From: “Scott Renfro” <srenfro@silvix.sirinet.net>
To: das@razor.engr.sgi.com (Anil Das)
Message Hash: dec368d0a76b02b38a92a491ef04ce2d55747ff86749bfc85f9b952af2d58aea
Message ID: <199705021015.KAA28827@silvix.sirinet.net>
Reply To: <tcmay@got.net>
UTC Datetime: 1997-05-02 11:15:29 UTC
Raw Date: Fri, 2 May 1997 19:15:29 +0800
From: "Scott Renfro" <srenfro@silvix.sirinet.net>
Date: Fri, 2 May 1997 19:15:29 +0800
To: das@razor.engr.sgi.com (Anil Das)
Subject: Re: "restrict technical assistance by U.S. persons with respect
In-Reply-To: <tcmay@got.net>
Message-ID: <199705021015.KAA28827@silvix.sirinet.net>
MIME-Version: 1.0
Content-Type: text/plain
I am anything _but_ a lawyer, but ...
On 2 May 97 at 1:35, Anil Das wrote:
> These ECCNs (whatever that means) is in http://jya.com/774-ccl05.htm.
> 5A002 is for hardware modules that do encryption functions. 5D002 applies
> to software. I won't quote it here, but from my reading it lists only
> software designed or modified for certain purposes, such as putting it in
> a hardware module, for one.
Filling in the cross-references between 5D002 and 5A002 in the above URL,
I read the following:
a. Software having the same characteristics, or performing or simulating
the functions of of equipment designed or modified to use "cryptography"
employing digital or analog techniques to ensure "information security" is
controlled.
b. Software designed or modified to use such software is controlled.
This is the clearest control of software "hooks" I have read in the reg.
The software module performing encryption would fall under control due to
(a) and the software designed with "hooks" for the encryption module would
fall under control due to the restriction in (b).
FWIW
Scott
Return to May 1997
Return to ““Scott Renfro” <srenfro@silvix.sirinet.net>”
Unknown thread root