[F1ANNEX IU.K.

CATEGORY 5 – TELECOMMUNICATIONS AND "INFORMATION SECURITY"U.K.

Part 2 – "INFORMATION SECURITY"U.K.

Note 1:Not used.U.K.
Note 2:Category 5 – Part 2 does not control products when accompanying their user for the user’s personal use.U.K.
Note 3:Cryptography NoteU.K.

5A002, 5D002.a.1., 5D002.b. and 5D002.c.1. do not control items as follows:

b.

Hardware components or ‘executable software’, of existing items described in paragraph a. of this Note, that have been designed for these existing items, meeting all of the following:

1.

"Information security" is not the primary function or set of functions of the component or ‘executable software’;

2.

The component or ‘executable software’ does not change any cryptographic functionality of the existing items, or add new cryptographic functionality to the existing items;

3.

The feature set of the component or ‘executable software’ is fixed and is not designed or modified to customer specification; and

4.

When necessary as determined by the [F2Secretary of State], details of the component or ‘executable software’ and details of relevant end-items are accessible and will be provided to the [F2Secretary of State] upon request, in order to ascertain compliance with conditions described above.

Note to the Cryptography Note:U.K.
1.To meet paragraph a. of Note 3, all of the following must apply:U.K.
a.

The item is of potential interest to a wide range of individuals and businesses; and

b.

The price and information about the main functionality of the item are available before purchase without the need to consult the vendor or supplier. A simple price enquiry is not considered to be a consultation.

2.In determining eligibility of paragraph a. of Note 3, [F2Secretary of State] may take into account relevant factors such as quantity, price, required technical skill, existing sales channels, typical customers, typical use or any exclusionary practices of the supplier.U.K.
[5A2] Systems, Equipment and ComponentsU.K.

[5A002] "Information security" systems, equipment and components, as follows:

NB:For the control of "satellite navigation system" receiving equipment containing or employing decryption, see 7A005 and for related decryption "software" and "technology" see 7D005 and 7E001.U.K.
a.

Designed or modified to use ‘cryptography for data confidentiality’ having a ‘described security algorithm’, where that cryptographic capability is usable, has been activated, or can be activated by any means other than secure "cryptographic activation", as follows:

Technical Notes:U.K.
1.For the purposes of 5A002.a., ‘cryptography for data confidentiality’ means "cryptography" that employs digital techniques and performs any cryptographic function other than any of the following:U.K.
a.

"Authentication";

b.

Digital signature;

c.

Data integrity;

d.

Non-repudiation;

e.

Digital rights management, including the execution of copy-protected "software";

f.

Encryption or decryption in support of entertainment, mass commercial broadcasts or medical records management; or

g.

Key management in support of any function described in paragraph a. to f. above.

2.For the purposes of 5A002.a., ‘described security algorithm’ means any of the following:U.K.
Note 1:When necessary as determined by the appropriate authority in the exporter’s country, details of items must be accessible and provided to the authority upon request, in order to establish any of the following:U.K.
a.

Whether the item meets the criteria of 5A002.a.1. to 5A002.a.4.; or

b.

Whether the cryptographic capability for data confidentiality specified in 5A002.a. is usable without "cryptographic activation".

Note 2:5A002.a. does not control any of the following items, or specially designed "information security" components therefor:U.K.
a.

Smart cards and smart card ‘readers/writers’ as follows:

Cryptographic equipment specially designed and limited for banking use or ‘money transactions’;

Items specially designed for a ‘connected civil industry application’, meeting all of the following:

[5A003] Systems, equipment and components, for non-cryptographic "information security", as follows:

[5A004] Systems, equipment and components for defeating, weakening or bypassing "information security", as follows:

Designed or modified to perform ‘cryptanalytic functions’.

Note:5A004.a. includes systems or equipment, designed or modified to perform ‘cryptanalytic functions’ by means of reverse engineering.U.K.

Items, not specified in 4A005 or 5A004.a., designed to perform all of the following:

[5B2] Test, Inspection and Production EquipmentU.K.

[5B002] "Information security" test, inspection and "production" equipment, as follows:

a.

Equipment specially designed for the "development" or "production" of equipment specified in 5A002, 5A003, 5A004 or 5B002.b.;

b.

Measuring equipment specially designed to evaluate and validate the "information security" functions of the equipment specified in 5A002, 5A003 or 5A004, or of "software" specified in 5D002.a. or 5D002.c.

[5C2] MaterialsU.K.

None.

[5D2] SoftwareU.K.

[5D002] "Software" as follows:

a.

"Software" specially designed or modified for the "development", "production" or "use" of any of the following:

1.

Equipment specified in 5A002 or "software" specified in 5D002.c.1.;

2.

Equipment specified in 5A003 or "software" specified in 5D002.c.2.; or

3.

Equipment or "software", as follows:

a.

Equipment specified in 5A004.a. or "software" specified in 5D002.c.3.a.;

b.

Equipment specified in 5A004.b. or "software" specified in 5D002.c.3.b.

b.

"Software" having the characteristics of a ‘cryptographic activation token’ specified in 5A002.b.;