Page 137 - ELT_15th July 2020_Vol 373_Part 2
P. 137

2020 ]                      FOREIGN TRADE POLICY                     E47

                  1       2                  3                          4
                                         scribed security algo-    that cryptographic  ca-
                                         rithm’, where that        pability  is usable, has
                                         cryptographic capa-       been activated, or can be
                                         bility  is usable, has    activated by any means
                                         been activated, or can    other than secure “cryp-
                                         be   activated  by        tographic activation”, as
                                         means of “crypto-         follows :
                                         graphic  activation”      Remaining below en-
                                         not employing a  se-      tries under this sub-
                                         cure mechanism, as        categories shall remain
                                         follows :                 unchanged
                                         Remaining below en-
                                         tries under this sub-
                                         categories shall re-
                                         main unchanged
                 37.   Change in  8A502.a. Note 2.f.       8A502.a. Note 2.f.
                       8A502.a.   Items, where the “information secu- Items, where the “information securi-
                       Note 2.f.   rity”  functionality is  limited to ty” functionality is limited to wireless
                                wireless “personal  area network” “personal area network” functionality
                                functionality, meeting all of the implementing only published or com-
                                following :                mercial cryptographic standards re-
                                1.  Implement only  published or trieve binary data from a;
                                    commercial  cryptographic
                                    standards; and
                                2.   The cryptographic capability
                                    is limited to a nominal operat-
                                    ing range not  exceeding 30
                                    metres according to the man-
                                    ufacturer ‘specifications, or
                                    not exceeding 100 metres ac-
                                    cording to the manufacturer’s
                                    specifications for  equipment
                                    that cannot interconnect with
                                    more than seven devices;
                 38.   Entry at   8A502.a. Note h          8A502.a. Note h
                       8A502.a.   Routers, switches or relays, where Routers, switches, gateways or relays,
                       Note h.   the “information security” func- where the “information security”
                      amended  tionality is limited to the tasks of functionality is limited to the tasks of
                                “Operations, Administration  or “Operations,  Administration  or
                                Maintenance” (“OAM”)  imple- Maintenance” (“OAM”) implement-
                                menting only published or commer- ing only published or commercial
                                cial cryptographic standards;   cryptographic standards
                 39.   New Entry  New Entry at 8A504.b added.   8A504.b.
                       added at                            Items, not specified by 8A405 or
                       8A504.b.                            8A504.a., designed to perform all
                                                           of the following :
                                                           1.   ‘Extract raw data’ from a
                                                               computing or communica-
                                                               tions device; and
                                                           2.  Circumvent “authentication”
                                    EXCISE LAW TIMES      15th July 2020     137
   132   133   134   135   136   137   138   139   140   141   142