Search /
Docfinder:
Advanced search  |  Help  |  Site map
RESEARCH CENTERS
SITE RESOURCES
Click for Layer 8! No, really, click NOW!
Networking for Small Business
TODAY'S NEWS
Report: US FCC to allow payments for speedier traffic
China working on Linux replacement for Windows XP
FCC adds $9 billion to broadband subsidy fund
Raspberry Pi alternatives emerge to fill need for speed
It's now possible to wirelessly charge 40 smartphones from 16 feet away
Ex-FCC commissioner to head CTIA in latest Washington shuffle
Go time traveling with Google Maps
While Heartbleed distracts, hackers hit US universities
Survey respondents shun much-hyped mobile shopping technologies
Survey respondents shun much-hyped mobile shopping technologies
7 Ways to Advance Your Project Management Career
How Apple's billion dollar sapphire bet will pay off
US to vote on sharp increase in broadband subsidies
iPhone 6 rumor rollup for the week ending April 18
NSA spying revelations have tired out China's Huawei
Arista co-founder may have switch maker by its jewels
Apple kicks off public OS X beta testing
Open source pitfalls – and how to avoid them
AT&T's expanded 1 Gbps fiber rollout could go head to head with Google
BlackBerry Releases BES 10 Security Update to Address 'Heartbleed' Flaw
Verizon: Web apps are the security punching bag of the Internet
Cisco announces security service linked with new operations centers
Dell launches virtual storage accelerator, aims to boost SAN performance
Free OS X Mavericks now powers half of all Macs
/

Crypto export rules falls short of total decontrol

Today's breaking news
Send to a friendFeedback


The Clinton administration is winning praise for its new encryption export policy, but at the same time software vendors and privacy organizations point out that the government still maintains considerable oversight on the sale of encryption products outside of its home market.

Many advocates for revision of the government's encryption export policy say that while the long-awaited regulation represents fundamental change, the rules are complex and will require many companies to hire experts to ensure compliance. They also say they feel compelled to continue working with the Department of Commerce to try to further liberalize the process of exporting encryption.

The new regulations, which were released by the Commerce Department's Bureau of Export Administration Wednesday, are more in step with the economic realities of the information age than the old policy, according to Americans for Computer Privacy (ACP), a Washington organization that worked closely with the Clinton administration and industry representatives to rewrite the export policy.

"ACP is extremely pleased with the progress that was made. We believe the administration took all our concerns very seriously," says Sue Richards, a spokeswoman for the ACP. "However, the bottom line is there is still a feeling in the government that somehow ... encryption is controllable. We believe encryption is inherently uncontrollable."

The Center for Democracy and Technology (CDT), which also fought for a relaxation of the export rules, concurred with the ACP assessment, but also cautioned that not all export controls have been removed.

The regulations remain very complicated and do not change the premise that those who wish to export encryption - including researchers and others who want to exchange certain kinds of source code - must still comply with a process that may prove daunting for some individuals and small businesses, says Alan Davidson, staff counsel at the CDT.

Throughout the debate on encryption export rules the government defended its tight control on strong encryption products as necessary to ensure that law enforcement and national security bodies would not find themselves unable to access computer files and other digital evidence because it was sheathed in strong encryption.

But encryption vendors complained that the export controls created a void in the market that their competitors outside the U.S. were more than happy to fill. Meanwhile, privacy advocates griped that the strict export rules were hampering worldwide e-commerce.

The new regulations let U.S. companies export any encryption product to commercial firms, individuals and other nongovernment users without a license, but a one-time technical review of the products is required before the products can ship.

The regulations also create a new category of "retail" encryption products that permit the export of encryption products available in the market to any end user. But the Bureau of Export Administration will review any product before it can be exported and the bureau will determine which products qualify as retail encryption offerings. At 30-plus pages, the new regulation leaves a lot of room for interpretation, especially when it comes to the definition of a retail product and the definition of a government entity, says Lynn McNulty, director of government affairs for RSA Security.

"Individual companies still are going to have to probably retain some sort of expertise in order to be able to interpret the regulation and not run afoul of any of its provisions," McNulty says. "This is not ... complete decontrol and anyone who was expecting decontrol is disappointed."

However, McNulty, who provided input for drafting the policy as a member of the encryption subcommittee of the President's Export Council, says RSA is "very encouraged" about being better able to compete for business overseas and praised the Clinton administration for showing flexibility and willingness to listen to people in the industry.

Bill Crowell, president and CEO of Cylink, also praised the U.S. administration. He isn't critical of the new rules' continued restrictions because Cylink has been exporting its products for years and is already familiar with how to comply with regulations.

Crowell says the biggest improvement for Cylink is that the new rules reduce the number of individual licenses the company will have to obtain and eliminate the need entirely for licenses for commercial customers, which is Cylink's primary business.

"This might fall short of complete decontrol, but frankly it's an incredibly large step forward and it levels the playing field," Crowell says.

ACP can be found at www.computerprivacy.org/. CDT can be reached at +1-202-637-9800 or at www.cdt.org/. RSA Security can be found at www.rsasecurity.com/. Cylink can be found at www.cylink.com/.

RELATED LINKS


NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.