Global Arbitration, Trade and Advocacy Update
BIS Loosens Controls on Less Sensitive, Mass Market Encryption Items and Publicly Available Encryption Source Code
On March 29, 2021, the U.S. Commerce Department’s Bureau of Industry and Security (BIS) amended the Export Administration Regulations (EAR) to implement U.S. commitments from the 2019 Wassenaar Agreement plenary meeting.1 Among other changes, these amendments simplify the export of mass market encryption items and items that use publicly available, standard encryption source code by eliminating applicable notification and reporting requirements. They also modify the scope of Export Control Classification Number (ECCN) 5A002 to exclude personal area networks and certain network gateways from the scope of encryption controls.
The export controls on encryption items — those items subject to Category 5, Part 2 of the EAR — are more complex than the controls on most other commodities. Encryption items require a license to be exported to most locations for national security reasons, but export is broadly authorized without a license under license exception ENC, in some cases with pre- or post-export filing conditions.
Prior to these amendments, some retail items were subject to pre-export review to be eligible for license exception ENC, and BIS required advance notification prior to making encryption source code publicly available — even for software that used only standard (published or nonproprietary) cryptography.
Now, “mass market” “components” (including “mass market” chips, chipsets, electronic assemblies and field programmable logic devices), “executable software,” toolsets, and toolkits are no longer subject to pre-export review. As a result of this change:
- Exporters may self-classify ECCN 5A992.c components and ECCN 5D992.c “executable software” of “mass market” products. Items containing “non-standard cryptography” and cryptographic libraries and modules are still subject to pre-export review by BIS. Self-classified mass market components and executable software will require an annual post-export report.
- Exporters may self-classify mass market toolsets and toolkits, with no annual post-export reporting, as long as they are stand-alone products (e.g., not “components” or “executable software” of another “mass market” product). This change is expected to materially reduce exporters’ reporting obligations.
Additionally, BIS has eliminated the requirement that exporters notify BIS in advance of the first export of, or on modification of, “publicly available” encryption source code and beta test encryption software categorized under 5D002, unless that software implements “non-standard cryptography” (in which case prior notice is still required).2 BIS estimates that this revision will “produce an 80% reduction in notifications regarding publicly available encryption software.” Correspondingly, BIS has narrowed the scope of the notification requirement for beta test encryption software under license exception TMP to apply only to beta test encryption software implementing “non-standard cryptography.”
Finally, BIS has modified the scope of encryption-related controls under ECCN 5A002 by clarifying controls on cryptographic activation, eliminating controls on personal area networks, and reducing controls on network gateways where their “information security” functionality is limited to “Operations, Administration or Maintenance” and they implement only published or commercial cryptographic standards.
If you have questions about how your business may benefit from these changes, please contact your Sidley point of contact or one of the attorneys listed below.
1 86 FR 16482, Final Rule, published Mar. 26, 2021 (effective Mar. 29, 2021), https://www.federalregister.gov/documents/2021/03/29/2021-05481/export-administration-regulations-implementation-of-wassenaar-arrangement-2019-plenary-decisions.
2 Nonstandard cryptography “[m]eans any implementation of “cryptography” involving the incorporation or use of proprietary or unpublished cryptographic functionality, including encryption algorithms or protocols that have not been adopted or approved by a duly recognized international standards body (e.g., IEEE, IETF, ISO, ITU, ETSI, 3GPP, TIA, and GSMA) and have not otherwise been published. 15 CFR § 772.
弁護士広告—Sidley Austin LLP はグローバルな法律事務所です。当事務所の所在地および連絡先情報は、www.sidley.com/en/locations/offices に掲載されています。
Sidley は、本情報をクライアントおよび関係者の皆様へのサービスとして、教育目的のみに提供しています。本情報は、法的助言として解釈または依拠されるべきものではなく、また弁護士と依頼者の関係を生じさせるものでもありません。読者は、専門家の助言を求めることなく本情報に基づいて行動すべきではありません。Sidley および Sidley Austin とは、www.sidley.com/disclaimer に記載のとおり、Sidley Austin LLP およびその関連パートナーシップを指します。
© Sidley Austin LLP
お問い合わせ
この Sidley Update に関してご質問がある場合は、通常ご担当されている Sidley の弁護士、またはご連絡ください。

得意分野
Suggested News & Insights
- Stay Up To DateSubscribe to Sidley Publications
- Follow Sidley on Social MediaSocial Media Directory
