ENCRYPTION SURVEY FOR EXPORT CLASSIFICATION
PRODUCT FULL NAME
VERSION
DATE
PREPARED BY:
PRIOR CLASSIFICATIONS?
[Supp.6 to Part 742 (a)(2)]
(NOTE: TO “X” A BOX, DOUBLE-CLICK THE BOX, THEN SELECT “CHECKED” RADIAL BUTTON.)
A. GENERAL PRODUCT DESCRIPTION [Supp.6 to Part 742 (a)(1) and (a)(3)]
1. WHAT IS THE PRODUCT DESIGNED TO DO:
2. ATTACH A DATA SHEET OR TECHNICAL SPECIFICATION DOCUMENT THAT GIVES A DESCRIPTION OF THE PRODUCT’S
FUNCTIONALITY IN LAYMAN’S TERMS, IF POSSIBLE. DRAFTS MAY BE SUFFICIENT.
3. IS THE PRIMARY PURPOSE OF THE PRODUCT TO PROVIDE INFORMATION SECURITY? YES : NO: IF NOT, WHAT IS
THE PRIMARY PURPOSE?
4. DOES THE PRODUCT USE ENCRYPTION OR OTHER CRYPTOGRAPHIC TECHNIQUES: YES : NO: IF YES, EXPLAIN
WHY ENCRYPTION TECHNIQUES ARE BEING USED (I.E., TO PROTECT DATA IN TRANSIT OR DATA AT REST)
5. PROVIDE PLAIN LANGUAGE SUMMARY ALL OF ENCRYPTION/DECRYPTION FUNCTIONS:
6. ARE ANY OF YOUR COMPANY’S ENCRYPTION PRODUCTS (OR ITS ENCRYPTION COMPONENTS) MANUFACTURED
OUTSIDE THE UNITED STATES (IF YES, PROVIDE MANUFACTURING LOCATIONS (CITY AND COUNTRY). [Supp 6 to Part 742
(b)(10)]
B. HARDWARE DESCRIPTION, IF APPLICABLE: [Supp.6 to Part 742 (a)(1) and (a)(3)]
1. DESCRIBE THE HARDWARE PRODUCT FUNCTIONALITY AND INDICATE THE REASON FOR USING CRYPTOGRAPHIC
TECHNIQUES:
2. FOR HARDWARE PLATFORMS IS THE SOFTWARE PROVIDED SEPARATELY TO A CUSTOMER? IF SO, YOU MUST ALSO FILL
IN THE SOFTWARE DESCRIPTION (PART C)
3. DOES THE HARDWARE SHIP WITH CRYPTO FUNCTIONALITY DISABLED? IF SO, YOU MUST ALSO FILL IN THE SOFTWARE
DESCRIPTION (PART C) IF SOFTWARE IS PROVIDED TO ENABLE THE CRYPTO FUNCTIONALITY.
4. IDENTIFY THE MANUFACTURER FOR ANY CHIPSETS, PROCESSORS, ACCELERATOR BOARDS, OR OTHER SIGNIFICANT
PERFORMANCE-ENHANCING EQUIPMENT INCLUDED IN THE PRODUCT. ADD TABLE ROWS AS NECESSARY. [Supp 6 to
Part 742 (b)(8)]
NAME AND ADDRESS OF HARDWARE NAME AND SPECIFIC PART NUMBER OF COUNTRY(IES) OF
MANUFACTURER MODEL NUMBER HARDWARE USED MANUFACTURER
Sample Encryption Questionnaire 2017 Page 1
C. SOFTWARE DESCRIPTION, IF APPLICABLE [Supp.6 to Part 742 (a)(1) and (a)(3)]:
1. DESCRIBE THE SOFTWARE FUNCTIONALITY:
2. DOES THE SOFTWARE ALLOW END USERS TO ACTIVATE OR ENABLE CRYPTOGRAPHIC FUNCTIONALITY THAT WOULD
OTHERWISE REMAIN DORMANT OR NON-FUNCTIONAL (e.g., A LICENSE KEY)?
YES NO
IF YES, PLEASE DESCRIBE.
3. DOES THE SOFTWARE MAKE CALLS TO OTHER TO THIRD-PARTY ENCRYPTION PRODUCTS FOR ENCRYPTION OR
DECRYPTION (e.g. OPERATING SYSTEM, MIDDLEWARE, WEBSERVER?
YES NO
4. FOR THIRD-PARTY ENCRYPTION CODE INCLUDED OR INTEGRATED INTO THE PRODUCT, PLEASE PROVIDE THE
INFORMATION BELOW. [Supp 6 to Part 742 (b)(8)]
NAME AND/OR
PART NUMBER
VERSION
NUMBER
NAME OF
MANUFACTURER
URL FOR
SOFTWARE
FUNCTION OF
CODE
STATICALLY OR
DYNAMICALLY
LINKED? (Y/N)
5. IDENTIFY THE VERSION(S) AND TYPE(S) OF COMPILERS, RUNTIME INTERPRETERS, OR CODE ASSEMBLERS USED, AS
APPLICABLE. [Supp 6 to Part 742 (b)(9)]
6. IS ANY "ENCRYPTION SOURCE CODE" BEING PROVIDED (SHIPPED OR BUNDLED) AS PART OF THIS OFFERING?
[Supp.6 to Part 742 (a)(5)]
YES NO
7. IF YES, IS THIS SOURCE CODE PUBLICLY AVAILABLE SOURCE CODE, UNCHANGED FROM THE CODE OBTAINED FROM AN
OPEN SOURCE WEB SITE, OR IS IT PROPRIETARY "ENCRYPTION SOURCE CODE?" [Supp.6 to Part 742 (a)(5)]
UNMODIFIED OPEN SOURCE PROPRIETARY
Sample Encryption Questionnaire 2017 Page 2
D. DESCRIPTION OF ENCRYPTION/DECRYPTION [Supp.6 to Part 742 (b)(1) and (b)(2)]
1. THE CRYPTOGRAPHY OR KEY MANAGEMENT TECHNIQUES USED IN THIS PRODUCT IS USED FOR (CHECK ALL
THAT APPLY):
AUTHENTICATION OR ACCESS CONTROL
DIGITAL SIGNATURE
DATA INTEGRITY
NON-REPUDIATION
DIGITAL RIGHTS MANAGEMENT OR COPY PROTECTION OR TO PROTECT INTELLECTUAL PROPERTY
ENCRYPTION/DECRYPTION IN SUPPORT OF ENTERTAINMENT, MASS COMMERCIAL BROADCASTS OR MEDICAL
RECORDS MANAGEMENT
TO PROTECT AGAINST DE-COMPILATION OR MISUSE OF CODE WITHIN THE PRODUCT
NONE OF THE ABOVE (GO TO QUESTION 3)
2. PLEASE PROVIDE THE INFORMATION BELOW FOR ALL CRYPTOGRAPHIC FUNCTIONS CHECKED ABOVE. PLEASE
PROVIDE A DETAILED DESCRIPTION INCLUDING: [Supp.6 to Part 742 (b)(1) and (b)(2)]
SYMMETRIC ENCRYPTION ALGORITHMS (E.G., 3DES, AES, BLOWFISH, ETC.) AND KEY LENGTHS (56-BIT,
128-BIT, 256-BITS, ETC.)
ASYMMETRIC ENCRYPTION ALGORITHMS USED FOR KEY EXCHANGE (E.G., RSA, DIFFIE-HELLMAN) AND
KEY LENGTHS (E.G., 512 BIT, 1024 BIT)
HASHING ALGORITHMS (E.G., MD5, SHA-1)
SPECIFY WHICH ENCRYPTION MODES ARE SUPPORTED (E.G., CIPHER FEEDBACK MODE OR CIPHER BLOCK
CHAINING MODE)
PROVIDE A DETAILED DESCRIPTION OF HOW THE ENCRYPTION OR DECRYPTION WORKS, INCLUDING ANY
RELEVANT PARAMETERS, INPUTS, OR SETTINGS, AS WELL AS INFORMATION ON THE CRYPTOGRAPHIC
LIBRARIES PROVIDED.
ENCRYPTION KEY TYPES OF ENCRYPTION DESCRIPTION OF FUNCTIONALITY, INCLUDING
ALGORITHM: LENGTH: INFORMATION MODES SETTINGS, PARAMETERS, AND LIBRARIES
ENCRYPTED: SUPPORTED: USED:
Sample Encryption Questionnaire 2017 Page 3
3. IS THE ENCRYPTION/DECRYPTION IN THIS PRODUCT IS USED FOR DATA AND/OR SESSION ENCRYPTION, SUCH AS
INFORMATION, TEXT, VOICE, GRAPHICS, METADATA FILES, ETC. YES NO
[Supp.6 to Part 742 (b)(1) and (b)(2)]
IF “YES”, PLEASE PROVIDE THE INFORMATION BELOW. PLEASE PROVIDE A DETAILED DESCRIPTION
INCLUDING:
SYMMETRIC ENCRYPTION ALGORITHMS (E.G., 3DES, AES, BLOWFISH, ETC.) AND KEY LENGTHS (56-BIT,
128-BIT, 256-BITS, ETC.)
ASYMMETRIC ENCRYPTION ALGORITHMS USED FOR KEY EXCHANGE (E.G., RSA, DIFFIE-HELLMAN) AND
KEY LENGTHS (E.G., 512 BIT, 1024 BIT)
HASHING ALGORITHMS (E.G., MD5, SHA-1)
SPECIFY WHICH ENCRYPTION MODES ARE SUPPORTED (E.G., CIPHER FEEDBACK MODE OR CIPHER BLOCK
CHAINING MODE)
PROVIDE A DETAILED DESCRIPTION OF HOW THE ENCRYPTION OR DECRYPTION WORKS, INCLUDING ANY
RELEVANT PARAMETERS, INPUTS, OR SETTINGS, AS WELL AS INFORMATION ON THE CRYPTOGRAPHIC
LIBRARIES PROVIDED.
ENCRYPTION KEY TYPES OF ENCRYPTION DESCRIPTION OF FUNCTIONALITY, INCLUDING
ALGORITHM: LENGTH: INFORMATION MODES SETTINGS, PARAMETERS, AND LIBRARIES
ENCRYPTED: SUPPORTED: USED:
4. DOES THIS PRODUCT CONTAIN ANY FOREIGN NO
GOVERNMENT-APPROVED OR OTHER
PROPRIETARY OR NON-STANDARD YES
ENCRYPTION ALGORITHMS? IF YES, PLEASE PROVIDE A TEXTUAL DESCRIPTION
[Supp 6 to Part 742 (b)(3)] AND A COPY OF THE SOURCE CODE FOR THE
740.17 (b)(2)(i)(C)]
ENCRYPTION ALGORITHM:
5. PRE- AND POST-PROCESSING METHODS:
A. DESCRIBE THE PRE-PROCESSING METHOD
(E.G., COMPRESSION OR DATA
INTERLEAVING) THAT IS APPLIED TO
PLAINTEXT DATA PRIOR TO ENCRYPTION.
B. DESCRIBE THE POST-PROCESSING
METHODS (PACKETIZATION,
ENCAPSULATION) THAT ARE APPLIED TO
THE CIPHER TEXT AFTER ENCRYPTION. N/A
[Supp 6 to Part 742 (b)(4) and (b)(5)]
6. DESCRIBE THE ENCRYPTION-RELATED ENCRYPTION-RELATED APIS:
APPLICATION PROGRAMMING INTERFACES
(APIS) THAT ARE IMPLEMENTED AND/OR
SUPPORTED. EXPLAIN WHICH INTERFACES
Sample Encryption Questionnaire 2017 Page 4
ARE FOR INTERNAL (PRIVATE) AND/OR N/A
EXTERNAL (PUBLIC) USE. [Supp 6 to Part 742 (b)
(6)]
7. CAN THE CUSTOMER MODIFY THE NO (DESCRIBE HOW THE PRODUCT PREVENTS CUSTOMER
ENCRYPTION ALGORITHMS, KEY MANAGEMENT MODIFICATION OF ENCRYPTION):
AND KEY SPACE?
[Supp 6 to Part 742 (b)(7)] YES (PLEASE DESCRIBE) :
8. STATE ALL COMMUNICATION PROTOCOLS COMMUNICATION PROTOCOLS:
(FOR EXAMPLE, X.25, TELNET, TCP, IEEE
802.11, IEEE 802.16, SIP) AND
CRYPTOGRAPHIC PROTOCOLS AND METHODS ENCRYPTION PROTOCOLS:
(FOR EXAMPLE, SSL, TLS, SSH, IPSEC, IKE,
SRTP, ECCN, MD5, SHA, X.509, PKCS
STANDARDS) THAT ARE SUPPORTED AND LIST ALL CIPHER SUITES SUPPORTED:
DESCRIBE HOW THEY ARE USED.
[Supp 6 to Part 742 (b)(6)]
9. DOES THE PRODUCT SUPPORT SSL OR TLS? NO
IF YES, PLEASE LIST HOW SSL OR TLS ARE
USED AND IDENTIFY ALL SUPPORTED CIPHER YES
SUITES. IF YES, ANSWER THE BELOW QUESTIONS:
[Supp 6 to Part 742 (b)(6)]
WHAT TYPE OF DATA IS PASSED THROUGH THE SSL OR TLS
TUNNEL?
ARE SSL OR TLS TUNNELS ESTABLISHED ONLY DURING THE
AUTHENTICATION PHASE OR FOR THE ENTIRE SESSION?
LIST ALL CIPHER SUITES SUPPORTED:
Sample Encryption Questionnaire 2017 Page 5
5A002.a -- ANALYSIS Supplement 1 to Part 774 Category 5 part II
a.1 DOES THE ITEM HAVE “INFORMATION YES NO
SECURITY” AS ITS PRIMARY FUNCTION?
DEFINITION OF INFORMATION SECURITY:
All the means and functions ensuring the
accessibility, confidentiality or integrity of
information or communications, excluding the
means and functions intended to safeguard against
malfunctions. This includes “cryptography,”
“cryptographic activation,” ‘cryptanalysis,’
protection against compromising emanations and
computer security.
a.2 IS THE ITEM A DIGITAL COMMUNICATION YES NO
OR NETWORKING SYSTEM, EQUIPMENT OR
COMPONENT?
a.3 IS THE ITEM A COMPUTER OR OTHER ITEM YES NO
HAVING INFORMATION STORAGE OR
PROCESSING AS A PRIMARY FUNCTION AND
COMPONENTS THEREFOR?
a.4 IS THE ITEM NOT SPECIFIED ABOVE, BUT YES NO
CONTAINS AN ITEM WHICH WOULD, AS A
STANDALONE ITEM FALL IN a.1 to a.3?
EXCLUSION FROM 5A002.a:
SMART CARDS AND READERS YES NO
CRYPTO EQUIPMENT FOR BANKING OR YES NO
MONEY TRANSACTIONS
PORTABLE OR MOBILE
YES NO
RADIOTELEPHONES, CORDLESS PHONES
PERSONAL AREA NETWORK EQUIPMENT YES NO
MOBILE TELECOM RADIO ACCESS YES NO
NETWORK EQUIPMENT
ROUTERS, SWITCHES, RELAYS, OR MASS- YES NO
MARKET COMPUTERS USING CRYPTO FOR
OPERATIONS, ADMINISTRATION OR
MAINTENANCE” (“OAM”) IMPLEMENTING
ONLY PUBLISHED OR COMMERCIAL
CRYPTOGRAPHIC STANDARDS
Sample Encryption Questionnaire 2017 Page 6
5A002.b-e -- ANALYSIS Supplement 1 to Part 774 Category 5 part II,
740.17(b)(2)(i)(A-H)
5A002.b YES NO
ITEM THAT PROVIDES CRYPTOGRAPHIC
ACTIVATION
5A002.c YES NO
ITEM THAT IS DESIGNED OR MODIFIED TO
PERFORM QUANTUM CRYPTOGRAPHY
5A002.d YES NO
ITEM DESIGNED OR MODIFIED TO TO USE
CRYPTO TO GENERATE CHANNELIZING
CODES, SCRAMBLING CODES OR NETWORK
IDENTIFICATION CODES FOR SYSTEMS
USING ULTRA WIDEBAND MODULATION
TECHNIQUES
5A002.e YES NO
DESIGNED OR MODIFIED TO USE CRYPTO
FOR SPREAD SPECTRUM/FREQUENCY
HOPPING
Sample Encryption Questionnaire 2017 Page 7
740.17 (B)(2) ANALYSIS [Supp 6 to Part 742 (b)(11)]
10. IS YOUR PRODUCT A NETWORK WITH AGGREGATE ENCRYPTED WIDE AREA NETWORK
INFRASTRUCTURE PRODUCT, YES NO (WAN), METROPOLITAN AREA NETWORK (MAN), VIRTUAL
PRIVATE NETWORK (VPN), BACKHAUL OR LONG-HAUL
IF “YES”, CHECK ALL THAT APPLY. THROUGHPUT (INCLUDING COMMUNICATIONS THROUGH
WIRELESS NETWORK ELEMENTS SUCH AS GATEWAYS, MOBILE
SWITCHES AND CONTROLLERS) EQUAL TO OR GREATER THAN
250 MBPS? AGGREGATE ENCRYPTED WAN, MAN, VPN OR
BACKHAUL THROUGHPUT EXCEEDING 250 MBPS.
LIST NUMBER OF MBPS:
TRANSMISSION OVER SATELLITE AT DATA RATES
EXCEEDING 10 MBPS
LIST NUMBER OF MBPS
MEDIA GATEWAYS AND OTHER UNIFIED
COMMUNICATIONS (UC) INFRASTRUCTURE INCLUDING VOICE
OVER INTERNET PROTOCOL (VOIP) SERVICES. MEDIA
(VOICE/VIDEO/DATA) ENCRYPTION OR ENCRYPTED
SIGNALING TO MORE THAN 2,500 ENDPOINTS INCLUDING
CENTRALIZED KEY MANAGEMENT THEREFOR.
COMMUNICATIONS.
LIST MAXIMUM ENCRYPTED CONNECTIONS/
ENDPOINTS:
TERRESTRIAL WIRELESS INFRASTRUCTURE. AIR
INTERFACE COVERAGE (E.G., THROUGH BASE STATIONS,
ACCESS POINTS TO MESH NETWORKS, BRIDGES, ETC.)
EXCEEDING 1,000 METERS, WHERE ANY OF THE FOLLOWING
APPLIES:
MAXIMUM DATA RATES EXCEEDING 10 MBPS (AT
OPERATING RANGES BEYOND 1,000 METERS).
LIST RANGE:
OR
MAXIMUM NUMBER OF CONCURRENT FULL-DUPLEX
VOICE CHANNELS EXCEEDING 30. LIST NUMBER
OF CHANNELS:
11. FOR PRODUCTS WITH IPSEC CAPABILITIES DESCRIBE YOUR PRODUCT’S IMPLEMENTATION OF IKE
[Supp 6 to Part 742 (b)(14)] VENDOR IDS, INCLUDING VENDOR SPECIFIC AND CAPABILITY
IDS AND
SPECIFY WHICH VERSION OF IKE YOU USE (IKE V.1 OR IKE
V.2]
12. IS THE PRODUCT FOR CRYPTOGRAPHIC ULTRA- YES NO
WIDEBAND AND “SPREAD SPECTRUM” USE?
740.17 (b)(2)(i)(H)
Sample Encryption Questionnaire 2017 Page 8
13. DOES THIS PRODUCT HAVE ANY OF THE FOLLOWING? YES NO
ENCRYPTION SOURCE CODE THAT IS NOT PUBLICLY AVAILABLE (SHIPPED WITH
OR BUNDLED WITH BINARIES) STATE WHETHER THE EXECUTABLE/OBJECT
CODE WAS CLASSIFIED BY BIS, WHETHER IT WAS MODIFIED, AND PROVIDE A
COPY OF THE RELEVANT SECTIONS OF CODE UPON REQUEST
[Supp 6 to Part 742 (c), 740.17 (b)(2)(i)(B)]
CRYPTOGRAPHIC FUNCTIONALITY THAT IS USER ACCESSIBLE AND CAN BE EASILY
CHANGED BY THE USER (INCLUDES BUT IS NOT LIMITED TO, OPEN
CRYPTOGRAPHIC INTERFACES (OCI’S)). [Supp 6 to Part 742 (b)(13)] [740.17 (b)(2)
(iii)] 740.17 (b)(2)(iv)(A ) for technology)]
ENCRYPTION COMMODITIES OR SOFTWARE THAT HAS BEEN DESIGNED,
MODIFIED, ADAPTED, OR CUSTOMIZED FOR GOVERNMENT END USER(S) [740.17
(b)(2)(i)(C)]
CRYPTOGRAPHIC FUNCTIONALITY THAT HAS BEEN MODIFIED OR CUSTOMIZED
TO CUSTOMER SPECIFICATION [740.17 (b)(2)(i)(C)]
ENCRYPTION COMMODITIES AND SOFTWARE THAT PROVIDE FUNCTIONS
NECESSARY FOR QUANTUM CRYPTOGRAPHY[740.17 (b)(2)(i)(D)]
ENCRYPTION COMMODITIES AND SOFTWARE THAT HAVE BEEN MODIFIED OR
CUSTOMIZED FOR SUPER COMPUTERS
ENCRYPTION COMMODITIES AND SOFTWARE THAT PROVIDE PENETRATION
CAPABILITIES THAT ARE CAPABLE OF ATTACKING, DENYING, DISRUPTING OR
OTHERWISE IMPAIRING THE USE OF CYBER INFRASTRUCTURE OR
NETWORKS[740.17 (b)(2)(i)(F)]
PUBLIC SAFETY/FIRST RESPONDER RADIO (E.G. IMPLEMENTING TERRESTRIAL
TRUNKED RADIO AND OR ASSOCIATION OF PUBLIC SAFETY COMMUNICATIONS
INTERNATIONAL PROJECT 25 STANDARDS) [740.17 (b)(2)(i)(G)]
CRYPANALYTIC COMMODITIES [740.17 (b)(2)(ii)], 740.17 (b)(2)(iv)(A ) for technology)]
Sample Encryption Questionnaire 2017 Page 9
740.17 (B)(3) ANALYSIS [Supp 6 to Part 742 (b)(12)]
14. IS YOUR PRODUCT A COMPONENT AS CHIPS, CHIPSETS, ELECTRONIC ASSEMBLIES AND FIELD
FOLLOWS PROGRAMMABLE LOGIC DEVICES
REFERENCE THE APPLICATION FOR WHICH THE COMPNENTS WERE
DESIGNED IF KNOWN, STATE IF THERE IS AN GENERAL PROGRAMMING
INTERFACE TO THE COMPONENT, STATE WHETHER THE COMPONENT IS
CONSTRAINED BY FUNCTION AND ID THE ENCRHPTION COMPONENT
AND THE NAME OF THE MANUFCATURER, COMPONENT MODEL # .
[Supp 6 to Part 742 c)]
CRYPTOGRAPHIC LIBRARIES, MODULES, DEVELOPMENT KITS AND
TOOLKITS, INCLUDING FOR OPERATING SYSTEMS AND CRYPTOGRAPHIC
SERVICE PROVIDERS
APPLICATION-SPECIFIC HARDWARE OR SOFTWARE DEVELOPMENT
KITS IMPLEMENTING CRYPTOGRAPHY
COMMODITIES, SOFTWARE AND COMPONENTS NOT DESCRIBED IN
(B)(2) THAT PERFORM OR PROVIDE NON-STANDARD CRYPTOGRAPHY
[740.17 (b)(2)(iv)(A ) for technology)]
COMMODITIES AND SOFTWARE THAT PROVIDE OR PERFORM
VULNERABILITY ANALYSIS, NETWORK FORENSICS OR COMPUTER
FORENSICS (AUTOMATED NETWORK ANALYSIS, VISUALTIZATION, OR
PACKET INSPECTION FOR PROFILING NETWORK FLOW, NETWORK USER
OR CLIENT BEHAVIOR, OR NETWORK STRUCTURE/TOPOLOGY AND
ADAPTING IN REAL TIME TO THE OPERATING ENVIRONMENT.
INVESTIGATION OF DATA LEAKAGE, NETWORK BREACHES, AND
OTHER MALICIOUS INTRUSTION ACTIVITIES THROUGH TRIAGE OF
CAPTURED DIGITAL FORENSIC DATA FOR LAW ENFORCEMENT PURPOSES
OR IN A SIMILARLY RIGOROUS EVIDENTIARY MANNER.
Sample Encryption Questionnaire 2017 Page 10
MASS MARKET ANALYSIS [740.17 (b) and (d), Supp.6 to Part 742, Question (a)(4), Category 5
Part 2 Note 3.a (aka the Cryptography Note) and the “Note to the
Cryptography Note)”]
IS THE PRODUCT:
YES NO
A. GENERALLY AVAILABLE TO THE PUBLIC BY BEING SOLD, WITHOUT
RESTRICTION, FROM STOCK AT RETAIL SELLING POINTS BY MEANS OF ANY OF
THE FOLLOWING (A.1 THROUGH A.4)
A.1 OVER THE COUNTER TRANSACTIONS:
IF, YES, PLEASE GIVE AT LEAST TWO RETAILERS FOR SELLING THE
PRODUCT OVER-THE-COUNTER:
A.2. MAIL ORDER TRANSACTION:
IF, YES, PLEASE GIVE AT LEAST TWO ADDRESSES FOR MAIL ORDER
TRANSACTIONS:
A.3 ELECTRONIC TRANSACTIONS:
IF YES, PLEASE GIVE AT LEAST TWO WEBSITES OR EMAIL ADDRESS OF
WEBSTORES FOR ELECTRONIC TRANSACTIONS:
A.4 TELEPHONE TRANSACTIONS:
IF YES, PLEASE GIVE AT LEAST TWO TELEPHONE NUMBERS OR
TELEPHONE CALL TRANSACTIONS:
B. THE CRYPTOGRAPHIC FUNCTIONALITY CANNOT BE EASILY CHANGED BY THE
END-USER
(I.E., THE CRYPTOGRAPHIC FUNCTIONALITY IN THE PRODUCT CAN ONLY BE USED
ACCORDING TO THE MANUFACTURER SPECIFICATION. SPECIFIC FUNCTION SUCH AS
USER SELECTION ON THE KEY LENGTH, ETC., IS NOT CONSIDERED TO BE “EASILY BE
CHANGED.”)
C. DESIGNED FOR INSTALLATION BY THE USER WITHOUT FURTHER SUBSTANTIAL
SUPPORT BY THE SUPPLIER
(I.E., SUBSTANTIAL SUPPORT INCLUDES JOINT INSTALLATION BY THE VENDOR AND
USER. NOMINAL INSTALLATION SUPPORT, SUCH AS TELEPHONE OR EMAIL HELP-
LINES TO RESOLVE ONLY INSTALLATION PROBLEMS EXPERIENCED BY THE USER, IS
NOT REGARDED AS SUBSTANTIAL SUPPORT.)
D. WHEN NECESSARY, DETAILS OF THE PRODUCTS ARE ACCESSIBLE, AND WILL BE
PROVIDED UPON REQUEST, TO THE APPROPRIATE AUTHORITY IN THE
EXPORTER’S COUNTRY IN ORDER TO ASCERTAIN COMPLIANCE WITH
CONDITIONS DESCRIBED IN (A) THROUGH (C) ABOVE.
(DETAILS OF THE PRODUCTS MAY INCLUDE ALL TECHNICAL SPECIFICATIONS ON
THE CRYPTOGRAPHIC FUNCTIONALITY; DESCRIPTIONS OF ALL RELEVANT
ENCRYPTION ALGORITHMS AND KEY MANAGEMENT SCHEMES; DETAILS OF
Sample Encryption Questionnaire 2017 Page 11
MEASURES TAKEN TO PRECLUDE USER MODIFICATION OF THE ENCRYPTION
ALGORITHM, KEY MANAGEMENT SCHEME OR KEY LENGTH; DETAILS OF PRE- OR
POST-PROCESSING OF THE DATE; DETAILS OF PROGRAMMING INTERFACES THAT CAN
BE USED TO GAIN ACCESS TO THE CRYPTOGRAPHIC FUNCTIONALITY OF THE
PRODUCT AND INSTALLATION INSTRUCTIONS ETC. “EXPORTERS COUNTRY” MEANS
THE COUNTRY/PLACE OF ORIGIN OF THE GOODS. IT MAY NOT NECESSARILY BE THE
MANUFACTURING PLACE.)
E. IS THIS PRODUCT GIVEN AWAY FOR FREE?
Sample Encryption Questionnaire 2017 Page 12
MEDICAL COMMODITIES AND SOFTWARE 770.2 (m) Interpretation 13, Supplement 3 to Part 774
Statement of Understanding
IS THE COMMODITY OR SOFTWARE YES NO
SPECIALLY DESIGNED FOR MEDICAL END
USE THAT INCORPORATE AN ITEM IN
CAT.5 PART II?
‘Specially designed for medical end-use’
means designed for medical treatment or the
practice of medicine (does not include medical
research).
Commodities or software are considered
‘incorporated’ if the commodity or software
is: Essential to the functioning of the medical
equipment; customarily included in the sale of
the medical equipment; and exported or re-
exported with the medical equipment.
Sample Encryption Questionnaire 2017 Page 13