Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
Important section of IT Act 2000 & IPC sections related to cyber law. these will help each one of us and give us details about these which are very important in our life.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
Important section of IT Act 2000 & IPC sections related to cyber law. these will help each one of us and give us details about these which are very important in our life.
The GPS Act, proposed by Representative Jason Chaffetz and Senator Ron Wyden, seeks to give government agencies, commercial entities, and private citizens specific guidelines to when and how geolocation information can be accessed and used. At present, there are no U.S. laws that directly address GPS tracking data, and with the proliferation of trackable devices like cell phones and GPS systems, the act is aiming to update regulations and guidelines to reflect modern sources of privacy concerns.
Warrants. Wiretaps. PRTTs. Subpoenas. Section 702. 2703(d) order. National Security Letters. All Writs Act. Many in the infosec community are aware that the government has an array of legal authorities to use in investigating crimes which allow them access to user content and metadata, but few people could articulate the differences among these types of orders. This talk will review each type of legal process used by state and federal agencies to request access to various types of user data and content.
SEC to consult with NIST to define what constitutes #cybersecurity "expertise...David Sweigert
Uploaded as a courtesy by:
Dave Sweigert
Defining Cybersecurity Expert
The legislation also would direct the SEC, in consultation with the National Institute of Standards and Technology, to define what constitutes expertise or experience in cybersecurity.
The bill suggests the definition could be based on professional qualifications to administer information security programs or expertise in mitigating cyberattacks as described in NIST's NICE Cybersecurity Workforce Framework. NICE stands for National Initiative for Cybersecurity Education.
"As cyberattacks become increasingly common, Congress must take action to better protect Americans from hackers attempting to steal sensitive data and personal information [by making] sure companies disclose to the public the basic steps they are taking to protect their businesses from cyberattacks," Collins said.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
This is the presentation for my keynote at Virtual World Best Practise in Education, Friday, 26 July 2013. At this occasion I was able to announce for the first time that we received EU funding. A mere 7% of all of the proposals were approved. CAMELOT stands for 'CreAting Machinima Empowers Live Online language Teaching and learning', due to start in December 2013. Over a period of 2 years 9 project partners will develop machinimas for language learners and develop a teacher training course on how to create machinima.
Civil War Discourse at Gloucester, VA, Free eBookChuck Thompson
Civil War Discourse at Gloucester, VA, Free eBook. Brought to you by; Gloucester, Virginia Links and News website. http://www.gloucestercounty-va.com Visit us.
РИФ+КИБ 2012: Обзор инструментов повышения конверсии сайта и вопросы их внедр...ЮниВеб
Сергей КОТЫРЕВ, Юмисофт, Генеральный директор
Обзор секции РИФ+КИБ 2012 "Инструменты увеличения конверсии коммерческих сайтов и интернет-магазинов" http://uniofweb.ru/analytics/875/
The Freemason's Monitor. A continuing inside look at the Masonic Order. You determine what you think of this secret society. Gloucester, Virginia Links and News website. Visit us for incredible content.
The GPS Act, proposed by Representative Jason Chaffetz and Senator Ron Wyden, seeks to give government agencies, commercial entities, and private citizens specific guidelines to when and how geolocation information can be accessed and used. At present, there are no U.S. laws that directly address GPS tracking data, and with the proliferation of trackable devices like cell phones and GPS systems, the act is aiming to update regulations and guidelines to reflect modern sources of privacy concerns.
Warrants. Wiretaps. PRTTs. Subpoenas. Section 702. 2703(d) order. National Security Letters. All Writs Act. Many in the infosec community are aware that the government has an array of legal authorities to use in investigating crimes which allow them access to user content and metadata, but few people could articulate the differences among these types of orders. This talk will review each type of legal process used by state and federal agencies to request access to various types of user data and content.
SEC to consult with NIST to define what constitutes #cybersecurity "expertise...David Sweigert
Uploaded as a courtesy by:
Dave Sweigert
Defining Cybersecurity Expert
The legislation also would direct the SEC, in consultation with the National Institute of Standards and Technology, to define what constitutes expertise or experience in cybersecurity.
The bill suggests the definition could be based on professional qualifications to administer information security programs or expertise in mitigating cyberattacks as described in NIST's NICE Cybersecurity Workforce Framework. NICE stands for National Initiative for Cybersecurity Education.
"As cyberattacks become increasingly common, Congress must take action to better protect Americans from hackers attempting to steal sensitive data and personal information [by making] sure companies disclose to the public the basic steps they are taking to protect their businesses from cyberattacks," Collins said.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
This is the presentation for my keynote at Virtual World Best Practise in Education, Friday, 26 July 2013. At this occasion I was able to announce for the first time that we received EU funding. A mere 7% of all of the proposals were approved. CAMELOT stands for 'CreAting Machinima Empowers Live Online language Teaching and learning', due to start in December 2013. Over a period of 2 years 9 project partners will develop machinimas for language learners and develop a teacher training course on how to create machinima.
Civil War Discourse at Gloucester, VA, Free eBookChuck Thompson
Civil War Discourse at Gloucester, VA, Free eBook. Brought to you by; Gloucester, Virginia Links and News website. http://www.gloucestercounty-va.com Visit us.
РИФ+КИБ 2012: Обзор инструментов повышения конверсии сайта и вопросы их внедр...ЮниВеб
Сергей КОТЫРЕВ, Юмисофт, Генеральный директор
Обзор секции РИФ+КИБ 2012 "Инструменты увеличения конверсии коммерческих сайтов и интернет-магазинов" http://uniofweb.ru/analytics/875/
The Freemason's Monitor. A continuing inside look at the Masonic Order. You determine what you think of this secret society. Gloucester, Virginia Links and News website. Visit us for incredible content.
Religions of Ancient Egypt and Babylonia, Free eBookChuck Thompson
Religions of Ancient Egypt and Babylonia. http://www.gloucestercounty-va.com Some interesting history that not everyone ever gets to see. Learn something new that your friends don't know. Visit us for more at our website.
Online Marketing Specialist, Aaron Lehman teaches us some basics in Google Analytics in the latest breakfast bootcamp. In this seminar Aaron covers topics such as; where are your visitors coming from, basic Google Analytics setup, common terminology, and how to see what device your visitors are using. Check out this PowerPoint presentation to get a snapshop of Aaron's talk on Google Analytics basics.
If you like pirates you are going to love this pirate story. From the golden age of comics, Buccaneer Comic book storyline of Captain Daring. Enjoy. http://www.GloucesterCounty-VA.com
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
Information Technology Act 2000: Introduction to Cyber Law in India, Importance of Cyber Law, E-Commerce, Paperless Society, Digital Signatures, Cybercrimes, Salient features of IT Act 2000, Recent amendments of IT Act 2008.
Right to Information Act 2005: Objectives of the RTI Act, Scope, Suo motu disclosure, Method of seeking information, Who is eligible to get information, Authorities, RTE 2008 and its features.
Default brief filed in court on February 19th, 2019. This legal brief calls for the arrest and conviction of Circuit Court Judge Jeffery W Shaw for a multitude of counts of fraud. Copy shows court stamps.
Book digitized by Google. Understanding exactly what the Federal Government of the United States has a right to tax by looking at a history of taxation. This book will open your eyes.
Homeland Security Building RecommendationsChuck Thompson
http://www.gloucestercounty-va.com This is the building security recommendations for schools from Homeland Security. 317 pages up to date and complete. Is your school safe?
http://www.gloucestercounty-va.com The Battle of Gettysburg. Civil war history for those who would like to learn more about the past of the United States. Free downloads to Slideshare members. Enjoy.
Les Miserables, five volumes, complete by victor hugoChuck Thompson
http://www.gloucestercounty-va.com A true classic reading experience. Free to download. Its a long read but well worth the effort if you can find the time. Enjoy.
http://www.gloucestercounty-va.com The art of making whiskey is a very old book from 1819 and shows an excellent history on the craft of distilling spirits also known back then as living waters. Great information on how whiskey as well as gin used to be made. Free downloads.
http://www.gloucestercounty-va.com Some really good history on distilling alcohol and how it was done in the good old days. The art and science of it. 1809 eBook. Free to download.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
"Protectable subject matters, Protection in biotechnology, Protection of othe...
Security and freedom through encryption act (safe act)
1. Security and Freedom Through Encryption
Act (SAFE Act)
Brought To You By;
Gloucester County, Virginia Links and News
http://www.GloucesterCounty-VA.com
The contents of the bill are as follows:
A BILL
To amend title 18, United States Code, to affirm the rights of
United States persons to use and sell encryption and to relax
export controls on encryption.
Be it enacted by the Senate and House of
Representatives of the United States of America in
Congress assembled,
SECTION 1. SHORT TITLE.
This Act may be cited as the `Security And Freedom
through Encryption (SAFE) Act'.
SEC. 2. SALE AND USE OF ENCRYPTION.
(a) IN GENERAL- Part I of title 18, United States Code,
is amended by inserting after chapter 123 the following
2. new chapter:
`CHAPTER 125--ENCRYPTED WIRE AND ELECTRONIC
INFORMATION
`2801. Definitions.
`2802. Freedom to use encryption.
`2803. Freedom to sell encryption.
`2804. Prohibition on mandatory key escrow.
`2805. Unlawful use of encryption in
furtherance of a criminal act.
`Sec. 2801. Definitions
`As used in this chapter--
`(1) the terms `person', `State', `wire
communication', `electronic communication',
`investigative or law enforcement officer', and
`judge of competent jurisdiction' have the
meanings given those terms in section 2510 of
this title;
`(2) the term `decrypt' means to retransform or
unscramble encrypted data, including
communications, to its readable form;
`(3) the terms `encrypt', `encrypted', and
`encryption' mean the scrambling of wire
communications, electronic communications, or
electronically stored information, using
mathematical formulas or algorithms in order to
preserve the confidentiality, integrity, or
authenticity of, and prevent unauthorized
recipients from accessing or altering, such
communications or information;
`(4) the term `key' means the variable
information used in a mathematical formula,
code, or algorithm, or any component thereof,
used to decrypt wire communications, electronic
communications, or electronically stored
information, that has been encrypted; and
3. `(5) the term `key recovery information' means
information that would enable obtaining the key
of a user of encryption;
`(6) the term `plaintext access capability' means
any method or mechanism which would provide
information in readable form prior to its being
encrypted or after it has been decrypted;
`(7) the term `United States person' means--
`(A) any United States citizen;
`(B) any other person organized under the
laws of any State, the District of Columbia,
or any commonwealth, territory, or
possession of the United States; and
`(C) any person organized under the laws
of any foreign country who is owned or
controlled by individuals or persons
described in subparagraphs (A) and (B).
`Sec. 2802. Freedom to use encryption
`Subject to section 2805, it shall be lawful for any
person within any State, and for any United States
person in a foreign country, to use any encryption,
regardless of the encryption algorithm selected,
encryption key length chosen, or implementation
technique or medium used.
`Sec. 2803. Freedom to sell encryption
`Subject to section 2805, it shall be lawful for any
person within any State to sell in interstate commerce
any encryption, regardless of the encryption algorithm
selected, encryption key length chosen, or
implementation technique or medium used.
`Sec. 2804. Prohibition on mandatory key escrow
`(a) GENERAL PROHIBITION- Neither the Federal
Government nor a State may require that, or condition
any approval on a requirement that, a key, access to a
key, key recovery information, or any other plaintext
access capability be--
4. `(1) built into computer hardware or software for
any purpose;
`(2) given to any other person, including a
Federal Government agency or an entity in the
private sector that may be certified or approved
by the Federal Government or a State to receive
it; or
`(3) retained by the owner or user of an
encryption key or any other person, other than
for encryption products for use by the Federal
Government or a State.
`(b) PROHIBITION ON LINKAGE OF DIFFERENT
USES OF ENCRYPTION- Neither the Federal
Government nor a State may--
`(1) require the use of encryption products,
standards, or services used for confidentiality
purposes, as a condition of the use of such
products, standards, or services for authenticity
or integrity purposes; or
`(2) require the use of encryption products,
standards, or services used for authenticity or
integrity purposes, as a condition of the use of
such products, standards, or services for
confidentiality purposes.
`(c) EXCEPTION FOR ACCESS FOR LAW
ENFORCEMENT PURPOSES- Subsection (a) shall not
affect the authority of any investigative or law
enforcement officer, or any member of the intelligence
community as defined in section 3 of the National
Security Act of 1947 (50 U.S.C. 401a), acting under any
law in effect on the effective date of this chapter, to gain
access to encrypted communications or information.
`Sec. 2805. Unlawful use of encryption in furtherance of a
criminal act
`(a) ENCRYPTION OF INCRIMINATING
COMMUNICATIONS OR INFORMATION UNLAWFUL-
Any person who, in the commission of a felony under a
criminal statute of the United States, knowingly and
willfully encrypts incriminating communications or
5. information relating to that felony with the intent to
conceal such communications or information for the
purpose of avoiding detection by law enforcement
agencies or prosecution--
`(1) in the case of a first offense under this
section, shall be imprisoned for not more than 5
years, or fined in the amount set forth in this title,
or both; and
`(2) in the case of a second or subsequent
offense under this section, shall be imprisoned
for not more than 10 years, or fined in the
amount set forth in this title, or both.
`(b) USE OF ENCRYPTION NOT A BASIS FOR
PROBABLE CAUSE- The use of encryption by any
person shall not be the sole basis for establishing
probable cause with respect to a criminal offense or a
search warrant.'.
(b) CONFORMING AMENDMENT- The table of
chapters for part I of title 18, United States Code, is
amended by inserting after the item relating to chapter
123 the following new item:
2801'.
SEC. 3. EXPORTS OF ENCRYPTION.
(a) AMENDMENT TO EXPORT ADMINISTRATION
ACT OF 1979- Section 17 of the Export Administration
Act of 1979 (50 U.S.C. App. 2416) is amended by
adding at the end thereof the following new subsection:
`(g) CERTAIN CONSUMER PRODUCTS,
COMPUTERS, AND RELATED EQUIPMENT-
`(1) GENERAL RULE- Subject to paragraphs (2)
and (3), the Secretary shall have exclusive
authority to control exports of all computer
hardware, software, computing devices,
customer premises equipment, communications
network equipment, and technology for
information security (including encryption),
except that which is specifically designed or
modified for military use, including command,
control, and intelligence applications.
6. `(2) ITEMS NOT REQUIRING LICENSES- After
a one-time, 15-day technical review by the
Secretary, no export license may be required,
except pursuant to the Trading with the enemy
Act or the International Emergency Economic
Powers Act (but only to the extent that the
authority of such Act is not exercised to extend
controls imposed under this Act), for the export
or reexport of--
`(A) any computer hardware or software
or computing device, including computer
hardware or software or computing
devices with encryption capabilities--
`(i) that is generally available;
`(ii) that is in the public domain for
which copyright or other protection
is not available under title 17,
United States Code, or that is
available to the public because it is
generally accessible to the
interested public in any form; or
`(iii) that is used in a commercial,
off-the-shelf, consumer product or
any component or subassembly
designed for use in such a
consumer product available within
the United States or abroad which--
`(I) includes encryption
capabilities which are
inaccessible to the end user;
and
`(II) is not designed for
military or intelligence end
use;
`(B) any computing device solely because
it incorporates or employs in any form--
`(i) computer hardware or software
(including computer hardware or
software with encryption
capabilities) that is exempted from
7. any requirement for a license under
subparagraph (A); or
`(ii) computer hardware or software
that is no more technically complex
in its encryption capabilities than
computer hardware or software that
is exempted from any requirement
for a license under subparagraph
(A) but is not designed for
installation by the purchaser;
`(C) any computer hardware or software
or computing device solely on the basis
that it incorporates or employs in any form
interface mechanisms for interaction with
other computer hardware or software or
computing devices, including computer
hardware and software and computing
devices with encryption capabilities;
`(D) any computing or telecommunication
device which incorporates or employs in
any form computer hardware or software
encryption capabilities which--
`(i) are not directly available to the
end user; or
`(ii) limit the encryption to be point-
to-point from the user to a central
communications point or link and
does not enable end-to-end user
encryption;
`(E) technical assistance and technical
data used for the installation or
maintenance of computer hardware or
software or computing devices with
encryption capabilities covered under this
subsection; or
`(F) any encryption hardware or software
or computing device not used for
confidentiality purposes, such as
authentication, integrity, electronic
signatures, nonrepudiation, or copy
8. protection.
`(3) COMPUTER HARDWARE OR SOFTWARE
OR COMPUTING DEVICES WITH
ENCRYPTION CAPABILITIES- After a one-time,
15-day technical review by the Secretary, the
Secretary shall authorize the export or reexport
of computer hardware or software or computing
devices with encryption capabilities for
nonmilitary end uses in any country--
`(A) to which exports of computer
hardware or software or computing
devices of comparable strength are
permitted for use by financial institutions
not controlled in fact by United States
persons, unless there is substantial
evidence that such computer hardware or
software or computing devices will be--
`(i) diverted to a military end use or
an end use supporting international
terrorism;
`(ii) modified for military or terrorist
end use; or
`(iii) reexported without any
authorization by the United States
that may be required under this Act;
or
`(B) if the Secretary determines that a
computer hardware or software or
computing device offering comparable
security is commercially available outside
the United States from a foreign supplier,
without effective restrictions.
`(4) DEFINITIONS- As used in this subsection--
`(A)(i) the term `encryption' means the
scrambling of wire communications,
electronic communications, or
electronically stored information, using
mathematical formulas or algorithms in
order to preserve the confidentiality,
9. integrity, or authenticity of, and prevent unauthorized
recipients from accessing or altering, such communications or
information;
`(ii) the terms `wire
communication' and `electronic
communication' have the
meanings given those terms in
section 2510 of title 18, United
States Code;
`(B) the term `generally available'
means, in the case of computer
hardware or computer software
(including computer hardware or
computer software with encryption
capabilities)--
`(i) computer hardware or
computer software that is--
`(I) distributed
through the Internet;
`(II) offered for sale,
license, or transfer to
any person without
restriction, whether
or not for
consideration,
including, but not
limited to, over-the-
counter retail sales,
mail order
transactions, phone
order transactions,
electronic
distribution, or sale
on approval;
`(III) preloaded on
computer hardware
or computing
devices that are
widely available for
sale to the public; or
`(IV) assembled from
10. computer hardware
or computer
software
components that are
widely available for
sale to the public;
`(ii) not designed,
developed, or tailored by
the manufacturer for
specific purchasers or
users, except that any such
purchaser or user may--
`(I) supply certain
installation
parameters needed
by the computer
hardware or
software to function
properly with the
computer system of
the user or
purchaser; or
`(II) select from
among options
contained in the
computer hardware
or computer
software; and
`(iii) with respect to which
the manufacturer of that
computer hardware or
computer software--
`(I) intended for the
user or purchaser,
including any
licensee or
transferee, to install
the computer
hardware or
software and has
supplied the
necessary
11. instructions to do so,
except that the
manufacturer of the
computer hardware
or software, or any
agent of such
manufacturer, may
also provide
telephone or
electronic mail help
line services for
installation,
electronic
transmission, or
basic operations;
and
`(II) the computer
hardware or
software is designed
for such installation
by the user or
purchaser without
further substantial
support by the
manufacturer;
`(C) the term `computing device'
means a device which
incorporates one or more
microprocessor-based central
processing units that can accept,
store, process, or provide output
of data;
`(D) the term `computer hardware'
includes, but is not limited to,
computer systems, equipment,
application-specific assemblies,
smart cards, modules, integrated
circuits, and printed circuit board
assemblies;
`(E) the term `customer premises
equipment' means equipment
employed on the premises of a
person to originate, route, or
12. terminate communications;
`(F) the term `technical
assistance' includes instruction,
skills training, working knowledge,
consulting services, and the
transfer of technical data;
`(G) the term `technical data'
includes blueprints, plans,
diagrams, models, formulas,
tables, engineering designs and
specifications, and manuals and
instructions written or recorded on
other media or devices such as
disks, tapes, or read-only
memories; and
`(H) the term `technical review'
means a review by the Secretary
of computer hardware or software
or computing devices with
encryption capabilities, based on
information about the product's
encryption capabilities supplied by
the manufacturer, that the
computer hardware or software or
computing device works as
represented.'.
(b) NO REINSTATEMENT OF
EXPORT CONTROLS ON
PREVIOUSLY DECONTROLLED
PRODUCTS- Any encryption
product not requiring an export
license as of the date of
enactment of this Act, as a result
of administrative decision or
rulemaking, shall not require an
export license on or after such
date of enactment.
(c) APPLICABILITY OF CERTAIN EXPORT
CONTROLS-
(1) IN GENERAL- Nothing in this Act shall limit
the authority of the President under the
13. International Emergency Economic Powers Act,
the Trading with the enemy Act, or the Export
Administration Act of 1979, to--
(A) prohibit the export of encryption
products to countries that have been
determined to repeatedly provide support
for acts of international terrorism; or
(B) impose an embargo on exports to, and
imports from, a specific country.
(2) SPECIFIC DENIALS- The Secretary may
prohibit the export of specific encryption products
to an individual or organization in a specific
foreign country identified by the Secretary, if the
Secretary determines that there is substantial
evidence that such encryption products will be
used for military or terrorist end-use.
(3) DEFINITION- As used in this subsection and
subsection (b), the term `encryption' has the
meaning given that term in section 17(g)(5)(A) of
the Export Administration Act of 1979, as added
by subsection (a) of this section.
(d) CONTINUATION OF EXPORT ADMINISTRATION
ACT- For purposes of carrying out the amendment
made by subsection (a), the Export Administration Act
of 1979 shall be deemed to be in effect.
SEC. 4. EFFECT ON LAW ENFORCEMENT ACTIVITIES.
(a) COLLECTION OF INFORMATION BY ATTORNEY
GENERAL- The Attorney General shall compile, and
maintain in classified form, data on the instances in
which encryption (as defined in section 2801 of title 18,
United States Code) has interfered with, impeded, or
obstructed the ability of the Department of Justice to
enforce the criminal laws of the United States.
(b) AVAILABILITY OF INFORMATION TO THE
CONGRESS- The information compiled under
subsection (a), including an unclassified summary
thereof, shall be made available, upon request, to any
Member of Congress.