WPC3 R&H7^ q%@`[{GTY0y(Dt}L0Wt/L$, ~Ajv[ 6W$!G,5^HEaOчSw_2~\ "܋bmے7谾F౪=9h]U< twf5t`K ThwzEJ)h['=h5s[bkS{Hv݌a M{K/[Ť$ucNgCYm7tLwz :VL{~DܓG#U4N % 0(UNwm4qK 0D UH# k 0D UN N UN U@i 0~ b' ^  m X  1 72 0c 05N2 0w 0 0 0! 0 0^w 0 0D 1u 72}^ Z   g { \^TYXV [Xo^ e u^ V^A^VScXsXHP LaserJet 4000 Series PCL$,,,,$0(hH  Z 6Times New Roman RegularX($ 6Times New Roman Regularb83|x A  '  _ XHXXX ZFX XHCommerceControlList@BBBSupplementNo.1toPart774PPP(#Category5Info.Security"page  1  #P ZF+##X|XPJ#(3$ !  +ON  0Times New Roman Bold   )  _ XHXXX ZFX XHExportAdministrationRegulations;(#October_14,_Ԁ2008# XHX ZFJ##X|XX XH+#(3$ !  (hH  Z 6Times New Roman Regular(hH  Z6Times New Roman Regular'n2 Z(Times New Roman V& 8Document[8]Document Style0..8` ..` 5A002 Systems, equipment, application specificjN9s U5A992 Equipment not controlled by 5A002.5A992.c !"$hCEIMQUY]aAutoList1i)1)a)%(;3$2#  0  .3  0  (O$(O;$0  2#  a  .3  0` (#(#(b$0  0` (#(#2#   .3  0 ` (#` (#(xir$0  0` (#(#0 ` (#` (#2#(  0  )3  0 (# (#($0  0` (#(#0 ` (#` (#0 (# (#2#(  a  )3  0h(#(#(F$0  0` (#(#0 ` (#` (#0 (# (#0h(#(#2#(   )3  0h(#h(#($0  0` (#(#0 ` (#` (#0 (# (#0h(#(#0h(#h(#2#  0  )3  0(#(#5A002 Systems, equipment, application specific({$0  0` (#(#0 ` (#` (#0 (# (#0h(#(#0h(#h(#0(#(#2#  a  )3  0p(#(#(F$0  0` (#(#0 ` (#` (#0 (# (#0h(#(#0h(#h(#0(#(#0p(#(#2#     )3  0p(#p(# 3#37=CIQYag1.a.i.(1)(a)(i)1)a)&i)5A002 Systems, equipment, application specific5E992 Information Security technology,5A992.a~5A992.b5D992 Information Security software not5A992.a5A002 Systems, equipment, application specific5A992 Equipment not controlled by 5A002.5D992 Information Security software not5E992 Information Security technology,5A992.c5D992 Information Security software not5A992.c5A992.b5A992.a5A992.b5A002 Systems, equipment, application specific5D0025D0025A002 Systems, equipment, application specific5D0025E992 Information Security technology,5A002 Systems, equipment, application specific5A002 Systems, equipment, application specific5E992 Information Security technology,5A992.a5A992.b5D992 Information Security software not5A992.c5D992 Information Security software not !  _ _ _  ,X    &%XX(X(#(#(CATEGORY5-TELECOMMUNICATIONS ( AND INFORMATIONSECURITY   &%%&   II. InformationSecurity   X      4  `    #&%%&g#  Note1: Thecontrolstatusof information .  securityequipment, software,systems,   applicationspecific electronicassemblies,   modules,integratedcircuits,components,or    functionsisdeterminedinCategory5,part2even h  iftheyarecomponentsor electronicassemblies h@  ofotherequipment. @   &%%&  N.B.toNote1: Commoditiesandsoftware   speciallydesignedformedicalendusethat   incorporateaniteminCategory5,part2arenot z  classifiedinanyECCNinCategory5,part2.#&%%&W# zR   Note2: Category5,part2,encryption * products,whenaccompanyingtheiruserforthe  user'spersonaluseorastoolsoftrade,are  eligibleforLicenseExceptions_TMP_ԀorBAG,  subjecttothetermsandconditionsofthese d LicenseExceptions. d<   Note3: CryptographyNote:ECCNs5A002  and5D002donotcontrolitemsthatmeetallof  thefollowing:    a. Generallyavailabletothepublicbybeing vN sold,withoutrestriction,fromstockatretail P ( sellingpointsbymeansofanyofthefollowing: (!      1.Overthecountertransactions; "!     2.Mailordertransactions; ""     3.Electronictransactions;or ##     4.Telephonecalltransactions; $`$   b. Thecryptographicfunctionalitycannotbe `%8% easilychangedbytheuser; :& &   c. Designedforinstallationbytheuser ' ' withoutfurthersubstantialsupportbythe '!( supplier;and (")   d. Whennecessary,detailsoftheitemsare )t#* accessibleandwillbeprovided,uponrequest,to v*N$+ theappropriateauthorityintheexporter'scountry N+&%, inordertoascertaincompliancewithconditions &,%- describedinparagraphs(a)through(c)ofthis (- note. .  D N.B.toCryptographyNote: &%%&Massmarket 0 encryptioncommoditiesandsoftwareeligiblefor  b1 theCryptographyNoteemployingakeylength b :2 greaterthan64bitsforthesymmetricalgorithm : 3 mustbereviewedinaccordancewiththe  4 requirementsof742.15(b)oftheEARinorderto  5 bereleasedfromthe EIand NScontrolsof  6 ECCN5A002or5D002.#&%%& #&%%& r7  D  p          L   A.SYSTEMS,EQUIPMENTAND " : COMPONENTS   ;  #&%%&#%  5A002Informationsecuritysystems, Z> equipmentandcomponentstherefor,asfollows Z2? (seeListofItems_Controlled).%= _ 2 @  LicenseRequirements  B  D ReasonforControl:NS,AT,EI jD  D  p          L  x   Control(s)         L  x CountryChart BF  D NSappliestoentireentry L  x NSColumn1 H ATappliestoentireentry L  x ATColumn1 zJ EIappliesto5A002.a.1,a.2,a.5,a.6f  g Ԁanda.9. R *L Referto742.15oftheEAR. *!M  LicenseExceptions  "O 0 D LVS:  Yes:$500forcomponentsandspare $bQ 0pD(#D(#0p(#p(#partsonly.N/Aforequipment. @! b%:R(#(#  D GBS:0  N/A:& S(#(#  D CIV:0  N/A' T(#(#  D _ENC_:0  YesforcertainEIcontrolled '!U commodities,see740.17oftheEAR ("V foreligibility.)r#W(#(#  _ԀListofItemsControlled  J+"%Y  ",%Z   Unit:$value ( 0  RelatedControls:(1)4/ O  5  5A0026O   7 /Ԁdoesnotcontrol  thecommoditieslistedinparagraphs(a)  through(f)intheNoteintheitemsparagraph  ofthisentry.Thesecommoditiesareinstead  ` classifiedunderECCN40  O  5  5A9926O   7,andrelated ` 8 softwareandtechnologyareclassifiedunder 8  ECCNs41 DO  5  5D9926O   78 Ԁand42 O  5  5E9926WOk   7Ԕ Ԁrespectively.(2)   AfterareviewandclassificationbyBIS,mass   marketencryptioncommoditiesthatmeet    eligibilityrequirementsarereleasedfrom p   EIand NScontrols.Thesecommodities pH  areclassifiedunderECCN4 bO  5  5A992.c6LO`  7 .See H  742.15(b)oftheEAR.   0  RelatedDefinitions:N/A    Items:   _ _  Note: 5A002doesnotcontrolanyofthe X following.However,theseitemsareinstead Z2 controlledunder5A992: 2  0  (a) Personalizedsmartcards:   0  _ (1) _0` Wherethecryptographic  capabilityisrestrictedforusein n equipmentorsystemsexcluded nF fromcontrolparagraphs(b) F through(g)ofthisNote;or` `    0  (2) 04Forgeneralpublicuseapplications  wherethecryptographiccapabilityis  notuseraccessibleanditisspecially  designedandlimitedtoallow X protectionofpersonaldatastored X 0 within.0! 44   0  N.B.: 0` Ifa personalizedsmartcard "" hasmultiplefunctions,the ## controlstatusofeachfunctionis $j$ assessedindividually.j%B%` `  0  (b) 0Receivingequipmentforradiobroadcast, ' ' paytelevisionorsimilarrestricted '!( audiencebroadcastoftheconsumertype, (") withoutdigitalencryptionexceptthat )|#* exclusivelyusedforsendingthebillingor |*T$+ programrelatedinformationbacktothe T+,%, broadcastproviders.,,&- Ї0 D (c) 0pD(#D(#Equipmentwherethecryptographic (- capabilityisnotuseraccessibleand . whichisspeciallydesignedandlimitedto / allowanyofthefollowing:0p(#p(# 0 D 0pD(#D(#0p(#p(#(1) Executionofcopyprotected  b1  software;d <2(#(# 0 D 0pD(#D(#0p(#p(# (2) Accesstoanyofthefollowing:< 3(#(# 0 D 0pD(#D(# 0p(#p(#0(#(#(a)0(#(# Copyprotectedcontents  4 storedonreadonlymedia;  5 or 6(#(# 0 D 0pD(#D(#0p(#p(#0(#(# (b)0(#(# Informationstoredin x7 encryptedformonmedia zR 8 (e.g.,inconnectionwiththe R* 9 protectionofintellectual * : propertyrights)wherethe  ; mediaisofferedforsalein  < identicalsetstothepublic; =(#(# 0 D 0pD(#D(#0p(#p(# (3) Copyingcontrolofcopyright b> protectedaudio/videodata;ord<?(#(#   !"$%(x3& 0 D 0pD(#D(#0p(#p(#(4) Encryptionand/ordecryptionfor <@ protectionoflibraries,design A attributes,orassociateddataforthe B designofsemiconductordevicesor C integratedcircuits;vD(#(# 0 D  D(#D(#  0 D _(d) _0D(#D(#Cryptographicequipmentspecially N&F designedandlimitedforbankinguse (G or'moneytransactions';H(#(#  D  p 0   TechnicalNote: Thetermmoney J transactionsincludesthecollection bK andsettlementoffaresorcredit b :L functions.:!M(#(#  D  p 0   (#(# 0 D  (e) 0D(#D(#Portableormobileradiotelephones "O forciviluse(e.g.,forusewith #P commercialcivilcellularradio $tQ communicationsystems)thatarenot t%LR capableoftransmittingencrypted L&$ S datadirectlytoanother $' T radiotelephoneorequipment(other '!U thanRadioAccessNetwork(RAN) ("V equipment),norofpassingencrypted )#W datathroughRANequipment(e.g., *\$X RadioNetworkController(_RNC_)or \+4%Y BaseStationController(BSC)); 4, &Z(#(# Ї0  0 (f) 04Cordlesstelephoneequipmentnot ( capableofendtoendencryption  wherethemaximumeffectiverange  of_unboosted_Ԁcordlessoperation(e.g.,  asingle,_unrelayed_Ԁhopbetween  b terminalandhome_basestation_)is b : lessthan400metersaccordingtothe :  manufacturer'sspecifications. 44 0         (g) 0 4 Portableormobileradiotelephones    andsimilarclientwirelessdevices t  forciviluse,thatimplementonly tL  publishedorcommercial L$  cryptographicstandards(exceptfor $  anti-piracyfunctions,whichmaybe   non-published)andalsomeetthe   provisionsofparagraphsb.tod.of   theCryptographyNote(Note3in \ Category5-Part2),thathavebeen \4 customizedforaspecificcivil 4  industryapplicationwithfeatures   thatdonotaffectthecryptographic  functionalityoftheseoriginal  non-customizeddevices.l44  TechnicalNote :Paritybitsarenotincludedin D thekeylength.  &%%&#&%%&7#a.Systems,equipment,applicationspecific   electronicassemblies,modulesandintegrated ~ circuitsfor informationsecurity,asfollowsand ~V otherspeciallydesignedcomponentstherefor: V . ̀0   N.B.: 󀀀ForthecontrolofGlobalNavigation "! SatelliteSystems(_GNSS_)receivingequipment "" containingoremployingdecryption(i.e.,_GPS_ ## or_GLONASS_)see7A005.$h$   a.1.Designedormodifiedtouse @& &  cryptographyemployingdigitaltechniques ' ' performinganycryptographicfunctionotherthan '!( authenticationordigitalsignatureandhavingany (") ofthefollowing: )x#*   TechnicalNotes : P+(%,  *,&-  D 1.Authenticationanddigitalsignature (- functionsincludetheirassociatedkey . managementfunction. /  D 2.Authenticationincludesallaspectsof  `1 accesscontrolwherethereisnoencryptionof ` 82 filesortextexceptasdirectlyrelatedtothe 8 3 protectionofpasswords,PersonalIdentification  4 Numbers(_PINs_)orsimilardatatoprevent  5 unauthorizedaccess.  6  D 3. Cryptographydoesnotinclude fixed pH 8 datacompressionorcodingtechniques. H 9  D Note :5A002.a.1includesequipment  ; designedormodifiedtouse cryptography  < employinganalogprincipleswhenimplemented  = withdigitaltechniques. Z>  D  p a.1.a.A symmetricalgorithm 2 @ employingakeylengthinexcessof56bits;or  A  D  p a.1.b.An asymmetricalgorithmwhere C thesecurityofthealgorithmisbasedonanyofthe jD following: jBE  D  p   a.1.b.1.Factorizationofintegersin G excessof512bits(e.g.,_RSA_); H  D  p   a.1.b.2.Computationofdiscrete zJ logarithmsinamultiplicativegroupofafinite zRK fieldofsizegreaterthan512bits(e.g.,_Diffie_Ԅ R *L HellmanoverZ/_pZ_);or *!M  D  p   a.1.b.3.Discretelogarithmsina "O groupotherthanmentionedin5A002.a.1.b.2in #P excessof112bits(e.g.,_Diffie_ԄHellmanoveran $bQ ellipticcurve); b%:R  D a.2.Designedormodifiedtoperform ' T cryptanalyticfunctions; '!U  D a.3.[RESERVED] )r#W  D a.4.Speciallydesignedormodifiedtoreduce J+"%Y thecompromisingemanationsof ",%Z information-bearingsignalsbeyondwhatis ( necessaryforhealth,safetyorelectromagnetic  interferencestandards;    a.5.Designedormodifiedtouse  ` cryptographictechniquestogeneratethe ` 8 spreadingcodefor spreadspectrumsystems,not 8  controlledin5A002.a.6.,includingthehopping   codefor frequencyhoppingsystems;     a.6.Designedormodifiedtouse p  cryptographictechniquestogeneratechannelizing pH  codes,scramblingcodesornetworkidentification H  codes,forsystemsusingultrawideband    modulationtechniquesandhavinganyofthe   following:       a.6.a.Abandwidthexceeding500MHz; X or X0     a.6.b.A fractionalbandwidthof20%  ormore;    a.7.[RESERVED] h   a.8.Communicationscablesystemsdesigned @ ormodifiedusingmechanical,electricalor  electronicmeanstodetectsurreptitiousintrusion;    a.9.Designedormodifiedtousequantum x cryptography. xP    TechnicalNotes:  (!      1.QuantumcryptographyAfamilyof !! techniquesfortheestablishmentofasharedkey "" for cryptographybymeasuringthequantum ## mechanicalpropertiesofaphysicalsystem $^$ (includingthosephysicalpropertiesexplicitly ^%6% governedbyquantumoptics,quantumfield 6& & theory,orquantumelectrodynamics).&%%& ' '     2.Quantumcryptographyisalsoknown (") asQuantumKeyDistribution_(QKD).#&%%&wM#_ )n#* &%%& %  5A992#&%%&N#&}%%&ԀEquipmentnotcontrolledby5A002.#&%%&}3O#&%%& ,%- %N LicenseRequirements  .  D ReasonforControl:AT 0 Control(s)         L  x CountryChart ` 82  D #&%%&O#&}%%&ATappliestoentireentry L 0 x ATColumn1#&%%&}Q#&}%%& 4x(#x(# #&%%&}Q#&%%& #&%%&Q#&%%&LicenseExceptions   6  D LVS:  N/A pH 8  D GBS:  N/A H 9  D CIV:  N/A   :  ListofItemsControlled   <  D Unit:$value X>  D RelatedControls:N/A X0?  D RelatedDefinitions:N/A 0@  D Items: A #&%%&+R#% + a.Telecommunicationsandotherinformation C securityequipmentcontainingencryption. hD % , b. Informationsecurityequipment,n.e.s.,(e.g., @F cryptographic,cryptanalytic,and_cryptologic_ G equipment,n.e.s.)andcomponentstherefor. H &%%&% 3 c.Commoditiesthathavebeenreviewedand xJ determinedtobemassmarketencryption xPK commoditiesinaccordancewith742.15(b)ofthe P (L EAR.#&%%&U#&%%& (!M   B.TEST,INSPECTIONAND "O PRODUCTIONEQUIPMENT  #P .W 5B002InformationSecuritytest,inspection 8& S and productionequipment.  ' T  LicenseRequirements  ("V  D ReasonforControl:NS,AT p*H$X Control(s)         L  x CountryChart  ,%Z ЇNSappliestoentireentry   NSColumn1 ( ATappliestoentireentry   ATColumn1   LicenseExceptions   `   LVS: 4 N/A  8    GBS: 4 N/A      CIV: 4 N/A     ListofItemsControlled  p    Unit:$value H    RelatedControls:N/A      RelatedDefinitions:N/A     Items:   a.  Equipmentspeciallydesignedfor: X   a.1.The developmentofequipmentor 0 functionscontrolledby5A002,5B002,5D002or  5E002,includingmeasuringortestequipment;    a.2.The productionofequipmentor h functionscontrolledby5A002,5B002,5D002,or h@ 5E002,includingmeasuring,test,repairor @ productionequipment;  b.Measuringequipmentspeciallydesignedto  evaluateandvalidatethe informationsecurity x functionscontrolledby5A002or5D002. xP   C.MATERIALS[RESERVED]  "! ^   D.SOFTWARE  $`$ ^ #&%%&V#% : 5D002InformationSecurity Software.  ' '  LicenseRequirements  (")   ReasonforControl:NS,AT,EI p*H$+ Control(s) 4  `      CountryChart  ,%-  D NSappliestoentireentry L  x NSColumn1 . ATappliestoentireentry L  x ATColumn1 0 EIappliesto softwarein5D002.aorc.1for ` 82 equipmentcontrolledforEIreasonsinECCN 8 3 5A002.Referto742.15oftheEAR.  4  D Note: Encryptionsoftwareiscontrolled  6 becauseofitsfunctionalcapacity,andnot r7 becauseofanyinformationalvalueofsuch rJ 8 software;suchsoftwareisnotaccordedthesame J" 9 treatmentundertheEARasother software; " : andforexportlicensingpurposes,encryption  ; softwareistreatedundertheEARinthesame  < mannerasacommodityincludedinECCN5A002.  =  D Note: Encryptionsoftwarecontrolledfor Z2?  EIreasonsunderthisentryremainssubjectto 4 @ theEARevenwhenmadepubliclyavailablein  A accordancewithpart734oftheEAR.See B 740.13(e)oftheEARforinformationon C releasingcertainsourcecode(andcorresponding lD objectcode)whichwouldbeconsideredpublicly lDE availablefrom EIcontrols. DF  LicenseExceptions  |J  D CIV:0  N/A  T ,L(#(#  D TSR:0  N/A,!M(#(#  D _ENC_:0  YesforcertainEIcontrolled "N software,see740.17oftheEARfor "O eligibility.#P(#(#  ListofItemsControlled  d%<R  D Unit:$value ' T 0 D RelatedControls:&}%%&Ԁ1)Thisentrydoesnot '!U control software requiredforthe useof ("V equipmentexcludedfromcontrolunderthe )t#W RelatedControlsparagraphortheTechnical t*L$X NotesinECCN4#CO  5  5A0026iOi   77jԀor software L+$%Y providinganyofthefunctionsofequipment $,%ZD(#D(# _excludedfromcontrolunderECCN4( !O  5  5A0026kO'k   7#Uk. ( ThissoftwareisclassifiedasECCN44 !O  5  5D9926kO l   7"9l.#&%%&}h#Ԁ  2)AfterareviewandclassificationbyBIS,  massmarketencryptionsoftwarethatmeet  eligibilityrequirementsarereleasedfrom  `  EIand NScontrols.Thissoftwareis ` 8 classifiedunderECCN45NO  5  5D992.c6mO n   7 ;n.See 8  742.15(b)oftheEAR.  0  RelatedDefinitions:&}%%&Ԁ5D002.acontrols    softwaredesignedormodifiedtouse     cryptographyemployingdigitaloranalog p  techniquestoensure informationsecurity. pH  #&%%&}o#Items:H  &}%%&a. Softwarespeciallydesignedormodifiedfor   the development, productionor useof   equipmentor softwarecontrolledby5A002,   5B002or5D002. X b. Softwarespeciallydesignedormodifiedto 0 support technologycontrolledby5E002.  c.  Specific softwareasfollows: <  h     c.1. Softwarehavingthecharacteristics,or h@ performingorsimulatingthefunctionsofthe @ equipmentcontrolledby5A002or5B002;    c.2. Softwaretocertify software  controlledby5D002.c.1. x #&%%&}p#&%%& % - 5D992#&%%&t#&}%%& InformationSecurity softwarenot (!  controlledby5D002.  "! %-7t#&%%&}mt#&%%& LicenseRequirements  ##   ReasonforControl:AT `%8% Control(s) 4  `      CountryChart ' ' #&%%&2u#&}%%&#&%%&}ev#&}%%&ATappliestoentireentry#&%%&}v#&}%%& 0  ATColumn1#&%%&} w#&%%&(") #&%%&nw#&%%& LicenseExceptions  p*H$+   CIV: 4 N/A   ,%-  D TSR:  N/A (-  ListofItemsControlled  /  D Unit:$value  `1 0 D RelatedControls:Thisentrydoesnotcontrol ` 82  softwaredesignedormodifiedtoprotect 8 3 againstmaliciouscomputerdamage,e.g.,  4 viruses,wheretheuseof cryptographyis  5 limitedtoauthentication,digitalsignature  6 and/orthedecryptionofdataorfiles.#&%%&w#&%%&p7D(#D(#  D RelatedDefinitions:N/A pH 8  D Items: H 9 #&%%&z#&}%%&a. Softwarespeciallydesignedormodifiedfor  ; the development, production,or useof  < equipmentcontrolledbyECCN4.4O  5  5A992.a6Z|On|   7|Ԁor  = 46O  5  5A992.b6}O2}   7.`}. X> b. Softwarehavingthecharacteristics,or 0@ performingorsimulatingthefunctionsofthe A equipmentcontrolledbyECCN47O  5  5A992.a6~O~   7"~Ԁor B 48O  5  5A992.b6LO`   7. C #&%%&}{#&%%&c.#&%%&1#&%%& Softwarethathasbeenreviewedand h@E determinedtobemassmarketencryptionsoftware @F inaccordancewith742.15(b)oftheEAR.#&%%&x#&}%%& G #&%%&}k#&%%&  E.TECHNOLOGY  xJ  5E002 TechnologyaccordingtotheGeneral (!M TechnologyNoteforthe development, "N  productionor useofequipmentcontrolled "O by5A002or5B002or softwarecontrolledby #P 5D002.  $`Q  LicenseRequirements  8& S  D ReasonforControl:NS,AT,EI '!U Control(s)         L  x CountryChart )p#W NSappliestoentireentry L  x NSColumn1 H+ %Y   ,%Z ATappliestoentireentry   ATColumn1 ( EIappliesto technologyforthe   development, production,or useof  commoditiesor softwarecontrolledforEI  ` reasonsinECCNs49O  5  5A0026O   7IԀor4;O  5  5D0026OɆ   7.Referto ` 8 742.15oftheEAR. 8       4  ` LicenseRequirementNote: Whenaperson   performsorprovidestechnicalassistancethat    incorporates,orotherwisedrawsupon, t   technologythatwaseitherobtainedinthe tL  UnitedStatesorisofUS-origin,thenareleaseof L$  the technologytakesplace.Suchtechnical $  assistance,whenrenderedwiththeintenttoaidin   the developmentor productionofencryption   commoditiesorsoftwarethatwouldbecontrolled   for EIreasonsunderECCN4<O  5  5A0026wO   7Ԁor4=!O  5  5D0026%O9   7"g, \ mayrequireauthorizationundertheEARevenif \4 theunderlyingencryptionalgorithmtobe 4  implementedisfromthepublicdomainorisnot   ofU.S.origin.#&%%&ā#&%%&   LicenseExceptions  l   CIV: 4 N/A D   TSR: 4 N/A   ListofItemsControlled     Unit:N/A |T #&%%&݌#&%%&0  RelatedControls:Seealso#&%%&0#&%%&4> O  5  5E9926ÎO׎eEA  7rs.#&%%&#&}%%&ԀThisentry T , doesnotcontrol technology requiredfor ,!  the useofequipmentexcludedfromcontrol "! undertheRelatedControlsparagraphorthe "" TechnicalNotesinECCN4?rO  5  5A0026OѐeEA  7r{Ԁor ##  technologyrelatedtoequipmentexcluded $d$ fromcontrolunderECCN4@rO  5  5A0026ܑOeEA  7rv.This d%<%  technologyisclassifiedasECCN4ArPO  5  5E9926˒OߒeEA  7r0 .#&%%&}#&%%&<& &   RelatedDefinitions:N/A ' '   Items: '!( Thelistofitemscontrollediscontainedinthe )t#* ECCNheading. t*L$+  L+$%, Ї #&%%&#&}%%&% ) 5E992 InformationSecurity technology, (, notcontrolledby5E002.#&%%&}#&%%&  - %) LicenseRequirements  /  D ReasonforControl:AT ` 81 Control(s)         L  x CountryChart  3 #&%%&#&}%%&ATappliestoentireentry x 0  ATColumn p6 1#&%%&}#&}%%&pH 7(#(# #&%%&}#&%%& LicenseExceptions    9  D CIV:  N/A    ;  D TSR:  N/A  <  ListofItemsControlled  X0>  D Unit:N/A @  D RelatedControls:N/A A  D RelatedDefinitions:N/A B  D Items: hC #&%%&#&}%%&a. Technologyn.e.s.,forthe development, @E  productionor useof#&%%&}#&}%%&equipmentcontrolledby F 4BrO  5  5A992.a6OeEA  7r,, informationsecurity#&%%&}#&}%%&orcryptologic G equipmentcontrolledby4CruO  5  5A992.b61OEeEA  7rsԀor software H controlledby4DrO  5  5D992.aorb6O(eEA  7rV. xI b. Technology,n.e.s.,forthe useofmass P (K marketcommoditiescontrolledby4ErO  5  5A992.c6MOaeEA  7r4"Ԁor (!L massmarket softwarecontrolledby4Fr, O  5  5D992.c6<OPeEA  7r"~.#&%%&}כ#&%%& "M  EAR99ItemssubjecttotheEARthatarenot $`P elsewherespecifiedinthisCCLCategoryorin `%8Q anyothercategoryintheCCLaredesignated 8& R bythenumberEAR99. #&%%& #&%%& ' S  #&%%&P#