Amendments to the Export Control Order 20082.
(1)
(2)
Schedule 2 (military goods, software and technology) is amended in accordance with paragraphs (3) to (21).
(3)
Under the heading “Definitions”—
(a)
““cyber incident response” means the process of exchanging necessary information or “software” on a cybersecurity incident with individuals or organisations responsible for conducting or coordinating remediation to address the cybersecurity incident;”;
(b)
““digital computer” means equipment which can, in the form of one or more discrete variables, perform all of the following:
a. accept data,
b. store data or instructions in fixed or alterable (writable) storage,
c. process data by means of a stored sequence of instructions which is modifiable, and
d. provide output of data;
Technical Note:
Modifications of a stored sequence of instructions include replacement of fixed storage devices, but not a physical change in wiring or interconnections;”;
(c)
““equivalent standards” means comparable national or international standards recognised by one or more Wassenaar Arrangement “participating states” and applicable to the relevant entry;”;
(d)
““participating state” means a state participating in the Wassenaar Arrangement (see www.wassenaar.org);”;
(e)
““satellite navigation system” means a system consisting of ground stations, a constellation of satellites, and receivers, that enables receiver locations to be calculated on the basis of signals received from the satellites. It includes global navigation satellite systems and regional navigation satellite systems;”;
(f)
““vulnerability disclosure” means the process of identifying, reporting, or communicating a vulnerability to, or analysing a vulnerability with, individuals or organisations responsible for conducting or coordinating remediation for the purpose of resolving the vulnerability;”.
(4)
“;
f. Handguns specially designed for any of the following:
1. slaughtering of domestic animals; or
2. tranquilising of animals.”.
(5)
““Special gun-mountings”;”.
(6)
In entry ML2, for “projectors and accessories” substitute “accessories and projectors specially designed or modified for military use”.
(7)
In entry ML2.a., for “recoilless rifles, smooth-bore weapons and signature reduction devices therefor;” substitute “recoilless rifles and smooth-bore weapons;”.
(8)
“The following types of projectors, when specially designed or modified for military use:
1. Smoke canister projectors;
2. Gas canister projectors;
3. Pyrotechnics projectors.
Note: ML2.b. does not control signal pistols.”.
(9)
“Accessories specially designed for the weapons specified in ML2.a., as follows:
1. Weapon sights and weapon sight mounts, specially designed for military use;
2. Signature reduction devices;
3. Mountings;
4. Detachable cartridge magazines.”.
(10)
Omit ML2.d..
(11)
“a. manufactured or fitted with materials or components to provide ballistic protection equal to or better than level III (NIJ 0108.01, September 1985) or “equivalent standards”;”.
(12)
“b. providing ballistic protection equal to or better than level III (NIJ 0108.01, September 1985) or “equivalent standards”;”.
(13)
In entry ML8.c., at “Note 1”, for “apply to” substitute “control”;
(14)
“Technical Note:
‘Ground equipment’ includes pressure refuelling equipment and equipment designed to facilitate operations in confined areas.”.
(15)
In entry ML11.b., for “Global Navigation Satellite Systems (GNSS)” substitute ““Satellite navigation system””.
(16)
In entry ML13.d.2.,—
(i)
for “greater” substitute “better”; and
(ii)
for “national equivalents” substitute ““equivalent standards””.
(17)
“Note: ML15.f. includes equipment designed to degrade the operation or effectiveness of military imaging systems or to minimise such degrading effects.”.
(18)
In entry ML17.m., omit “rafts,”.
(19)
In entry ML18, after ““Production” equipment” insert “, environmental test facilities,”.
(20)
“5. “Software” specially designed or modified for the conduct of military offensive cyber operations;
Note 1: ML21.b.5. includes “software” designed to destroy, damage, degrade or disrupt systems, equipment or “software”, specified in this Schedule, and associated cyber reconnaissance and cyber command and control “software”.
Note 2: ML21.b.5. does not apply to a “vulnerability disclosure” or to a “cyber incident response”, limited to non-military defensive cybersecurity readiness or response.”.
(21)
“N.B. See systems, equipment or components specified in this Schedule for general purpose “digital computers” with installed “software” specified by ML21.c.”.
(22)
Schedule 3 (UK controlled dual-use goods, software and technology) is amended in accordance with paragraphs (23) to (25).
(23)
Under the heading “Definitions”—
(a)
in the definition of “required”, omit “and the intended use of “technology” is irrelevant to whether it is “required””;
(b)
““Unmanned Aerial Vehicle” (or “UAV”) means any “aircraft” capable of initiating flight and sustaining controlled flight and navigation without any human presence on board;”.
(24)
“Note: For the purpose of PL9009.a. “aircraft” includes “UAVs”.”.
(25)
In entry PL9009.a.2.g., for “Unmanned aerial vehicle (UAV)” substitute ““UAV””.