United States takes another crack at encryption-export policy

Cravotta; Granville, Nicholas
October 1999
EDN;10/28/99, Vol. 44 Issue 22, p26
Trade Publication
Presents proposed changes to encryption-export policy in the United States (US). Permission of US companies to export encryption commodity or software of any key length; Use of any encryption commodity or software to provide services; Requisite of postexport reporting for non-US entity of any product with a capacity of more than 64 bits.


Related Articles

  • Congress deeply split over regulation of encryption technology.  // Issues in Science & Technology;Fall97, Vol. 14 Issue 1, p31 

    Reports on the regulations proposed involving data encryption technology. Account on the bill proposed by Representatives Bob Goodlatte (R-Virg.) and Senator Conrad Burns (R-Mont.); Bill proposed by Senator John McCain (R-Ariz.) and Senator Bob Kerrey (D-Neb.); Comparison of the two bills.

  • `Compromise' bill on encryption introduced.  // Issues in Science & Technology;Summer98, Vol. 14 Issue 4, p31 

    Focuses on the introduction of the E-PRIVACY Act (S. 2067), by Senators John Ashcroft and Patrick Leahy, on May 12, 1998. Requirements of the bill; Establishment of a National Electronic Technology (NET) Center due to bill; Benefits of the NET Center; Information on the H.R. 695 and S. 909...

  • Senate encryption bill may stall in committee. Rodger, Will // Inter@ctive Week;04/28/97, Vol. 4 Issue 13, p9 

    Reports that Senate Commerce Chair John McCain is seeking a compromise with the White House on legislation to loosen encryption export controls. Senators McCain and Conrad Burns' efforts to avoid a presidential veto; Concerns of crypto proponents; Absence of a proposal from the Bill Clinton...

  • Crypto bill passes another hurdle. Rodger, Will // Inter@ctive Week;05/19/97, Vol. 4 Issue 16, p10 

    Reports that the Safety and Freedom through Encryption Act passed the US House Judiciary Committee without a single dissenting vote. Review of the bill by the International Relations Committee; Lobbying against the bill by the White House; Amendments passed by committee members.

  • Encryption support overstated. Rodger, Will // Inter@ctive Week;07/22/96, Vol. 3 Issue 15, p6 

    Reports that the Bill Clinton administration's proposal regarding the United States export of encryption technology, is getting less support than has been suggested by the administration. When the proposal was released; Some of the names on the list of computer industry personnel who the...

  • Senate leaders reach compromise on encryption bill. Silva, Jeffrey // RCR;03/09/98, Vol. 17 Issue 10, p8 

    Deals with the debate on whether United States President Bill Clinton will support encryption legislation announced by the Senate for encryption technology in the communications industry. When the encryption bill will be voted on; Comments from Vice President Al Gore; Definition of the term `key...

  • Technology prolongs crypto impasse. Rodger, Will // Inter@ctive Week;06/15/98, Vol. 5 Issue 23, p58 

    Reports that information technology companies in the United States are not equipped with the technology to provide access for law enforcement to encrypted systems and programs. Regulations implemented in 1996 which stated that all encryption had to provide a system for law enforcement to read...

  • Crypto: More peril than promise? Rodger, Will // Inter@ctive Week;01/26/98, Vol. 5 Issue 3, p53 

    Focuses on the dangers an encryption legislation in the United States cause. Comments from Lance Cotrell, a California cryptographer; Why civil libertarians who were in favor of the legislation are having second thoughts; Importance of encryption to the computer industry.

  • Laptop-secret. Stanglin, Douglas; Knight, Robin // U.S. News & World Report;6/26/95, Vol. 118 Issue 25, p27 

    States that Americans who carry laptop abroad could be violating United States export laws on national security if the computers contain such commonplace software as Lotus Notes or Norton Utilities. How the software is classified as a `munition' because it contains encryption features;...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics