2. The information security items specified in this Schedule are the following software and technology—U.K.
(a)cryptography development software specified in entry 5D002 of Annex I to the dual-use Regulation, other than software having the characteristics, or performing or simulating the functions, of equipment designed or modified to perform cryptanalytic functions;
(b)cryptography development technology specified in entry 5E002 of Annex I to the dual-use Regulation, other than technology for the development, production or use of—
(i)equipment designed or modified to perform cryptanalytic functions; or
(ii)software having the characteristics, or performing or simulating the functions, of equipment designed or modified to perform cryptanalytic functions
but only to the extent that such software or technology is for an intra-group or collaborative end-use.