So what does this mean for email encryption programs? Programs that provide encryption capabilities are subject...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
to U.S. export controls and sanctions administered by BIS under EAR, and the Commerce Control List (CCL). Most commercial encryption products have a license exception assigned to them by the BIS. This allows vendors to export them to specified destinations without always having to go the Commerce Department for special permission.
Taking PGP as an example, all PGP-enabled products fall within three types of License Exception: Mass Market (eligible for export with no license required), ENC Restricted (eligible for export to any end user in EU member countries) and ENC Unrestricted (eligible for export to any end user). None of these categories, however, allow encryption products to be exported to the following embargoed countries: Cuba, Iran, Iraq, Libya, North Korea, Sudan and Syria.
If you wish to take or send an email encryption program to Iraq, then you will have to apply for an export license from the BIS and possibly obtain authorization from other U.S. government agencies as well. The U.S. government, and vendors too, are very serious about controlling the export of encryption tools. In PGP's license agreements, for example, customers must represent that they will not export to a prohibited country or to a restricted type of user. Even the release of technology or source code to a foreign national in the United States is subject to the EAR and is deemed to be an export to the home country of the foreign national. I would contact a lawyer or PGP Corp. for further advice.
Dig Deeper on Information security laws, investigations and ethics
Related Q&A from Michael Cobb
A flaw in the open source graphics library libpng enabling denial-of-service attacks was discovered. Expert Michael Cobb explains how the ...continue reading
Flaws in the Apple Notify function and iTunes can enable attackers to inject malicious script into the application side. Expert Michael Cobb explains...continue reading
Facebook's Delegated Recovery aims to replace knowledge-based authentication with third-party account verification. Expert Michael Cobb explains how ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.