Home > 106th Congressional Bills > S. 799 (is) To amend the Internal Revenue Code of 1986 to modify the tax brackets, [Introduced in Senate] ...

S. 799 (is) To amend the Internal Revenue Code of 1986 to modify the tax brackets, [Introduced in Senate] ...

Web GovRecords.org

                                                       Calendar No. 263


  1st Session

                                 S. 798

                          [Report No. 106-142]


                                 A BILL

To promote electronic commerce by encouraging and facilitating the use 
of encryption in interstate commerce consistent with the protection of 
               national security, and for other purposes.


                             August 5, 1999

                       Reported without amendment
                                                       Calendar No. 263
  1st Session
                                 S. 798

                          [Report No. 106-142]

To promote electronic commerce by encouraging and facilitating the use 
of encryption in interstate commerce consistent with the protection of 
               national security, and for other purposes.



                             April 14, 1999

Mr. McCain (for himself, Mr. Burns, Mr. Wyden, Mr. Leahy, Mr. Abraham, 
 Mr. Kerry, Mrs. Hutchison, and Mr. Feingold) introduced the following 
 bill; which was read twice and referred to the Committee on Commerce, 
                      Science, and Transportation

                             August 5, 1999

               Reported by Mr. McCain, without amendment


                                 A BILL

To promote electronic commerce by encouraging and facilitating the use 
of encryption in interstate commerce consistent with the protection of 
               national security, and for other purposes.

    Be it enacted by the Senate and House of Representatives of the 
United States of America in Congress assembled,


    This Act may be cited as the ``Promote Reliable On-Line 
Transactions to Encourage Commerce and Trade (PROTECT) Act of 1999''.


    The purposes of this Act are--
            (1) to promote electronic growth foster electronic 
            (2) create consumer confidence in electronic commerce;
            (3) meet the needs of businesses and individuals using 
        electronic networks;
            (4) prevent crime; and
            (5) improve national security
        by facilitating the widespread use of encryption and assisting 
        the United States Government in developing the capability to 
        respond to the challenges posed by new technological 


    Congress finds the following:
            (1) The ability to digitize information makes carrying out 
        tremendous amounts of commerce and personal communication 
        electronically possible.
            (2) Miniaturization, distributed computing, and reduced 
        transmission costs make communication via electronic networks a 
            (3) The explosive growth in the Internet and other computer 
        networks reflects the potential growth of electronic commerce 
        and personal communication.
            (4) The Internet and the global information infrastructure 
        have the potential to revolutionize the way individuals and 
        businesses conduct business.
            (5) The full potential of the Internet for the conduct of 
        business cannot be realized as long as it is an insecure medium 
        in which confidential business information and sensitive 
        personal information remain at risk of unauthorized viewing, 
        alteration, and use.
            (6) The United States' critical infrastructures 
        increasingly rely on vulnerable commercial information systems 
        and electronic networks and represent a growing risk to 
        national security and public safety because the security and 
        privacy of those systems and networks is not assured.
            (7) Encryption of information enables businesses and 
        individuals to protect themselves, their commercial information 
        and networks, and the United States' critical infrastructures 
        against unauthorized viewing, alteration, and abuse ensuring 
        the security, confidentiality, authenticity, and integrity of 
            (8) American computer software and hardware, 
        communications, and electronics businesses are leading the 
        world technology revolution, and the American information 
        technology industry is a vital sector of the United States 
        economy. These businesses have developed in the commercial 
        marketplace, and are prepared to offer immediately to computer 
        users worldwide, a variety of communications and computer 
        hardware and software that provide strong, robust, and easy-to-
        use encryption.
            (9) Notwithstanding American preeminence in information 
        technology, many foreign companies currently manufacture 
        products and services that are comparable in quality and 
        capabilities to United States products and frequently provide 
        stronger encryption. These foreign companies are competing 
        fiercely with United States companies for sales not only of the 
        encryption product or service, but also for the ultimate 
        product that uses the encryption capability, including 
        applications ranging from online banking to electronic mail to 
            (10) The leading survey of available encryption products 
        reports that, as of December, 1997, there were 656 foreign 
        encryption products (out of 1619 encryption products produced 
        worldwide) available from 474 vendors in 29 different foreign 
            (11) To promote economic growth, foster electronic 
        commerce, meet the needs of businesses and individuals using 
        electronic networks, prevent crime, and improve national 
        security, Americans should be free to continue using lawfully 
        any encryption products and programs, and American companies 
        should be free to sell, license, or otherwise distribute such 
        encryption products and programs worldwide so long as national 
        security is not put at risk.
            (12) The United States government should promote the use of 
        the United States encryption products and expedite its work 
        with the industry to update the United States Data Encryption 
        Standard (DES).
            (13) NIST has proposed requirements and established 
        procedures for adopting a new, stronger, private sector--
        developed Advanced Encryption Standard (AES).
            (14) Similar to DES, it is anticipated that AES will become 
        an international encryption standard adopted by individuals and 
        companies worldwide.
            (15) NIST has requested candidate algorithms, evaluated 
        candidate algorithms, and encouraged public comment at each 
        step of the process. NIST's open and public process for 
        developing and testing the new AES should be applauded and 
            (16) Further demonstrating the worldwide availability, use, 
        and sophistication of encryption abroad, only 5 of the 15 AES 
        candidate algorithms submitted to NIST for evaluation that 
        complied with all requirements and procedures for submission 
        were proposed by companies and individuals in the United 
        States. The remaining 10 candidate algorithms were proposed by 
        individuals and companies from 11 different countries 
        (Australia's LOKI97; Belgium's RIJNDAEL; Canada's CAST-256 and 
        DEAL; Costa Rica's FROG; France's DFC; Germany's MAGENTA; 
        Japan's E2; Korea's CRYPTON; and the United Kingdom, Israel, 
        and Norway's SERPENT algorithms).
            (17) NIST's efforts to create the AES to replace DES are 
        important to the development of adequate global information 
        security to a degree that Congress should explicitly authorize 
        and support NIST's efforts and establish a deadline of January 
        1, 2002, for finalizing the new standard.
            (18) Once NIST finalizes AES, the Federal Government should 
        permit all United States products meeting the new AES standards 
        or its equivalent to be exported worldwide to ensure global 
        security and to permit United States companies to compete 
        effectively with their foreign competitors consistent with the 
        national security requirements of the United States.
            (19) The United States Government has legitimate law 
        enforcement and national security objectives, which can be met 
        by permitting American companies to compete globally, while at 
        the same time recognizing the challenges to law enforcement and 
        national security posed by quickly advancing technological 
        developments and providing for research, development, and 
        adoption of new technology to respond to these challenges.
            (20) As part of its efforts to fight crime with technology 
        and ensure the safety of commercial networks, the United States 
        government should establish a mechanism for facilitating 
        communications with experts in information security industries, 
        including cryptographers, engineers, software publishers, and 
        others involved in the design and development of information 
        security products and should ensure that such sums as necessary 
        are appropriated to ensure and enhance national security and 
        law enforcement.
            (21) The United Government also should expand and expedite 
        its computer security research activities at NIST and the 
        Federal laboratories, work with industry to recommend priority 
        activities at university research facilities, and fund 
        scholarships in information security.


    In this Act:
            (1) Computer hardware.--The term ``computer hardware'' 
        includes computer systems, equipment, application-specific 
        assemblies, smart cards, modules, integrated circuits, printed 
        circuit board assemblies, and devices that incorporate 1 or 
        more microprocessor-based central processing units that are 
        capable of accepting, storing, processing, or providing output 
        of data.
            (2) Encrypt and encryption.--The term ``encrypt'' and 
        ``encryption'' means the scrambling (and descrambling) of wire 
        communications, electronic communications, or electronically 
        stored information, using mathematical formulas or algorithms 
        to preserve the confidentiality, integrity, or authenticity of, 
        and prevent unauthorized recipients from accessing or altering, 
        such communications or information.
            (3) Encryption product.--The term ``encryption product''--
                    (A) means computer hardware, computer software, or 
                technology with encryption capabilities; and
                    (B) includes any subsequent version of or update to 
                an encryption product, if the encryption capabilities 
                are not changed.
            (4) Exportable.--The term ``exportable'' means the ability 
        to transfer, ship, or transmit to foreign users.
            (5) Generally available or general availability.--The terms 
        ``generally available'' or ``general availability'' mean--
                    (A) in the case of computer hardware or computer 
                software (including encryption products), computer 
                hardware, or computer software that is--
                            (i) distributed via the Internet;
                            (ii) widely offered for sale, license, or 
                        transfer (without regard to whether it is 
                        offered for consideration), including over-the-
                        counter retail sales, mail order transactions, 
                        telephone order transactions, electronic 
                        distribution, or sale on approval;
                            (iii) preloaded on computer hardware that 
                        is widely available; or
                            (iv) assembled from computer hardware or 
                        computer software components that are generally 
                    (B) not designed, developed, or tailored by the 
                manufacturer for specific purchasers, except that the 
                purchaser or user may--
                            (i) supply certain installation parameters 
                        needed by the computer hardware or computer 
                        software to function properly with the computer 
                        system of the user or purchaser; or
                            (ii) select from among options contained in 
                        the computer hardware or computer software; and
                    (C) are available in more than 1 country through a 
                means described in subparagraph (A).
            (6) Key.--The term ``key'' means the variable information 
        used in a mathematical formula, code, or algorithm, or any 
        component thereof, used to decrypt wire communications, 
electronic communications, or electronically stored information, that 
has been encrypted.
            (7) License exception.--The term ``license exception'' 
        means an authorization by the Bureau of Export Administration 
        of the Department of Commerce that allows the export or re-
        export, under stated conditions, of items subject to the Export 
        Administration Regulations that otherwise would require a 
            (8) NIST.--The term ``NIST'' means the National Institute 
        of Standards and Technology in the Department of Commerce.
            (9) On-line merchant.--The term ``on-line merchant'' means 
        either a person or a company or other entity engaged in 
        commerce that, as part of its business, uses electronic means 
        to conduct commercial transactions in goods (including, but not 
        limited to, software and all other forms of digital content) or 
        services, whether delivered in tangible or electronic form.
            (10) Person.--The term ``person'' has the meaning given the 
        term in section 2510(1) of title 1, United States Code.
            (11) Publicly available or public availability.--The terms 
        ``publicly available'' or ``public availability'' mean--
                    (A) information that is generally accessible to the 
                interested public in any form; or
                    (B) technology and software that are already 
                published or will be published, arise during, or result 
                from fundamental research, are educational, or are 
                included in certain patent applications.
            (12) Recoverable product.--The term ``recoverable product'' 
        means an encryption product that--
                    (A) incorporates an operator-controlled management 
                interface enabling real-time access to specified 
                network traffic prior to encryption, or after 
                decryption, at a designated access point under the 
                control of the network owner or operator (utilizing a 

Pages: 1 2 3 Next >>

Other Popular 106th Congressional Bills Documents:

1 H.R. 604 (eh) To amend the charter of the AMVETS organization. [Engrossed in House] ...
2 H.R. 1259 (eh) To amend the Congressional Budget Act of 1974 to protect Social Security surpluses through strengthened budgetary enforcement mechanisms. [Engrossed in House] ...
3 S. 130 (is) To amend the Internal Revenue Code of 1986 to make the dependent care credit refundable, and for other purposes. [Introduced in Senate] ...
4 H.Res. 517 (ih) Expressing the sense of the House of Representatives with respect to the Bloch Cancer Foundation. [Introduced in House] ...
5 S. 1346 (is) To ensure the independence and nonpartisan operation of the Office of Advocacy of the Small Business Administration. [Introduced in Senate] ...
6 H.Con.Res. 269 (enr) [Enrolled bill] ...
7 H.R. 2466 (pp) Making appropriations for the Department of the Interior and related agencies for the fiscal year ending September 30, 2000, and for other purposes. x [Public Print] ...
8 H.R. 5511 (ih) To amend the Food Security Act of 1985 to establish the conservation security program. [Introduced in House] ...
9 H.R. 5164 (rh) To amend title 49, United States Code, to require reports concerning defects in motor vehicles or tires or other motor vehicle equipment in foreign countries, and for other purposes. [Reported in House] ...
10 H.R. 2918 (ih) To amend Public Law 89-108 to increase authorization levels for State [Introduced in House] ...
11 H.R. 5289 (ih) For the relief of Moise Marcel Sapriel. [Introduced in House] ...
12 H.Res. 590 (eh) [Engrossed in House] ...
13 H.Res. 291 (rh) Waiving points of order against the conference report to accompany the [Reported in House] ...
14 H.Con.Res. 404 (rds) Calling for the immediate release of Mr. Edmond Pope from prison in the Russian Federation for humanitarian reasons, and for other purposes. [Received in the Senate] ...
15 S. 1249 (is) To deny Federal public benefits to individuals who participated in Nazi persecution. [Introduced in Senate] ...
16 S. 2383 (is) To amend the Immigration and Nationality Act to provide temporary protected status to certain unaccompanied alien children, to provide for the adjustment of status of aliens unlawfully present in the United States who are under 18 years of ag...
17 H.Res. 374 (eh) [Engrossed in House] ...
18 H.Con.Res. 50 (ih) Authorizing the 1999 District of Columbia Special Olympics Law Enforcement Torch Run to be run through the Capitol Grounds. [Introduced in House] ...
19 H.R. 3198 (ih) To amend title VII of the Tariff Act of 1930 to provide that the provisions relating to countervailing duties apply to nonmarket economy countries. [Introduced in House] ...
20 H.R. 3063 (rs) To amend the Mineral Leasing Act to increase the maximum acreage of Federal leases for sodium that may be held by an entity in any one State, and for other purposes. [Reported in Senate] ...
21 H.R. 3846 (ih) To amend the Fair Labor Standards Act of 1938 to increase the minimum wage, and for other purposes. [Introduced in House] ...
22 S.Con.Res. 18 (is) Expressing the sense of the Congress that the current Federal income tax deduction for interest paid on debt secured by a first or second home should not be further restricted. [Introduced in Senate] ...
23 H.R. 4398 (ih) To establish a compensation and health care program for employees of [Introduced in House] ...
24 H.R. 4919 (eh) To amend the Foreign Assistance Act of 1961 and the Arms Export Control Act to make improvements to certain defense and security assistance provisions under those Acts, to authorize the transfer of naval vessels to certain foreign countries...
25 S. 1753 (es) To amend the Immigration and Nationality Act to provide that an adopted alien who is less than 18 years of age may be considered a child under such Act if adopted with or after a sibling who is a child under such Act. [Engrossed in Senate] %%...
26 S. 710 (rs) To authorize a feasibility study on the preservation of certain Civil War battlefields along the Vicksburg Campaign Trail. [Reported in Senate] ...
27 H.Con.Res. 107 (ih) Expressing the sense of Congress rejecting the conclusions of a recent article published by the American Psychological Association that suggests that sexual relationships between adults and children might be positive for children. [Int...
28 S. 1513 (rh) For the relief of Jacqueline Salinas and her children Gabriela Salinas, Alejandro Salinas, and Omar Salinas. [Reported in House] ...
29 S. 776 (rs) To authorize the National Park Service to conduct a feasibility study for the preservation of the Loess Hills in western Iowa. [Reported in Senate] ...
30 H.R. 2821 (ih) To amend the North American Wetlands Conservation Act to provide for appointment of 2 additional members of the North American Wetlands Conservation Council. [Introduced in House] ...

Other Documents:

106th Congressional Bills Records and Documents

GovRecords.org presents information on various agencies of the United States Government. Even though all information is believed to be credible and accurate, no guarantees are made on the complete accuracy of our government records archive. Care should be taken to verify the information presented by responsible parties. Please see our reference page for congressional, presidential, and judicial branch contact information. GovRecords.org values visitor privacy. Please see the privacy page for more information.
House Rules:

104th House Rules
105th House Rules
106th House Rules

Congressional Bills:

104th Congressional Bills
105th Congressional Bills
106th Congressional Bills
107th Congressional Bills
108th Congressional Bills

Supreme Court Decisions

Supreme Court Decisions


1995 Privacy Act Documents
1997 Privacy Act Documents
1994 Unified Agenda
2004 Unified Agenda

Congressional Documents:

104th Congressional Documents
105th Congressional Documents
106th Congressional Documents
107th Congressional Documents
108th Congressional Documents

Congressional Directory:

105th Congressional Directory
106th Congressional Directory
107th Congressional Directory
108th Congressional Directory

Public Laws:

104th Congressional Public Laws
105th Congressional Public Laws
106th Congressional Public Laws
107th Congressional Public Laws
108th Congressional Public Laws

Presidential Records

1994 Presidential Documents
1995 Presidential Documents
1996 Presidential Documents
1997 Presidential Documents
1998 Presidential Documents
1999 Presidential Documents
2000 Presidential Documents
2001 Presidential Documents
2002 Presidential Documents
2003 Presidential Documents
2004 Presidential Documents

Home Executive Judicial Legislative Additional Reference About Privacy