Home > 106th Congressional Bills > H.R. 851 (ih) To require the Federal Communications Commission to establish improved predictive models for determining the availability of television broadcast signals. [Introduced in House] ...

H.R. 851 (ih) To require the Federal Communications Commission to establish improved predictive models for determining the availability of television broadcast signals. [Introduced in House] ...


Google
 
Web GovRecords.org

        products or services.
The Secretary shall submit a report to the Congress regarding the 
results of such inquiry by such date.
    (b) Removal of Impediments to Trade.--Within 1 year after such date 
of enactment, the Secretary shall prescribe such regulations as may be 
necessary to reduce the impediments to trade in encryption products and 
services identified in the inquiry pursuant to subsection (a) for the 
purpose of facilitating the development of interstate and foreign 
commerce. Such regulations shall be designed to--
            (1) promote the sale and distribution, including through 
        electronic commerce, in foreign commerce of encryption products 
        and services manufactured in the United States; and
            (2) strengthen the competitiveness of domestic providers of 
        encryption products and services in foreign commerce, including 
        electronic commerce.
    (c) International Agreements.--
            (1) Report to president.--Upon the completion of the 
        inquiry under subsection (a), the Secretary shall submit a 
        report to the President regarding reducing any impediments to 
        trade in encryption products and services that are identified 
        by the inquiry and could, in the determination of the 
        Secretary, require international negotiations for such 
        reduction.
            (2) Negotiations.--The President shall take all actions 
        necessary to conduct negotiations with other countries for the 
        purposes of (A) concluding international agreements on the 
        promotion of encryption products and services, and (B) 
        achieving mutual recognition of countries' export controls, in 
        order to meet the needs of countries to preserve national 
        security, safeguard privacy, and prevent commercial espionage. 
        The President may consider a country's refusal to negotiate 
        such international export and mutual recognition agreements 
        when considering the participation of the United States in any 
        cooperation or assistance program with that country. The 
        President shall submit a report to the Congress regarding the 
        status of international efforts regarding cryptography not 
        later than December 31, 2000.

SEC. 12. COLLECTION OF INFORMATION ON EFFECT OF ENCRYPTION ON LAW 
              ENFORCEMENT ACTIVITIES.

    (a) Collection of Information by Attorney General.--The Attorney 
General shall compile, and maintain in classified form, data on the 
instances in which encryption (as defined in section 2801 of title 18, 
United States Code) has interfered with, impeded, or obstructed the 
ability of the Department of Justice to enforce the criminal laws of 
the United States.
    (b) Availability of Information to the Congress.--The information 
compiled under subsection (a), including an unclassified summary 
thereof, shall be made available, upon request, to any Member of 
Congress.

SEC. 13. PROHIBITION ON TRANSFERS TO PLA AND COMMUNIST CHINESE MILITARY 
              COMPANIES.

    (a) Prohibition.--Whoever knowingly and willfully transfers to the 
People's Liberation Army or to any Communist Chinese military company 
any encryption product that utilizes a key length of more than 56 
bits--
            (1) in the case of a first offense under this section, 
        shall be imprisoned for not more than 5 years, or fined under 
        title 18, United States Code, or both; and
            (2) in the case of second or subsequent offense under this 
        section, shall be imprisoned for not more than 10 years, or 
        fined under title 18, United States Code, or both.
    (b) Definitions.--For purposes of this section:
            (1) Communist chinese military company.--(A) Subject to 
        subparagraph (B), the term ``Communist Chinese military 
        company'' has the meaning given that term in section 1237(b)(4) 
        of the Strom Thurmond National Defense Authorization Act for 
        Fiscal Year 1999 (50 U.S.C. 1701 note).
            (B) At such time as the determination and publication of 
        persons are made under section 1237(b)(1) of the Strom Thurmond 
        National Defense Authorization Act for Fiscal Year 1999, the 
        term ``Communist Chinese military company'' shall mean the list 
        of those persons so published, as revised under section 
        1237(b)(2) of that Act.
            (2) People's liberation army.--The term ``People's 
        Liberation Army'' has the meaning given that term in section 
        1237(c) of the Strom Thurmond National Defense Authorization 
        Act for Fiscal Year 1999.

SEC. 14. FAILURE TO DECRYPT INFORMATION OBTAINED UNDER COURT ORDER.

    Whoever is required by an order of any court to provide to the 
court or any other party any information in such person's possession 
which has been encrypted and who, having possession of the key or such 
other capability to decrypt such information into the readable or 
comprehensible format of such information prior to its encryption, 
fails to provide such information in accordance with the order in such 
readable or comprehensible form--
            (1) in the case of a first offense under this section, 
        shall be imprisoned for not more than 5 years, or fined under 
        title 18, United States Code, or both; and
            (2) in the case of second or subsequent offense under this 
        section, shall be imprisoned for not more than 10 years, or 
        fined under title 18 United States Code, or both.

SECTION 1. SHORT TITLE.

    This Act may be cited as the ``Security And Freedom through 
Encryption (SAFE) Act''.

SEC. 2. SALE AND USE OF ENCRYPTION.

    (a) In General.--Part I of title 18, United States Code, is amended 
by inserting after chapter 123 the following new chapter:

        ``CHAPTER 125--ENCRYPTED WIRE AND ELECTRONIC INFORMATION

``Sec.
``2801. Definitions.
``2802. Freedom to use encryption.
``2803. Freedom to sell encryption.
``2804. Prohibition on mandatory key escrow.
``2805. Unlawful use of encryption in furtherance of a criminal act.
``Sec. 2801. Definitions
    ``As used in this chapter--
            ``(1) the terms `person', `State', `wire communication', 
        `electronic communication', `investigative or law enforcement 
        officer', and `judge of competent jurisdiction' have the 
        meanings given those terms in section 2510 of this title;
            ``(2) the term `decrypt' means to retransform or unscramble 
        encrypted data, including communications, to its readable form;
            ``(3) the terms `encrypt', `encrypted', and `encryption' 
        mean the scrambling of wire communications, electronic 
        communications, or electronically stored information, using 
        mathematical formulas or algorithms in order to preserve the 
        confidentiality, integrity, or authenticity of, and prevent 
        unauthorized recipients from accessing or altering, such 
        communications or information;
            ``(4) the term `key' means the variable information used in 
        a mathematical formula, code, or algorithm, or any component 
        thereof, used to decrypt wire communications, electronic 
        communications, or electronically stored information, that has 
        been encrypted; and
            ``(5) the term `key recovery information' means information 
        that would enable obtaining the key of a user of encryption;
            ``(6) the term `plaintext access capability' means any 
        method or mechanism which would provide information in readable 
        form prior to its being encrypted or after it has been 
        decrypted;
            ``(7) the term `United States person' means--
                    ``(A) any United States citizen;
                    ``(B) any other person organized under the laws of 
                any State, the District of Columbia, or any 
                commonwealth, territory, or possession of the United 
                States; and
                    ``(C) any person organized under the laws of any 
                foreign country who is owned or controlled by 
                individuals or persons described in subparagraphs (A) 
                and (B).
``Sec. 2802. Freedom to use encryption
    ``Subject to section 2805, it shall be lawful for any person within 
any State, and for any United States person in a foreign country, to 
use any encryption, regardless of the encryption algorithm selected, 
encryption key length chosen, or implementation technique or medium 
used.
``Sec. 2803. Freedom to sell encryption
    ``Subject to section 2805, it shall be lawful for any person within 
any State to sell in interstate commerce any encryption, regardless of 
the encryption algorithm selected, encryption key length chosen, or 
implementation technique or medium used.
``Sec. 2804. Prohibition on mandatory key escrow
    ``(a) General Prohibition.--Neither the Federal Government nor a 
State may require that, or condition any approval on a requirement 
that, a key, access to a key, key recovery information, or any other 
plaintext access capability be--
            ``(1) built into computer hardware or software for any 
        purpose;
            ``(2) given to any other person, including a Federal 
        Government agency or an entity in the private sector that may 
        be certified or approved by the Federal Government or a State 
        to receive it; or
            ``(3) retained by the owner or user of an encryption key or 
        any other person, other than for encryption products for use by 
        the Federal Government or a State.
    ``(b) Exception for Government National Security and Law 
Enforcement Purposes.--The prohibition contained in subsection (a) 
shall not apply to any department, agency, or instrumentality of the 
United States, or to any department, agency, or political subdivision 
of a State, that has a valid contract with a nongovernmental entity 
that is assisting in the performance of national security or law 
enforcement activity.
    ``(c) Exception for Access for Law Enforcement Purposes.--
Subsection (a) shall not affect the authority of any investigative or 
law enforcement officer, or any member of the intelligence community as 
defined in section 3 of the National Security Act of 1947 (50 U.S.C. 
401a), acting under any law in effect on the effective date of this 
chapter, to gain access to encrypted communications or information.
``Sec. 2805. Unlawful use of encryption in furtherance of a criminal 
              act
    ``(a) Encryption of Incriminating Communications or Information 
Unlawful.--Any person who, in the commission of a felony under a 
criminal statute of the United States, knowingly and willfully encrypts 
incriminating communications or information relating to that felony 
with the intent to conceal such communications or information for the 
purpose of avoiding detection by law enforcement agencies or 
prosecution--
            ``(1) in the case of a first offense under this section, 
        shall be imprisoned for not more than 5 years, or fined in the 
        amount set forth in this title, or both; and
            ``(2) in the case of a second or subsequent offense under 
        this section, shall be imprisoned for not more than 10 years, 
        or fined in the amount set forth in this title, or both.
    ``(b) Use of Encryption Not a Basis for Probable Cause.--The use of 
encryption by any person shall not be the sole basis for establishing 
probable cause with respect to a criminal offense or a search 
warrant.''.
    (b) Conforming Amendment.--The table of chapters for part I of 
title 18, United States Code, is amended by inserting after the item 
relating to chapter 123 the following new item:

``125. Encrypted wire and electronic information............    2801''.

SEC. 3. EXPORTS OF ENCRYPTION.

    (a) Amendment to Export Administration Act of 1979.--Section 17 of 
the Export Administration Act of 1979 (50 U.S.C. App. 2416) is amended 
by adding at the end thereof the following new subsection:
    ``(g) Certain Consumer Products, Computers, and Related 
Equipment.--
            ``(1) General rule.--Subject to paragraphs (2) and (3), the 
        Secretary shall have exclusive authority to control exports of 
        all computer hardware, software, computing devices, customer 
        premises equipment, communications network equipment, and 
        technology for information security (including encryption), 
        except that which is specifically designed or modified for 
        military use, including command, control, and intelligence 
        applications.
            ``(2) Items not requiring licenses.--After a 1-time 
        technical review by the Secretary, which shall be completed not 
        later than 30 working days after submission of the product 
        concerned for such technical review, no export license may be 
        required, except pursuant to the Trading with the enemy Act or 
        the International Emergency Economic Powers Act (but only to 
        the extent that the authority of such Act is not exercised to 
        extend controls imposed under this Act), for the export or 
        reexport of--
                    ``(A) any computer hardware or software or 
                computing device, including computer hardware or 
                software or computing devices with encryption 
                capabilities--
                            ``(i) that is generally available;
                            ``(ii) that is in the public domain for 
                        which copyright or other protection is not 
                        available under title 17, United States Code, 
                        or that is available to the public because it 
                        is generally accessible to the interested 
                        public in any form; or
                            ``(iii) that is used in a commercial, off-
                        the-shelf, consumer product or any component or 
                        subassembly designed for use in such a consumer 
                        product available within the United States or 
                        abroad which--
                                    ``(I) includes encryption 
                                capabilities which are inaccessible to 
                                the end user; and
                                    ``(II) is not designed for military 
                                or intelligence end use;
                    ``(B) any computing device solely because it 
                incorporates or employs in any form--
                            ``(i) computer hardware or software 
                        (including computer hardware or software with 
                        encryption capabilities) that is exempted from 
                        any requirement for a license under 
                        subparagraph (A); or
                            ``(ii) computer hardware or software that 
                        is no more technically complex in its 
                        encryption capabilities than computer hardware 
                        or software that is exempted from any 
                        requirement for a license under subparagraph 
                        (A) but is not designed for installation by the 
                        purchaser;
                    ``(C) any computer hardware or software or 
                computing device solely on the basis that it 
                incorporates or employs in any form interface 
                mechanisms for interaction with other computer hardware 
                or software or computing devices, including computer 
                hardware and software and computing devices with 
                encryption capabilities;
                    ``(D) any computing or telecommunication device 
                which incorporates or employs in any form computer 
                hardware or software encryption capabilities which--
                            ``(i) are not directly available to the end 
                        user; or
                            ``(ii) limit the encryption to be point-to-
                        point from the user to a central communications 
                        point or link and does not enable end-to-end 
                        user encryption;
                    ``(E) technical assistance and technical data used 
                for the installation or maintenance of computer 
                hardware or software or computing devices with 
                encryption capabilities covered under this subsection; 
                or
                    ``(F) any encryption hardware or software or 
                computing device not used for confidentiality purposes, 
                such as authentication, integrity, electronic 
                signatures, nonrepudiation, or copy protection.
            ``(3) Computer hardware or software or computing devices 

Pages: << Prev 1 2 3 4 5 6 7 8 9 10 Next >>

Other Popular 106th Congressional Bills Documents:

1 H.Con.Res. 293 (enr) [Enrolled bill] ...
2 H.R. 1733 (ih) To establish doctoral fellowships designed to increase the pool of scientists and engineers trained specifically to address the global energy and environmental challenges of the 21st century. [Introduced in House] ...
3 H.J.Res. 72 (eh) Granting the consent of the Congress to the Red River Boundary Compact. [Engrossed in House] ...
4 H.Res. 110 (ih) Congratulating the Government and the people of the Republic of El Salvador on successfully completing free and democratic elections on March 7, 1999. [Introduced in House] ...
5 H.R. 884 (ih) To require prior congressional approval before the United States [Introduced in House] ...
6 S.J.Res. 23 (is) Expressing the sense of the Congress regarding the need for a Surgeon General's report on media and violence. [Introduced in Senate] ...
7 H.R. 926 (ih) To require the Secretary of the Army to issue an environmental impact statement before the International Joint Commission implements any water regulation plan affecting the water levels of Lake Ontario or the St. Lawrence River. [Introduced...
8 S.Res. 87 (rs) Commemorating the 60th Anniversary of the International Visitors Program. [Reported in Senate] ...
9 H.Con.Res. 70 (ih) Expressing the sense of the Congress that there should be parity among [Introduced in House] ...
10 H.R. 801 (ih) To modify retroactively the residence requirement for transmission of citizenship to certain individuals born abroad before 1953 to one citizen parent and one alien parent. [Introduced in House] ...
11 H.R. 5006 (ih) To encourage respect for the rights of religious and ethnic minorities in Iran, and to deter Iran from supporting international terrorism, and from furthering its weapons of mass destruction programs. [Introduced in House] ...
12 S. 631 (is) To amend the Social Security Act to eliminate the time limitation on [Introduced in Senate] ...
13 S. 2547 (is) To provide for the establishment of the Great Sand Dunes National Park and the Great Sand Dunes National Preserve in the State of Colorado, and for other purposes. [Introduced in Senate] ...
14 S.Res. 386 (ats) Expressing the sense of the Senate regarding National Pearl Harbor Remembrance Day. [Agreed to Senate] ...
15 S. 80 (is) To establish the position of Assistant United States Trade Representative for Small Business, and for other purposes. [Introduced in Senate] ...
16 H.R. 4853 (ih) To redesignate the facility of the United States Postal Service located at 1568 South Glen Road in South Euclid, Ohio, as the ``Arnold C. D'Amico Station''. [Introduced in House] ...
17 H.R. 3879 (ih) To support the Government of the Republic of Sierra Leone in its peace- building efforts, and for other purposes. [Introduced in House] ...
18 H.R. 5105 (ih) For the relief of Regina Smith. [Introduced in House] ...
19 H.R. 3491 (ih) To amend the Internal Revenue Code of 1986 to codify the authority of the Secretary of the Treasury to issue regulations covering the practice of enrolled agents before the Internal Revenue Service. [Introduced in House] ...
20 H.R. 1211 (rh) To authorize appropriations for the Department of State and related agencies for fiscal years 2000 and 2001, and for other purposes. [Reported in House] ...
21 S. 1856 (is) To amend title 28 of the United States Code to authorize Federal district courts to hear civil actions to recover damages or secure relief for certain injuries to persons and property under or resulting from the Nazi government of Germany. [I...
22 S. 1018 (is) To provide for the appointment of additional Federal district judges in the State of North Carolina, and for other purposes. [Introduced in Senate] ...
23 H.Con.Res. 381 (rfs) Expressing the sense of the Congress that there should be established a National Health Center Week to raise awareness of health services provided by community, migrant, and homeless health centers. [Referred in Senate] ...
24 H.Res. 260 (rh) Providing for consideration of the bill (H.R. 2587) making [Reported in House] ...
25 H.R. 708 (ih) To amend title 38, United States Code, to provide for reinstatement of certain benefits administered by the Secretary of Veterans Affairs for remarried surviving spouses of veterans upon termination of their remarriage. [Introduced in House]...
26 S. 711 (es) To allow for the investment of joint Federal and State funds from the civil settlement of damages from the Exxon Valdez oil spill, and for other purposes. [Engrossed in Senate] ...
27 H.R. 2488 (eh) To provide for reconciliation pursuant to sections 105 and 211 of the concurrent resolution on the budget for fiscal year 2000. [Engrossed in House] ...
28 S. 1638 (es) To amend the Omnibus Crime Control and Safe Streets Act of 1968 to extend the retroactive eligibility dates for financial assistance for higher education for spouses and dependent children of Federal, State, and local law enforcement officers...
29 S. 430 (is) To amend the Alaska Native Claims Settlement Act, to provide for a land exchange between the Secretary of Agriculture and the Kake Tribal Corporation, and for other purposes. [Introduced in Senate] ...
30 S. 876 (rs) To amend the Communications Act of 1934 to require that the broadcast of violent video programming be limited to hours when children are not reasonably likely to comprise a substantial portion of the audience. [Reported in Senate] %%Filename:...


Other Documents:

106th Congressional Bills Records and Documents

GovRecords.org presents information on various agencies of the United States Government. Even though all information is believed to be credible and accurate, no guarantees are made on the complete accuracy of our government records archive. Care should be taken to verify the information presented by responsible parties. Please see our reference page for congressional, presidential, and judicial branch contact information. GovRecords.org values visitor privacy. Please see the privacy page for more information.
House Rules:

104th House Rules
105th House Rules
106th House Rules

Congressional Bills:

104th Congressional Bills
105th Congressional Bills
106th Congressional Bills
107th Congressional Bills
108th Congressional Bills

Supreme Court Decisions

Supreme Court Decisions

Additional

1995 Privacy Act Documents
1997 Privacy Act Documents
1994 Unified Agenda
2004 Unified Agenda

Congressional Documents:

104th Congressional Documents
105th Congressional Documents
106th Congressional Documents
107th Congressional Documents
108th Congressional Documents

Congressional Directory:

105th Congressional Directory
106th Congressional Directory
107th Congressional Directory
108th Congressional Directory

Public Laws:

104th Congressional Public Laws
105th Congressional Public Laws
106th Congressional Public Laws
107th Congressional Public Laws
108th Congressional Public Laws

Presidential Records

1994 Presidential Documents
1995 Presidential Documents
1996 Presidential Documents
1997 Presidential Documents
1998 Presidential Documents
1999 Presidential Documents
2000 Presidential Documents
2001 Presidential Documents
2002 Presidential Documents
2003 Presidential Documents
2004 Presidential Documents

Home Executive Judicial Legislative Additional Reference About Privacy