purpose of correcting bugs is exportable under license exception TSU to any entity who lawfully received the original product.
This category covers technology and software used for the installation, operation, maintenance, and repair of lawfully exported products and data supporting a prospective or actual quotation, bid, or offer, as long as it does not disclose details that the consignee could reduce to production. Items in this category are exportable under the TSU license exemption.
Technical assistance to developers. A license is required to provide technical assistance to foreign persons with the intent to aid in the development and manufacture of export-controlled encryption commodities and software. Licenses are reviewed on a case-by-case basis to determine whether the activity is consistent with US national security and foreign policy interests. Technical assistance to end users. No license is required to provide technical assistance to end users for the purpose of aiding in the selection, installation, operation, and use of encryption items.
Source code that is printed in books or other print media and is made publicly available is not export-controlled. Educational encryption information. Information released by instruction in catalog courses and associated teaching laboratories of academic institutions is not subject to the EAR.
Anti-piracy decryption. Products with a decryption function that can be used only to receive radio broadcasts and pay television or to allow the execution of copy-protected software are controlled for anti-terrorism AT reasons and classified as 5A or 5D Software with cryptographic functions that are used to protect against malicious computer damage, e.
Digital compression. Equipment and software providing fixed data compression or coding techniques is subject to AT controls and classified under 5A or 5D Mobile phones with link encryption. Portable mobile phones for civil use that are not capable of end-to-end encryption is subject to AT controls and classified under 5A ATMs, point-of-sale terminals.
Cryptographic equipment specially designed and limited for use in machines for banking or money transactions, such as automatic teller machines, self-service statement printers, and point-of-sale terminals is subject to AT controls and classified under 5A Smart cards without user encryption. Personalized smart cards or other components that do not allow for user message encryption is subject to AT controls and classified under 5A Authentication only.
Equipment and software that computes a message authentication code, digital signature, or similar result for the purpose of ensuring source and data authenticity is subject to AT controls and classified under 5A or 5D if the items do not allow for encryption except as needed for authentication.
Access control only. Devices and software that protect passwords, PINs, and similar data which is used to control access to facilities and systems is subject to AT controls and classified under 5A or 5D if the items do not allow for encryption except as related to password or PIN protection.
Export Conditions and Licenses Table Entries ok. Export controls do not apply. Items are exportable under license exception BAG baggage. This exception allows US citizens and permanent residents to take encryption items out of the country as part of personal baggage either temporarily i.
No application or paper work is required. Items are exportable to classes of end users in a specified sales territory under an Encryption Licensing Arrangement. They can also be used to export commodities and software of any key length to banks and financial institutions including insurance companies , health and medical end-users, and on-line merchants in other destinations except Cuba, Iran, Iraq, Libya, North Korea, Sudan, and Syria.
For exports to health and medical end-users and on-line merchants, the names and address of end-users must be submitted to BXA. Items are exportable after a one-time product review under a license exception ENC encryption commodities and software.
This exception is used to export encryption commodities and software of any key length to financial institutions, health and medical end-users, and on-line merchants in destinations listed in Supplement No.
Applicants must submit a classification request. In addition, exporters must submit reports for exports to health and medical end-users and on-line merchants giving the names and addresses of end-users.
For non-mass market commodities and software with key lengths limited to 56 bits, exporters must report exports to government and military end-users. Items are exportable under a license exception GOV. This exception authorizes exports of encryption items for personal and official use by personnel and agencies of the US government. There are no reporting requirements. Items are exportable under an individual license. Individual licenses are required to export general encryption products of any key length except for personal or business use by US citizens or US exporters and employees of the US exporter or for use by US government personnel and agencies, US subsidiaries, banks, financial institutions, health and medical end users, and online merchants.
They are also required in order to provide technical assistance to foreign developers of encryption products, for exports to strategic partners of US firms to protect US intellectual property, or to export technology other than to a US subsidiary. License applications must identify the end users and their address.
They are reviewed on a case-by-case basis. Items are exportable after a one-time product review under a license exception KMI key management infrastructure. This exception allows exports of encryption commodities and software of any key length with an acceptable key recovery function. Products must be resistant to efforts to disable or circumvent the key recovery feature and must not interoperate with products whose key recovery features have been rendered inoperative.
Applicant must submit a classification request and semiannual reports giving the names and addresses of the ultimate consignees and, if available, specific end-users.
Items are controlled for anti-terrorism AT reasons and classified under 5A or 5D No license is required NLR , but exporters may submit a classification request to confirm product status. Products cannot be exported to the terrorist-supporting countries. This exception allows exporters or employees of exporters to take encryption items i. TMP also allows exhibition and demonstration of encryption items in countries located in Country Group B for no more than days in one location.
The products must be returned to the US in one year unless BXA grants permission for additional time. Items are exportable under a license exemption TSU technology and software -- unrestricted. This exception allows for exports of technology and software used for the installation, operation, maintenance, and repair of lawfully exported products and data supporting a prospective or actual quotation, bid, or offer. Even top Universities across the U. Business degrees are the perfect stepping stone for building a career, increasing earning potential, and ultimately growing your business.
Find out how to improve your knowledge and increase your earning potential by getting an online business degree. This site is for informational purposes only and does not constitute legal, financial or tax advise. The information on this site should not be relied upon as an official source of information and should be independently verified.
Search by State To find more information about a business license in your state choose the state below.
Disclaimer: This site is for informational purposes only and does not constitute legal, financial or tax advise. Related Articles. Sign in with that, and use Copart just like you would if you had licenses. Who Sets Licensing Requirements? What Do The Colors Mean? Vehicles in these states must be purchased with valid business licenses or through a broker. Account Type Member Seller.
Error Message. Sign Into Your Account. New to Copart? Enter password that must be Passwords must be a minimum of 8 characters with at least one number and one letter. Your form has been successfully submitted. Our export team is in process of calculating your shipping quote. Please allow up to 36 hours. Cancel Yes.
0コメント