{"id":31281,"date":"2008-03-26T16:35:41","date_gmt":"2008-03-26T21:35:41","guid":{"rendered":"https:\/\/content.findlaw-admin.com\/ability-legal\/uncategorized\/fact-sheet-guidelines-for-preparing-encryption-license.html"},"modified":"2008-03-26T16:35:41","modified_gmt":"2008-03-26T21:35:41","slug":"fact-sheet-guidelines-for-preparing-encryption-license","status":"publish","type":"corporate","link":"https:\/\/corporate.findlaw.com\/business-operations\/fact-sheet-guidelines-for-preparing-encryption-license.html","title":{"rendered":"Fact Sheet: Guidelines for Preparing Encryption License Applications"},"content":{"rendered":"<section class=\"fl-gutenberg-byline\">\n    <div class=\"fl-gutenberg-byline-content\">\n                    <p><em>This article was edited and reviewed by <a href=\"https:\/\/www.findlaw.com\/company\/our-team.html\" rel=\"noopener\">FindLaw Attorney Writers<\/a><\/em><\/p>\n\n                | Last reviewed\n        <time>\n                            May 20, 2026\n                    <\/time>\n    <\/div>\n\n    \n    <details class=\"fl-gutenberg-byline-toggle fl-gutenberg-byline-legally-reviewed\">\n        <summary>\n            <i class=\"fl-gutenberg-byline-icon\" aria-hidden=\"true\"><\/i>\n            Legally Reviewed\n        <\/summary>\n\n        <div class=\"fl-gutenberg-byline-toggle-content\">\n            <p><em>This article has been written and reviewed for legal accuracy, clarity, and style by <a href=\"https:\/\/www.findlaw.com\/company\/our-team.html\" rel=\"noopener\">FindLaw\u2019s team of legal writers and attorneys<\/a> and in accordance with <a href=\"https:\/\/www.findlaw.com\/company\/company-history\/editorial-policy.html\" rel=\"noopener\">our editorial standards<\/a>.<\/em><\/p>\n\n        <\/div>\n    <\/details>\n\n    <details class=\"fl-gutenberg-byline-toggle fl-gutenberg-byline-fast-checked\">\n        <summary>\n            <i class=\"fl-gutenberg-byline-icon\" aria-hidden=\"true\"><\/i>\n            Fact-Checked\n        <\/summary>\n\n        <div class=\"fl-gutenberg-byline-toggle-content\">\n            <p><em>The last updated date refers to the last time this article was reviewed by FindLaw or one of our <a href=\"https:\/\/www.findlaw.com\/company\/our-team\/contributing-authors.html\" rel=\"noopener\">contributing authors<\/a>. We make every effort to keep our articles updated. For information regarding a specific legal issue affecting you, please <a href=\"https:\/\/lawyers.findlaw.com\/?fli=bylinelink\" rel=\"noopener\">contact an attorney in your area<\/a>.<\/em><\/p>\n\n        <\/div>\n    <\/details>\n<\/section>\n\n\n\n<div class=\"rxbodyfield\" xmlns:o=\"urn:www.microsoft.com\/office\" xmlns:st1=\"urn:www.microsoft.com\/smarttags\" xmlns:w=\"urn:www.microsoft.com\/word\" xmlns:x=\"urn:www.microsoft.com\/excel\">The U.S. Department of Commerce<br\/> Bureau of Export Administration <p>Fact Sheet:<br\/> <b>Guidelines for Preparing<\/b><br\/> <b>Encryption License Applications<\/b><\/p><p>For all license applications (i.e.technology transfers, hardware and\/or software development, manufacturing arrangements, or resale\/transfer of encryption items), the following information (if not included on the completed BXA Form 748P) will facilitate an expeditious review by the agencies:<\/p><p\/><ul><li>Identify the class of end user such as U.S. wholly-owned or controlled entity (50% or greater ownership), bank, financial institution or government agency. If the ultimate consignee is a financial institution, identify if the end user is lawfully obligated to maintain records of the data secured with the exported encryption item and, if so, identify the laws\/regulations mandating the recordkeeping.<br\/><br\/><\/li><li>Identify and describe the encryption items to be exported, to include the cryptographic capabilities (i.e., encryption algorithms and key lengths) of each encryption item.<br\/><br\/><\/li><li>Describe in detail the intended end use of each encryption item.<\/li><\/ul><p>In addition to above:<\/p><p>A. If your application involves only technology transfers, hardware and\/or software development, or manufacturing arrangements, the following information will facilitate an expeditious review by the agencies:<\/p><ul><li>Identify and describe any products to be developed with the exported encryption items, to include the cryptographic capabilities (i.e., encryption algorithms and key lengths) of each developed product. Identify the envisioned class of end user (i.e., U.S. subsidiaries, banks\/financial institutions, or governments) for each developed product and identify, if possible, whether the product will support recovery of plain text.<br\/><br\/><\/li><li>Identify the form in which the export will be executed (i.e., via magnetic media, hard copy technical drawings or documentation).<br\/><br\/><\/li><li>Explain the manufacturing\/development process.<br\/><br\/><\/li><li>Explain the disposition of: 1) the encryption items subject to this license application; and 2) the finished products (e.g., &quot;returned to the U.S.&quot;, &quot;for resale in a specific country&quot;, or &quot;sold as part of an encryption licensing arrangement (ELA)&quot;. If sold as part of an ELA, the license may be subject to semi-annual reporting requirements.<\/li><\/ul>B. If your application involves only the resale\/transfer of encryption items only, the following information will facilitate an expeditious review by the agencies: <ul><li>Identify, by license number, any previous licenses received for the same or similar encryption item. If similar, identify the differences in the cryptographic functionality and, if applicable, the differences in the intended end use of the encryption item as opposed to a previously approved license.<br\/><br\/><\/li><li>If applicable, describe any technical safeguards that prevent the encryption items from being used for purposes other than the stated end use. If possible, describe how the encryption item will support recovery of plain text.<\/li><\/ul><p>Please see our fact sheet for additional information on license applications involving the <a href=\"https:\/\/corporate.findlaw.com\/\">&quot;deemed export&quot; of encryption technology by foreign nationals<\/a> or call Bernie Kritzer at (202) 482-0894.<\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>The U.S. Department of Commerce Bureau of Export Administration Fact Sheet:   For all license applications (i.e.technology transfers, hardware and\/or software development, manufacturing arrangements, or resale\/transfer of encryption items), the &#8230;<\/p>\n","protected":false},"template":"","meta":{"_acf_changed":false,"_stopmodifiedupdate":true,"_modified_date":"","_cloudinary_featured_overwrite":false},"corporate_categories":[6467,6469],"class_list":["post-31281","corporate","type-corporate","status-publish","hentry","corporate_categories-business-operations","corporate_categories-business-operations__commercial-contracts"],"acf":[],"_links":{"self":[{"href":"https:\/\/corporate.findlaw.com\/legal-api\/wp-json\/wp\/v2\/corporate\/31281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/corporate.findlaw.com\/legal-api\/wp-json\/wp\/v2\/corporate"}],"about":[{"href":"https:\/\/corporate.findlaw.com\/legal-api\/wp-json\/wp\/v2\/types\/corporate"}],"wp:attachment":[{"href":"https:\/\/corporate.findlaw.com\/legal-api\/wp-json\/wp\/v2\/media?parent=31281"}],"wp:term":[{"taxonomy":"corporate_categories","embeddable":true,"href":"https:\/\/corporate.findlaw.com\/legal-api\/wp-json\/wp\/v2\/corporate_categories?post=31281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}