Page 137 - ELT_15th July 2020_Vol 373_Part 2
P. 137
2020 ] FOREIGN TRADE POLICY E47
1 2 3 4
scribed security algo- that cryptographic ca-
rithm’, where that pability is usable, has
cryptographic capa- been activated, or can be
bility is usable, has activated by any means
been activated, or can other than secure “cryp-
be activated by tographic activation”, as
means of “crypto- follows :
graphic activation” Remaining below en-
not employing a se- tries under this sub-
cure mechanism, as categories shall remain
follows : unchanged
Remaining below en-
tries under this sub-
categories shall re-
main unchanged
37. Change in 8A502.a. Note 2.f. 8A502.a. Note 2.f.
8A502.a. Items, where the “information secu- Items, where the “information securi-
Note 2.f. rity” functionality is limited to ty” functionality is limited to wireless
wireless “personal area network” “personal area network” functionality
functionality, meeting all of the implementing only published or com-
following : mercial cryptographic standards re-
1. Implement only published or trieve binary data from a;
commercial cryptographic
standards; and
2. The cryptographic capability
is limited to a nominal operat-
ing range not exceeding 30
metres according to the man-
ufacturer ‘specifications, or
not exceeding 100 metres ac-
cording to the manufacturer’s
specifications for equipment
that cannot interconnect with
more than seven devices;
38. Entry at 8A502.a. Note h 8A502.a. Note h
8A502.a. Routers, switches or relays, where Routers, switches, gateways or relays,
Note h. the “information security” func- where the “information security”
amended tionality is limited to the tasks of functionality is limited to the tasks of
“Operations, Administration or “Operations, Administration or
Maintenance” (“OAM”) imple- Maintenance” (“OAM”) implement-
menting only published or commer- ing only published or commercial
cial cryptographic standards; cryptographic standards
39. New Entry New Entry at 8A504.b added. 8A504.b.
added at Items, not specified by 8A405 or
8A504.b. 8A504.a., designed to perform all
of the following :
1. ‘Extract raw data’ from a
computing or communica-
tions device; and
2. Circumvent “authentication”
EXCISE LAW TIMES 15th July 2020 137

