Crypto Law Survey (original) (raw)
Bert-Jaap Koops homepage
NOTE: The Crypto Law Survey has moved.
Please update your links to the new URL: http://www.cryptolaw.org
Version 27.0, February 2013
� Bert-Jaap Koops
All rights reserved. Please credit if quoting.
Next update February 2014.
- Address list for crypto export licenses
- Mailing list announcing updates
- Maps summarizing the import, export, and domestic crypto controls around the world. Test your geographic knowledge! Also see Simon Hunt's Google map of International Crypto and Encryption Law.
- For background information, see my Ph.D. thesis, The Crypto Controversy. A Key Conflict in the Information Society (Kluwer Law International, 1999). How can and should governments address the law-enforcement problems of cryptography?
FAQ | What's new | Sources | Table of Contents
This is a survey of existing and proposed laws and regulations on cryptography - systems used for protecting information against unauthorized access. Governments have long restricted export of cryptography for fear that their intelligence activities are hampered by the crypto use of foreign states and scoundrels. Since the rise of crypto use over the past decades, governments increasingly worry about criminals using cryptography to thwart law enforcement. Thus, many countries have passed laws or are considering laws to maintain law-enforcement and national-security capabilities through regulation of cryptography.
This survey gives an overview of the current state of affairs, with entries per country on import/export controls, domestic laws, developments to restrict cryptography, and developments favoring crypto use. For morebackground on the crypto policy dilemma, see my Ph.D. thesis The Crypto Controversy. A Key Conflict in the Information Society (Kluwer Law International, 1999).
Cryptography used for digital signatures is not covered by this survey. For regulation of digital signatures, seeDigital Signatures and Law.
See also (but largely outdated): Stewart Baker & Paul Hurst, The Limits of Trust from August 1998 and the extensive survey by EPIC and GILC,Cryptography and Liberty 2000 (earlier version: 1998). And see generally on export controls Simo-Pekka Parviainen's thesis (particularly on the EU).
Disclaimer
This survey of cryptography laws is based on several reports, information from the Internet and personal communications. I have not consulted all original texts of relevant regulations; in many cases, I have relied on the sources listed. These findings, therefore, do not pretend to be exhaustive or legally reliable.
Comments and questions
I thank all who have provided me with information for this survey. Please send comments, corrections, updates, and additional information to E.J.Koops@uvt.nl to help me keep this survey updated. If you have questions, feel free to ask, but please check the FAQ first.
Table of Contents
(* indicates that the item has been updated since July 2010)
Quick index
International - A - B- C - D - E - F - G - H - I - J - K - L - M - N - P - R - S - T - U - V
International
- graphic summary of import, export, and domestic controls
- Wassenaar Arrangement / COCOM
- Council of Europe
- European Union
- OECD
- Business Government Forum
Countries
- Antigua and Barbuda
- Argentina
- Australia (*)
- Austria
- Bahrain
- Bangladesh
- Belarus
- Belgium (*)
- Brazil
- Bulgaria
- Burma
- Cambodia
- Canada (*)
- Chile
- People's Republic of China (*)
- Colombia
- Costa Rica
- Czech republic
- Denmark
- Egypt
- Estonia
- Finland
- France (*)
- Germany
- Ghana
- Great Britain, see United Kingdom
- Greece
- Hong Kong, see at People's Republic of China
- Hungary
- Iceland
- India
- Indonesia
- Iran
- Ireland (*)
- Israel
- Italy
- Japan
- Kazakhstan
- Kenya
- Kyrgyzstan
- Latvia
- Lithuania
- Luxembourg
- Malaysia
- Mauritius
- Mexico
- Moldova (*)
- Morocco
- Myanmar, see Burma
- The Netherlands
- Import/ export controls
- Domestic laws and regulations
* Decryption command (law enforcement)
* Decryption command (telecom providers)
* Decryption command and powers (security services) - Developments to restrict cryptography
* 1994 pre-draft law
* Extension of decryption command (law enforcement) (*)
* Trusted Third Party policy
- New Zealand
- North Korea
- Norway
- Pakistan
- Peru
- Philippines
- Poland
- Portugal
- Puerto Rico
- Romania
- Russia
- Rwanda
- Saudi Arabia
- Singapore (*)
- Slovakia
- Slovenia
- South Africa
- South Korea
- Spain
- Sweden
- Switzerland
- Syria
- Thailand
- Tonga
- Trinidad & Tobago
- Tunisia
- Turkey
- Ukraine
- United Kingdom
- Import/ export controls
- Domestic laws and regulations
* Regulations of Investigatory Powers Act 2000
* case-law (*)
* Electronic Communications Act 2000
* 1999 Electronic Communications Bill
* 2000 Regulations of Investigatory Powers Bill - Developments to restrict cryptography
* DTI 1996 paper on regulatory intent
* Red Pike
* Labour policy
* 1997-1998 DTI consultation process
* 1998 Policy announcement
* 1999 DTI consultation document
- United States of America
- Import/ Export controls
* Export Administration Regulations
* 1997 Draft Encryption Items Rule
* BXA seeking comments
* July and December 1998 relaxations
* January 2000 relaxation
* October 2000 relaxation
* June 2002 relaxation
* December 2004 relaxation
* January 2011 relaxation (*)
* Personal use exemption
* Export Administration Act
* Export case law
* Export Council Subcommittee on Encryption
* Former International Traffic in Arms Regulations
* 1995 statement on export with key escrow
* Initiatives to revise export controls
* Karn, Bernstein, and Junger cases
* Congress bills
* 1996-1998 ECPA, SAFE, and Pro-CODE Acts
* 1997-1998 Secure Public Networks Act
* 1997-1998 Computer Security Enhancement Act
* 1998 E-PRIVACY Act
* 1999 SAFE and PROTECT Acts
* 1999 EAA bill and National Interests Act
* California resolution
* Department of Commerce study
* National Research Council study - Laws restricting cryptography
* Digital Millennium Copyright Act
* Case law (*) - Developments to restrict cryptography
* Escrowed Encryption Standard (Clipper I/ II)
* Key Management Infrastructure
* Broad Encryption Policy
* Crypto Ambassador
* Reporting on criminal crypto use
* National Research Council study
* 1997 Draft Key Recovery Legislation
* 1999 Draft Cyberspace Electronic Security Act
* Advanced Encryption Standard
* 2003 Draft Domestic Security Enhancement Act (Patriot II)
* Congress Bills
* 1997-1998 Secure Public Networks Act
* 1996-1998 ECPA and SAFE Acts
* 1998 E-PRIVACY Act
* 1999 SAFE and PROTECT Acts
* 1999 Tax Relief and National Interests Acts
- Import/ Export controls
- Uruguay
- Venezuela
- Vietnam
This page has been accessed....times since 9 May 1996. Counted by Web-Counter.
� Bert-Jaap Koops, 1995-2013. All rights reserved.
Updated on 25 February 2013.
general: homepage Bert-Jaap Koops | mail
this topic: maps |FAQ | new | sources | addresses