World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Encryption Export Controls

By Grimmett, Jeanne J.

Click here to view

Book Id: WPLBN0000156337
Format Type: PDF eBook
File Size: 0.2 MB
Reproduction Date: 2008
Full Text

Title: Encryption Export Controls  
Author: Grimmett, Jeanne J.
Volume:
Language: English
Subject: Government publications, Legislation., Government Printing Office (U.S.)
Collections: Government Library Collection
Historic
Publication Date:
Publisher: Government Printing Office

Citation

APA MLA Chicago

Grimmett, J. J. (n.d.). Encryption Export Controls. Retrieved from http://hawaiilibrary.net/


Excerpt
Summary: Encryption exports are controlled under the Arms Export Control Act (AECA) and the Export Administration Act (EAA), the latter statute to expire August 20, 2001. The more stringent AECA controls, administered by the State Department, apply to encryption items classified as defense articles or services. Items not so classified are subject to regulation by the Department of Commerce (DOC) under the extended EAA authorities. DOC requires licenses for certain commodities and software, but allows other encryption items to be exported under license exceptions.

Table of Contents
Contents Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Current Export Controls over Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 First Amendment Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Bernstein Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Karn v. Dep't of State . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Junger v. Daley . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 106th Congress Legislative Proposals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 H.R. 850, as Introduced and Reported . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 S. 798, as Introduced and Reported . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 S. 864, as Introduced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

 

Click To View

Additional Books


  • Faq's for Leadership Proposals 
  • Usawc Strategy Research Project the Army... (by )
  • Department of State International Narcot... 
  • U.S. Sprays Herbicide on South Vietnames... 
  • Transformation: A Bold Case for Unconven... (by )
  • Dsaa- Foreign Military Sales Detailed De... 
  • Charles Gates Dawes (by )
  • Test Ban Talks — Can an Agreement Bereac... (by )
  • Department of Energy (by )
  • V. Intelligence Community Analysis of Ir... 
  • Romania: Moving Toward Nato and the E.U. 
  • Criminal Victimization in the United Sta... 
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.