Home > 106th Congressional Bills > S. 799 (is) To amend the Internal Revenue Code of 1986 to modify the tax brackets, [Introduced in Senate] ...

S. 799 (is) To amend the Internal Revenue Code of 1986 to modify the tax brackets, [Introduced in Senate] ...

Web GovRecords.org

                                                       Calendar No. 263


  1st Session

                                 S. 798

                          [Report No. 106-142]


                                 A BILL

To promote electronic commerce by encouraging and facilitating the use 
of encryption in interstate commerce consistent with the protection of 
               national security, and for other purposes.


                             August 5, 1999

                       Reported without amendment
                                                       Calendar No. 263
  1st Session
                                 S. 798

                          [Report No. 106-142]

To promote electronic commerce by encouraging and facilitating the use 
of encryption in interstate commerce consistent with the protection of 
               national security, and for other purposes.



                             April 14, 1999

Mr. McCain (for himself, Mr. Burns, Mr. Wyden, Mr. Leahy, Mr. Abraham, 
 Mr. Kerry, Mrs. Hutchison, and Mr. Feingold) introduced the following 
 bill; which was read twice and referred to the Committee on Commerce, 
                      Science, and Transportation

                             August 5, 1999

               Reported by Mr. McCain, without amendment


                                 A BILL

To promote electronic commerce by encouraging and facilitating the use 
of encryption in interstate commerce consistent with the protection of 
               national security, and for other purposes.

    Be it enacted by the Senate and House of Representatives of the 
United States of America in Congress assembled,


    This Act may be cited as the ``Promote Reliable On-Line 
Transactions to Encourage Commerce and Trade (PROTECT) Act of 1999''.


    The purposes of this Act are--
            (1) to promote electronic growth foster electronic 
            (2) create consumer confidence in electronic commerce;
            (3) meet the needs of businesses and individuals using 
        electronic networks;
            (4) prevent crime; and
            (5) improve national security
        by facilitating the widespread use of encryption and assisting 
        the United States Government in developing the capability to 
        respond to the challenges posed by new technological 


    Congress finds the following:
            (1) The ability to digitize information makes carrying out 
        tremendous amounts of commerce and personal communication 
        electronically possible.
            (2) Miniaturization, distributed computing, and reduced 
        transmission costs make communication via electronic networks a 
            (3) The explosive growth in the Internet and other computer 
        networks reflects the potential growth of electronic commerce 
        and personal communication.
            (4) The Internet and the global information infrastructure 
        have the potential to revolutionize the way individuals and 
        businesses conduct business.
            (5) The full potential of the Internet for the conduct of 
        business cannot be realized as long as it is an insecure medium 
        in which confidential business information and sensitive 
        personal information remain at risk of unauthorized viewing, 
        alteration, and use.
            (6) The United States' critical infrastructures 
        increasingly rely on vulnerable commercial information systems 
        and electronic networks and represent a growing risk to 
        national security and public safety because the security and 
        privacy of those systems and networks is not assured.
            (7) Encryption of information enables businesses and 
        individuals to protect themselves, their commercial information 
        and networks, and the United States' critical infrastructures 
        against unauthorized viewing, alteration, and abuse ensuring 
        the security, confidentiality, authenticity, and integrity of 
            (8) American computer software and hardware, 
        communications, and electronics businesses are leading the 
        world technology revolution, and the American information 
        technology industry is a vital sector of the United States 
        economy. These businesses have developed in the commercial 
        marketplace, and are prepared to offer immediately to computer 
        users worldwide, a variety of communications and computer 
        hardware and software that provide strong, robust, and easy-to-
        use encryption.
            (9) Notwithstanding American preeminence in information 
        technology, many foreign companies currently manufacture 
        products and services that are comparable in quality and 
        capabilities to United States products and frequently provide 
        stronger encryption. These foreign companies are competing 
        fiercely with United States companies for sales not only of the 
        encryption product or service, but also for the ultimate 
        product that uses the encryption capability, including 
        applications ranging from online banking to electronic mail to 
            (10) The leading survey of available encryption products 
        reports that, as of December, 1997, there were 656 foreign 
        encryption products (out of 1619 encryption products produced 
        worldwide) available from 474 vendors in 29 different foreign 
            (11) To promote economic growth, foster electronic 
        commerce, meet the needs of businesses and individuals using 
        electronic networks, prevent crime, and improve national 
        security, Americans should be free to continue using lawfully 
        any encryption products and programs, and American companies 
        should be free to sell, license, or otherwise distribute such 
        encryption products and programs worldwide so long as national 
        security is not put at risk.
            (12) The United States government should promote the use of 
        the United States encryption products and expedite its work 
        with the industry to update the United States Data Encryption 
        Standard (DES).
            (13) NIST has proposed requirements and established 
        procedures for adopting a new, stronger, private sector--
        developed Advanced Encryption Standard (AES).
            (14) Similar to DES, it is anticipated that AES will become 
        an international encryption standard adopted by individuals and 
        companies worldwide.
            (15) NIST has requested candidate algorithms, evaluated 
        candidate algorithms, and encouraged public comment at each 
        step of the process. NIST's open and public process for 
        developing and testing the new AES should be applauded and 
            (16) Further demonstrating the worldwide availability, use, 
        and sophistication of encryption abroad, only 5 of the 15 AES 
        candidate algorithms submitted to NIST for evaluation that 
        complied with all requirements and procedures for submission 
        were proposed by companies and individuals in the United 
        States. The remaining 10 candidate algorithms were proposed by 
        individuals and companies from 11 different countries 
        (Australia's LOKI97; Belgium's RIJNDAEL; Canada's CAST-256 and 
        DEAL; Costa Rica's FROG; France's DFC; Germany's MAGENTA; 
        Japan's E2; Korea's CRYPTON; and the United Kingdom, Israel, 
        and Norway's SERPENT algorithms).
            (17) NIST's efforts to create the AES to replace DES are 
        important to the development of adequate global information 
        security to a degree that Congress should explicitly authorize 
        and support NIST's efforts and establish a deadline of January 
        1, 2002, for finalizing the new standard.
            (18) Once NIST finalizes AES, the Federal Government should 
        permit all United States products meeting the new AES standards 
        or its equivalent to be exported worldwide to ensure global 
        security and to permit United States companies to compete 
        effectively with their foreign competitors consistent with the 
        national security requirements of the United States.
            (19) The United States Government has legitimate law 
        enforcement and national security objectives, which can be met 
        by permitting American companies to compete globally, while at 
        the same time recognizing the challenges to law enforcement and 
        national security posed by quickly advancing technological 
        developments and providing for research, development, and 
        adoption of new technology to respond to these challenges.
            (20) As part of its efforts to fight crime with technology 
        and ensure the safety of commercial networks, the United States 
        government should establish a mechanism for facilitating 
        communications with experts in information security industries, 
        including cryptographers, engineers, software publishers, and 
        others involved in the design and development of information 
        security products and should ensure that such sums as necessary 
        are appropriated to ensure and enhance national security and 
        law enforcement.
            (21) The United Government also should expand and expedite 
        its computer security research activities at NIST and the 
        Federal laboratories, work with industry to recommend priority 
        activities at university research facilities, and fund 
        scholarships in information security.


    In this Act:
            (1) Computer hardware.--The term ``computer hardware'' 
        includes computer systems, equipment, application-specific 
        assemblies, smart cards, modules, integrated circuits, printed 
        circuit board assemblies, and devices that incorporate 1 or 
        more microprocessor-based central processing units that are 
        capable of accepting, storing, processing, or providing output 
        of data.
            (2) Encrypt and encryption.--The term ``encrypt'' and 
        ``encryption'' means the scrambling (and descrambling) of wire 
        communications, electronic communications, or electronically 
        stored information, using mathematical formulas or algorithms 
        to preserve the confidentiality, integrity, or authenticity of, 
        and prevent unauthorized recipients from accessing or altering, 
        such communications or information.
            (3) Encryption product.--The term ``encryption product''--
                    (A) means computer hardware, computer software, or 
                technology with encryption capabilities; and
                    (B) includes any subsequent version of or update to 
                an encryption product, if the encryption capabilities 
                are not changed.
            (4) Exportable.--The term ``exportable'' means the ability 
        to transfer, ship, or transmit to foreign users.
            (5) Generally available or general availability.--The terms 
        ``generally available'' or ``general availability'' mean--
                    (A) in the case of computer hardware or computer 
                software (including encryption products), computer 
                hardware, or computer software that is--
                            (i) distributed via the Internet;
                            (ii) widely offered for sale, license, or 
                        transfer (without regard to whether it is 
                        offered for consideration), including over-the-
                        counter retail sales, mail order transactions, 
                        telephone order transactions, electronic 
                        distribution, or sale on approval;
                            (iii) preloaded on computer hardware that 
                        is widely available; or
                            (iv) assembled from computer hardware or 
                        computer software components that are generally 
                    (B) not designed, developed, or tailored by the 
                manufacturer for specific purchasers, except that the 
                purchaser or user may--
                            (i) supply certain installation parameters 
                        needed by the computer hardware or computer 
                        software to function properly with the computer 
                        system of the user or purchaser; or
                            (ii) select from among options contained in 
                        the computer hardware or computer software; and
                    (C) are available in more than 1 country through a 
                means described in subparagraph (A).
            (6) Key.--The term ``key'' means the variable information 
        used in a mathematical formula, code, or algorithm, or any 
        component thereof, used to decrypt wire communications, 
electronic communications, or electronically stored information, that 
has been encrypted.
            (7) License exception.--The term ``license exception'' 
        means an authorization by the Bureau of Export Administration 
        of the Department of Commerce that allows the export or re-
        export, under stated conditions, of items subject to the Export 
        Administration Regulations that otherwise would require a 
            (8) NIST.--The term ``NIST'' means the National Institute 
        of Standards and Technology in the Department of Commerce.
            (9) On-line merchant.--The term ``on-line merchant'' means 
        either a person or a company or other entity engaged in 
        commerce that, as part of its business, uses electronic means 
        to conduct commercial transactions in goods (including, but not 
        limited to, software and all other forms of digital content) or 
        services, whether delivered in tangible or electronic form.
            (10) Person.--The term ``person'' has the meaning given the 
        term in section 2510(1) of title 1, United States Code.
            (11) Publicly available or public availability.--The terms 
        ``publicly available'' or ``public availability'' mean--
                    (A) information that is generally accessible to the 
                interested public in any form; or
                    (B) technology and software that are already 
                published or will be published, arise during, or result 
                from fundamental research, are educational, or are 
                included in certain patent applications.
            (12) Recoverable product.--The term ``recoverable product'' 
        means an encryption product that--
                    (A) incorporates an operator-controlled management 
                interface enabling real-time access to specified 
                network traffic prior to encryption, or after 
                decryption, at a designated access point under the 
                control of the network owner or operator (utilizing a 

Pages: 1 2 3 Next >>

Other Popular 106th Congressional Bills Documents:

1 H.R. 3581 (ih) To make additional funds available to the Secretary of Commerce for purposes of the 2000 decennial census, and for other purposes. [Introduced in House] ...
2 H.R. 592 (rh) To redesignate Great Kills Park in the Gateway National Recreation Area as ``World War II Veterans Park at Great Kills''. [Reported in House] ...
3 H.R. 1619 (rh) To amend the Quinebaug and Shetucket Rivers Valley National Heritage Corridor Act of 1994 to expand the boundaries of the Corridor. [Reported in House] ...
4 H.R. 4681 (enr) To provide for the adjustment of status of certain Syrian nationals. [Enrolled bill] ...
5 H.R. 3103 (ih) To amend title XIX of the Social Security Act to assure preservation of safety net hospitals through maintenance of the Medicaid disproportionate share hospital program. [Introduced in House] ...
6 S. 319 (is) To provide for childproof handguns, and for other purposes. [Introduced in Senate] ...
7 H.R. 5237 (ih) To institute a moratorium on the imposition of the death penalty at the Federal and State level until a National Commission on the Death Penalty studies its use and policies ensuring justice, fairness, and due process are implemented. [Intr...
8 H.R. 782 (rds) To amend the Older Americans Act of 1965 to extend authorizations of appropriations for programs under the Act, to modernize programs and services for older individuals, and for other purposes. [Received in the Senate] ...
9 H.R. 2725 (ih) To provide for a rural education initiative, and for other purposes. [Introduced in House] ...
10 S. 3008 (is) To amend the Age Discrimination in Employment Act of 1967 to require, [Introduced in Senate] ...
11 S. 3142 (is) To expand the boundary of the George Washington Birthplace National Monument, and for other purposes. [Introduced in Senate] ...
12 S. 2577 (is) To reduce temporarily the duty on Fipronil technical. [Introduced in Senate] ...
13 S. 335 (rs) To amend chapter 30 of title 39, United States Code, to provide for the nonmailability of certain deceptive matter relating to games of chance, administrative procedures, orders, and civil penalties relating to such matter, and for other purpo...
14 S.Res. 169 (ats) Commending General Wesley K. Clark, United States Army. [Agreed to Senate] ...
15 H.R. 1443 (rh) To provide for the collection of data on traffic stops. [Reported in House] ...
16 H.R. 4829 (ih) To provide for the application of certain measures to the People's Republic of China in response to the illegal sale, transfer, or misuse of certain controlled goods, services, or technology, and for other purposes. [Introduced in House] %%...
17 S. 2763 (is) To amend the Food Security Act of 1985 to permit owners and operators to use certain practices to meet the requirement for establishing approved vegetative cover on highly erodible cropland subject to conservation reserve contracts. [Introduc...
18 S. 2000 (rs) For the relief of Guy Taylor. [Reported in Senate] ...
19 H.R. 371 (eh) To facilitate the naturalization of aliens who served with special guerrilla units or irregular forces in Laos. [Engrossed in House] ...
20 S. 243 (es) To authorize the construction of the Perkins County Rural Water System and authorize financial assistance to the Perkins County Rural Water System, Inc., a nonprofit corporation, in the planning and construction of the water supply system, and...
21 H.Res. 658 (ih) Expressing the sense of the House of Representatives with respect to Dato Seri Anwar Ibrahim. [Introduced in House] ...
22 H.R. 4125 (ih) To provide a grant under the urban park and recreation recovery program to assist in the development of a Millennium Cultural Cooperative Park in Youngstown, Ohio. [Introduced in House] ...
23 H.R. 1906 (eh) Making appropriations for Agriculture, Rural Development, Food and Drug Administration, and Related Agencies for the fiscal year ending September 30, 2000, and for other purposes. [Engrossed in House] ...
24 S.Con.Res. 1 (is) Expressing congressional support for the International Labor Organization's Declaration on Fundamental Principles and Rights at Work. [Introduced in Senate] ...
25 S. 1567 (rh) To designate the United States courthouse located at 223 Broad Street in Albany, Georgia, as the ``C.B. King United States Courthouse''. [Reported in House] ...
26 S.Con.Res. 33 (is) Expressing the sense of Congress regarding the need for vigorous prosecution of war crimes, genocide, and crimes against humanity in the former Republic of Yugoslavia. [Introduced in Senate] ...
27 H.R. 2752 (pcs) To direct the Secretary of the Interior to sell certain public land in Lincoln County through a competitive process. [Placed on Calendar Senate] ...
28 S. 2896 (is) To normalize trade relations with Cuba, and for other purposes. [Introduced in Senate] ...
29 H.R. 999 (rs) To amend the Federal Water Pollution Control Act to improve the quality of coastal recreation waters, and for other purposes. [Reported in Senate] ...
30 H.R. 2484 (eh) To provide that land which is owned by the Lower Sioux Indian Community in the State of Minnesota but which is not held in trust by the United States for the Community may be leased or transferred by the Community without further approval b...

Other Documents:

106th Congressional Bills Records and Documents

GovRecords.org presents information on various agencies of the United States Government. Even though all information is believed to be credible and accurate, no guarantees are made on the complete accuracy of our government records archive. Care should be taken to verify the information presented by responsible parties. Please see our reference page for congressional, presidential, and judicial branch contact information. GovRecords.org values visitor privacy. Please see the privacy page for more information.
House Rules:

104th House Rules
105th House Rules
106th House Rules

Congressional Bills:

104th Congressional Bills
105th Congressional Bills
106th Congressional Bills
107th Congressional Bills
108th Congressional Bills

Supreme Court Decisions

Supreme Court Decisions


1995 Privacy Act Documents
1997 Privacy Act Documents
1994 Unified Agenda
2004 Unified Agenda

Congressional Documents:

104th Congressional Documents
105th Congressional Documents
106th Congressional Documents
107th Congressional Documents
108th Congressional Documents

Congressional Directory:

105th Congressional Directory
106th Congressional Directory
107th Congressional Directory
108th Congressional Directory

Public Laws:

104th Congressional Public Laws
105th Congressional Public Laws
106th Congressional Public Laws
107th Congressional Public Laws
108th Congressional Public Laws

Presidential Records

1994 Presidential Documents
1995 Presidential Documents
1996 Presidential Documents
1997 Presidential Documents
1998 Presidential Documents
1999 Presidential Documents
2000 Presidential Documents
2001 Presidential Documents
2002 Presidential Documents
2003 Presidential Documents
2004 Presidential Documents

Home Executive Judicial Legislative Additional Reference About Privacy