• (03/20/2024):

    (03/20/2024): Commerce Rule Advances U.S. National Security by Enhancing Coordination Between Commerce Export Controls and Treasury Sanctions

  • (03/14/2024):

    (03/14/2024): Commerce Updates Rules To Further Restrict Exports To Nigaragua Due To Foreign Policy Concerns

  • (3/07/2024):

    (3/07/2024): Chinese National Residing in California Arrested for Theft of Artificial Intelligence-Related Trade Secrets from Google

  • (3/05/2024):

    (3/05/2024): Two Defendants Arrested for Conspiring to Illegally Export Weapons to South Sudan

  • (3/01/2024):

    (3/01/2024): Russian International Money Launderer Pleads Guilty to Illicitly Procuring Large Quantities of U.S.-Manufactured Dual-Use, Military Grade Microelectronics for Russian Entities

Would you like to...

 
   

Exporter Portal

exporter portal2

Everything you need to know about exporting

   

Lists of Parties of Concern

listocheck transparent

Entity List
Denied Persons List
Unverified List
MEU List

   

New to Exporting?

cogsinbrain.fwInformation for small and new-to-export companies
   

In The News

bis news_homeBIS Newsroom
   

Classifying Items Subject to the EAR

classification list icon transparent

Commerce Control List Classification
Export Control Classification Numbers
Commerce Control List

   

Consolidated Screening List

consolidated listThe following list may be relevant to your export or reexport transaction
   

Report Violations

report violation_hpReporting Possible Violations
   

Export Administration Regulations

ear transparent

Export Administration Regulations


   

Events

March 27-29, 2024, Update Conference on Export Controls and Policy, Washington, D.C. (2)

BIS Logo 01042012 72dpi Copy

BIS has rescheduled the Update Conference on Export Controls and Policy to March 27-29, 2024. The venue for the conference is the Marriott Marquis hotel in Washington, DC.  For registration information, CLICK HERE.  Register Now as an attendee or as an exhibitor.

 

April 9-10, 2024, Complying with U.S. Export Controls seminar, St. Louis, Missouri (2)

BIS Logo 01042012 72dpi Copy

In partnership with the Missouri District Export Council, BIS is offering a two-day in-person program that will cover the information exporters need to know to comply with U.S. export control requirements under the Export Administration Regulations. Click here for details.

 

April 23-24, 2024, Complying with U.S. Export Controls seminar, Los Angeles, CA

BIS Logo 01042012 72dpi Copy

In partnership with the Southern California District Export Council, BIS is offering a two-day in-person program that will cover the information exporters need to know to comply with U.S. export control requirements under the Export Administration Regulations. Click here for details.

 

   

If the item is not publicly available, the next analysis is whether the item is using ‘cryptography for data confidentiality’.

Technical Note 1 under 5A002.a defines what ‘cryptography for data confidentiality’ means:

1.            For the purposes of 5A002.a., 'cryptography for data confidentiality’ means “cryptography” that employs digital techniques and performs any cryptographic function other than any of the following:

a.            "Authentication";

b.            Digital signature;

c.             Data integrity;

d.            Non-repudiation;

e.            Digital rights management, including the execution of copy-protected "software";

f.             Encryption or decryption in support of entertainment, mass commercial broadcasts or medical records management; or

g.            Key management in support of any function described in paragraph a. to f. above.

The use of cryptography limited to a-g listed above, results in a classification of the product NOT in 5A002.a. In that case, you should review other entries in Category 5 Part 2 and other Categories on the CCL (e.g., Cat. 4 or Cat. 5, Part 1). If it is not described in any other Category then it can be classified as EAR99.

“Authentication” is defined as: Verifying the identity of user, process or device, often as a prerequisite to allowing access to resources in an information system. This includes verifying the origin or content of a message or other information, and all aspects of access control where there is no encryption of files or text except as directly related to the protection of passwords, Personal Identification Numbers (PINs) or similar data to prevent unauthorized access.

Digital signature, data integrity and non-repudiation functions are also not covered by Cat. 5, Part 2. These are means for providing proof of the integrity and origin of data.

Digital Rights Management (DRM), including copyright protection, is encryption that is used to verify that someone has a right to download or use software or view content. Examples include:

  • License key product protection and similar purchase validation
  • Software and hardware design IP protection
  • Piracy and theft prevention for software, music, etc.

Encryption/decryption in support of entertainment, mass commercial broadcast and medical records management in also excluded. Examples include:

  • Games and gaming – devices, runtime software, HDMI and other component interfaces
  • Music movie, tunes/music, digital photos – dedicated players, recorders, and organizers
  • LCD-TV, Blu-ray/ DVD, Video of Demand, cinema, digital video recorders (DVRs)/ personal video recorders (PVRs) – devices, on-line media guides, commercial content integrity and protection, HDMI and other component interfaces
  • Medical/ clinical – including patient scheduling, and medical data records confidentiality.
   
© BIS 2024