EXPORT CONTROL POLICY
Updated policy and procedures on tangible exports and acceptance of 3rd party proprietary or restricted information
To assist in determining the applicability of export controls
If you have questions about the applicability of export control regulations
to a particular situation, or about any of the information presented on this
Export Control Officer
ITAR encryption controls are located in three primary Categories on the US Munitions List (USML).
Subparagraph (b) - Encryption software designed or modified to:
Subparagraph (b) - Encryption software designed or modified for:
Subparagraph (b) - Encryption software designed or modified for
Subparagraph (c) - Global Positioning System (GPS) receiving equipment:
NOTE: The citations provided above are intended as general summaries and are not authoritative. Researchers are responsible for consulting the USML for encryption software specifically designed or developed for a military, intelligence or space application.
Stanford researchers generating ITAR-related encryption software must upload the code onto a publicly available website immediately to demonstrate that the software has been published.
The Stanford-developed encryption software must be freely downloadable by all interested members of the scientific community at no charge and without Stanford's knowledge by whom or from where the data is being downloaded. This means no login requirement or other password or other authentication procedures. The government could view a login or other authentification requirement as an access control, and such a requirement could destroy the university's ability to characterize the generated software as unrestricted fundamental research excluded from export controls.