The IT Law Wiki
Advertisement

Encryption items

includes all encryption commodities, software, and technology that contain encryption features and are subject to the EAR. This does not include encryption items specifically designed, developed, configured, adapted or modified for military applications (including command, control and intelligence applications) which are controlled by the Department of State on the U.S. Munitions List.[1]

References[]

  1. U.S. Export Administration Regulations, Part 772 (15 C.F.R. §772.1).
Advertisement