- Latest available (Revised)
- Original (As adopted by EU)
Council Regulation (EC) No 428/2009 of 5 May 2009 setting up a Community regime for the control of exports, transfer, brokering and transit of dual-use items (Recast)
After exit day there will be three versions of this legislation to consult for different purposes. The legislation.gov.uk version is the version that applies in the UK. The EU Version currently on EUR-lex is the version that currently applies in the EU i.e you may need this if you operate a business in the EU.
The web archive version is the official version of this legislation item as it stood on exit day before being published to legislation.gov.uk and any subsequent UK changes and effects applied. The web archive also captured associated case law and other language formats from EUR-Lex.
There are currently no known outstanding effects for the Council Regulation (EC) No 428/2009, CATEGORY 5 – TELECOMMUNICATIONS AND "INFORMATION SECURITY".
Revised legislation carried on this site may not be fully up to date. At the current time any known changes or effects made by subsequent legislation have been applied to the text of the legislation you are viewing by the editorial team. Please see ‘Frequently Asked Questions’ for details regarding the timescales for which new effects are identified and recorded on this site.
[5A001] Telecommunications systems, equipment, components and accessories as follows:
Any type of telecommunications equipment having any of the following characteristics, functions or features:
Specially designed to withstand transitory electronic effects or electromagnetic pulse effects, both arising from a nuclear explosion;
Specially hardened to withstand gamma, neutron or ion radiation;
Specially designed to operate below 218 K (– 55 °C); or
Telecommunication systems and equipment, and specially designed components and accessories therefor, having any of the following characteristics, functions or features:
Being underwater untethered communications systems having any of the following:
An acoustic carrier frequency outside the range from 20 kHz to 60 kHz;
Using an electromagnetic carrier frequency below 30 kHz;
Using electronic beam steering techniques; or
Using "lasers" or light-emitting diodes (LEDs) with an output wavelength greater than 400 nm and less than 700 nm, in a "local area network";
Being radio equipment operating in the 1,5 MHz to 87,5 MHz band and having all of the following:
Automatically predicting and selecting frequencies and "total digital transfer rates" per channel to optimise the transmission; and
Incorporating a linear power amplifier configuration having a capability to support multiple signals simultaneously at an output power of 1 kW or more in the frequency range of 1,5 MHz or more but less than 30 MHz, or 250 W or more in the frequency range of 30 MHz or more but not exceeding 87,5 MHz, over an "instantaneous bandwidth" of one octave or more and with an output harmonic and distortion content of better than –80 dB;
Being radio equipment employing "spread spectrum" techniques, including "frequency hopping" techniques, other than those specified in 5A001.b.4. and having any of the following:
User programmable spreading codes; or
A total transmitted bandwidth which is 100 or more times the bandwidth of any one information channel and in excess of 50 kHz;
Civil cellular radio-communications systems; or
Fixed or mobile satellite earth stations for commercial civil telecommunications.
Being radio equipment employing ultra-wideband modulation techniques, having user programmable channelising codes, scrambling codes or network identification codes and having any of the following:
A bandwidth exceeding 500 MHz; or
A "fractional bandwidth" of 20 % or more;
Being digitally controlled radio receivers having all of the following:
More than 1 000 channels;
A ‘channel switching time’ of less than 1 ms;
Automatic searching or scanning of a part of the electromagnetic spectrum; and
Identification of the received signals or the type of transmitter; or
‘Channel switching time’ means the time (i.e., delay) to change from one receiving frequency to another, to arrive at or within ± 0,05 % of the final specified receiving frequency. Items having a specified frequency range of less than ± 0,05 % around their centre frequency are defined to be incapable of channel frequency switching.
Employing functions of digital "signal processing" to provide ‘voice coding’ output at rates of less than 700 bit/s.
Optical fibres of more than 500 m in length and specified by the manufacturer as being capable of withstanding a ‘proof test’ tensile stress of 2 × 109 N/m2 or more;
‘Proof Test’: on-line or off-line production screen testing that dynamically applies a prescribed tensile stress over a 0,5 to 3 m length of fibre at a running rate of 2 to 5 m/s while passing between capstans approximately 150 mm in diameter. The ambient temperature is a nominal 293 K (20°C) and relative humidity 40 %. Equivalent national standards may be used for executing the proof test.
‘Electronically steerable phased array antennae’ as follows:
Rated for operation above 31,8 GHz, but not exceeding 57 GHz, and having an Effective Radiated Power (ERP) equal to or greater than +20 dBm (22,15 dBm Effective Isotropic Radiated Power (EIRP));
Rated for operation above 57 GHz, but not exceeding 66 GHz, and having an ERP equal to or greater than +24 dBm (26,15 dBm EIRP);
Rated for operation above 66 GHz, but not exceeding 90 GHz, and having an ERP equal to or greater than +20 dBm (22,15 dBm EIRP);
Rated for operation above 90 GHz;
Civil cellular or WLAN radio-communications systems;
IEEE 802.15 or wireless HDMI; or
Fixed or mobile satellite earth stations for commercial civil telecommunications.
For the purposes of 5A001.d. ‘electronically steerable phased array antenna’ is an antenna which forms a beam by means of phase coupling, (i.e., the beam direction is controlled by the complex excitation coefficients of the radiating elements) and the direction of that beam can be varied (both in transmission and reception) in azimuth or in elevation, or both, by application of an electrical signal.
Radio direction finding equipment operating at frequencies above 30 MHz and having all of the following, and specially designed components therefor:
"Instantaneous bandwidth" of 10 MHz or more; and
Capable of finding a Line Of Bearing (LOB) to non-cooperating radio transmitters with a signal duration of less than 1 ms;
Mobile telecommunications interception or jamming equipment, and monitoring equipment therefor, as follows, and specially designed components therefor:
Interception equipment designed for the extraction of voice or data, transmitted over the air interface;
Interception equipment not specified in 5A001.f.1., designed for the extraction of client device or subscriber identifiers (e.g., IMSI, TIMSI or IMEI), signalling, or other metadata transmitted over the air interface;
Jamming equipment specially designed or modified to intentionally and selectively interfere with, deny, inhibit, degrade or seduce mobile telecommunication services and performing any of the following:
Simulate the functions of Radio Access Network (RAN) equipment;
Detect and exploit specific characteristics of the mobile telecommunications protocol employed (e.g., GSM); or
Exploit specific characteristics of the mobile telecommunications protocol employed (e.g. GSM);
RF monitoring equipment designed or modified to identify the operation of items specified in 5A001.f.1., 5A001.f.2. or 5A001.f.3.;
Equipment specially designed for the interception of analogue Private Mobile Radio (PMR), IEEE 802.11 WLAN;
Equipment designed for mobile telecommunications network operators; or
Equipment designed for the "development" or "production" of mobile telecommunications equipment or systems.
Passive Coherent Location (PCL) systems or equipment, specially designed for detecting and tracking moving objects by measuring reflections of ambient radio frequency emissions, supplied by non-radar transmitters;
Non-radar transmitters may include commercial radio, television or cellular telecommunications base stations.
Radio-astronomical equipment; or
Systems or equipment, that require any radio transmission from the target.
Counter Improvised Explosive Device (IED) equipment and related equipment, as follows:
Radio Frequency (RF) transmitting equipment, not specified in 5A001.f., designed or modified for prematurely activating or preventing the initiation of Improvised Explosive Devices (IEDs);
Equipment using techniques designed to enable radio communications in the same frequency channels on which co-located equipment specified in 5A001.h.1. is transmitting;
Not used;
Internet Protocol (IP) network communications surveillance systems or equipment, and specially designed components therefor, having all of the following:
Performing all of the following on a carrier class internet Protocol (IP) network (e.g., national grade IP backbone):
Analysis at the application layer (e.g., Layer 7 of Open Systems Interconnection (OSI) model (ISO/IEC 7498-1));
Extraction of selected metadata and application content (e.g., voice, video, messages, attachments); and
Indexing of extracted data; and
Being specially designed to carry out all of the following:
Execution of searches on the basis of "hard selectors"; and
Mapping of the relational network of an individual or of a group of people.
Marketing purpose;
Network Quality of Service (QoS); or
Quality of Experience (QoE).
[5A101] Telemetry and telecontrol equipment, including ground equipment, designed or modified for ‘missiles’.
In 5A101 ‘missile’ means complete rocket systems and unmanned aerial vehicle systems capable of a range exceeding 300 km.
Equipment designed or modified for manned aircraft or satellites;
Ground based equipment designed or modified for terrestrial or marine applications;
Equipment designed for commercial, civil or ‘Safety of Life’ (e.g., data integrity, flight safety) GNSS services;
[5B001] Telecommunications test, inspection and production equipment, components and accessories, as follows:
Equipment and specially designed components or accessories therefor, specially designed for the "development" or "production" of equipment, functions or features, specified in 5A001;
Equipment and specially designed components or accessories therefor, specially designed for the "development" of any of the following telecommunication transmission or switching equipment:
Not used;
Equipment employing a "laser" and having any of the following:
Not used;
Radio equipment employing Quadrature-Amplitude-Modulation (QAM) techniques above level 1 024;
Not used.
None
[5D001] "Software" as follows:
"Software" specially designed or modified for the "development", "production" or "use" of equipment, functions or features, specified in 5A001;
Not used;
Specific "software" specially designed or modified to provide characteristics, functions or features of equipment, specified in 5A001 or 5B001;
"Software" specially designed or modified for the "development" of any of the following telecommunication transmission or switching equipment:
Not used;
Equipment employing a "laser" and having any of the following:
Not used;
Radio equipment employing Quadrature-Amplitude-Modulation (QAM) techniques above level 1 024.
"Software", other than that specified in 5D001.a. or 5D001.c., specially designed or modified for monitoring or analysis by law enforcement, providing all of the following:
Execution of searches on the basis of "hard selectors" of either the content of communication or metadata acquired from a communications service provider using a ‘handover interface’; and
Mapping of the relational network or tracking the movement of targeted individuals based on the results of searches on content of communication or metadata or searches as described in 5D001.e.1.
For the purposes of 5D001.e., a ‘handover interface’ is a physical and logical interface, designed for use by an authorised law enforcement authority, across which targeted interception measures are requested from a communications service provider and the results of interception are delivered from a communications service provider to the requesting authority. The ‘handover interface’ is implemented within systems or equipment (e.g., mediation devices) that receive and validate the interception request, and deliver to the requesting authority only the results of interception that fulfil the validated request.
‘Handover interfaces’ may be specified by international standards (including but not limited to ETSI TS 101 331, ETSI TS 101 671, 3GPP TS 33.108) or national equivalents.
Billing purposes;
Network Quality of Service (QoS);
Quality of Experience (QoE);
Mediation devices; or
Mobile payment or banking use.
[5D101] "Software" specially designed or modified for the "use" of equipment specified in 5A101.
[5E001] "Technology" as follows:
"Technology" according to the General Technology Note for the "development", "production" or "use" (excluding operation) of equipment, functions or features specified in 5A001 or "software" specified in 5D001.a. or 5D001.e.;
Specific "technology" as follows:
"Technology""required" for the "development" or "production" of telecommunications equipment specially designed to be used on board satellites;
"Technology" for the "development" or "use" of "laser" communication techniques with the capability of automatically acquiring and tracking signals and maintaining communications through exoatmosphere or sub-surface (water) media;
"Technology" for the "development" of digital cellular radio base station receiving equipment whose reception capabilities that allow multi-band, multi-channel, multi-mode, multi-coding algorithm or multi-protocol operation can be modified by changes in "software";
"Technology" for the "development" of "spread spectrum" techniques, including "frequency hopping" techniques;
Civil cellular radio-communications systems; or
Fixed or mobile satellite earth stations for commercial civil telecommunications.
"Technology" according to the General Technology Note for the "development" or "production" of any of the following:
Not used;
Equipment employing a "laser" and having any of the following:
A transmission wavelength exceeding 1 750 nm; or
Not used;
Not used;
Employing wavelength division multiplexing techniques of optical carriers at less than 100 GHz spacing; or
Equipment employing "optical switching" and having a switching time less than 1 ms;
Radio equipment having any of the following:
Quadrature-Amplitude-Modulation (QAM) techniques above level 1 024;
Operating at input or output frequencies exceeding 31,8 GHz; or
Operating in the 1,5 MHz to 87,5 MHz band and incorporating adaptive techniques providing more than 15 dB suppression of an interfering signal; or
Not used;
Mobile equipment having all of the following:
Operating at an optical wavelength greater than or equal to 200 nm and less than or equal to 400 nm; and
Operating as a "local area network";
"Technology" according to the General Technology Note for the "development" or "production" of "Monolithic Microwave Integrated Circuit" ("MMIC") amplifiers specially designed for telecommunications and that are any of the following:
For purposes of 5E001.d., the parameter peak saturated power output may also be referred to on product data sheets as output power, saturated power output, maximum power output, peak power output, or peak envelope power output.
Rated for operation at frequencies exceeding 2,7 GHz up to and including 6,8 GHz with a "fractional bandwidth" greater than 15 %, and having any of the following:
A peak saturated power output greater than 75 W (48,75 dBm) at any frequency exceeding 2,7 GHz up to and including 2,9 GHz;
A peak saturated power output greater than 55 W (47,4 dBm) at any frequency exceeding 2,9 GHz up to and including 3,2 GHz;
A peak saturated power output greater than 40 W (46 dBm) at any frequency exceeding 3,2 GHz up to and including 3,7 GHz; or
A peak saturated power output greater than 20 W (43 dBm) at any frequency exceeding 3,7 GHz up to and including 6,8 GHz;
Rated for operation at frequencies exceeding 6,8 GHz up to and including 16 GHz with a "fractional bandwidth" greater than 10 %, and having any of the following:
A peak saturated power output greater than 10W (40 dBm) at any frequency exceeding 6,8 GHz up to and including 8,5 GHz; or
A peak saturated power output greater than 5W (37 dBm) at any frequency exceeding 8,5 GHz up to and including 16 GHz;
Rated for operation with a peak saturated power output greater than 3 W (34,77 dBm) at any frequency exceeding 16 GHz up to and including 31,8 GHz, and with a "fractional bandwidth" of greater than 10 %;
Rated for operation with a peak saturated power output greater than 0,1 nW (– 70 dBm) at any frequency exceeding 31,8 GHz up to and including 37 GHz;
Rated for operation with a peak saturated power output greater than 1 W (30 dBm) at any frequency exceeding 37 GHz up to and including 43,5 GHz, and with a "fractional bandwidth" of greater than 10 %;
Rated for operation with a peak saturated power output greater than 31,62 mW (15 dBm) at any frequency exceeding 43,5 GHz up to and including 75 GHz, and with a "fractional bandwidth" of greater than 10 %;
Rated for operation with a peak saturated power output greater than 10 mW (10 dBm) at any frequency exceeding 75 GHz up to and including 90 GHz, and with a "fractional bandwidth" of greater than 5 %; or
Rated for operation with a peak saturated power output greater than 0,1 nW (– 70 dBm) at any frequency exceeding 90 GHz;
"Technology" according to the General Technology Note for the "development" or "production" of electronic devices and circuits, specially designed for telecommunications and containing components manufactured from "superconductive" materials, specially designed for operation at temperatures below the "critical temperature" of at least one of the "superconductive" constituents and having any of the following:
Current switching for digital circuits using "superconductive" gates with a product of delay time per gate (in seconds) and power dissipation per gate (in watts) of less than 10–14 J; or
Frequency selection at all frequencies using resonant circuits with Q-values exceeding 10 000.
[5E101] "Technology" according to the General Technology Note for the "development", "production" or "use" of equipment specified in 5A101.
5A002, 5D002.a.1., 5D002.b. and 5D002.c.1. do not control items as follows:
Items that meet all of the following:
Generally available to the public by being sold, without restriction, from stock at retail selling points by means of any of the following:
Over-the-counter transactions;
Mail order transactions;
Electronic transactions; or
Telephone call transactions;
The cryptographic functionality cannot easily be changed by the user;
Designed for installation by the user without further substantial support by the supplier; and
When necessary, details of the goods are accessible and will be provided, upon request, to the [F2Secretary of State] in order to ascertain compliance with conditions described in paragraphs 1. to 3. above;
Hardware components or ‘executable software’, of existing items described in paragraph a. of this Note, that have been designed for these existing items, meeting all of the following:
"Information security" is not the primary function or set of functions of the component or ‘executable software’;
The component or ‘executable software’ does not change any cryptographic functionality of the existing items, or add new cryptographic functionality to the existing items;
The feature set of the component or ‘executable software’ is fixed and is not designed or modified to customer specification; and
For the purpose of the Cryptography Note, ‘executable software’ means "software" in executable form, from an existing hardware component excluded from 5A002 by the Cryptography Note.
Textual Amendments
F2Words in Annex 1 substituted (31.12.2020) by virtue of The Trade etc. in Dual-Use Items and Firearms etc. (Amendment) (EU Exit) Regulations 2019 (S.I. 2019/771), regs. 1, 3(22)(f) (with reg. 5) (as amended by S.I. 2020/1502, regs. 2(3), 10); 2020 c. 1, Sch. 5 para. 1(1)
The item is of potential interest to a wide range of individuals and businesses; and
The price and information about the main functionality of the item are available before purchase without the need to consult the vendor or supplier. A simple price enquiry is not considered to be a consultation.
[5A002] "Information security" systems, equipment and components, as follows:
Designed or modified to use ‘cryptography for data confidentiality’ having a ‘described security algorithm’, where that cryptographic capability is usable, has been activated, or can be activated by any means other than secure "cryptographic activation", as follows:
Items having "information security" as a primary function;
Digital communication or networking systems, equipment or components, not specified in 5A002.a.1.;
Computers, other items having information storage or processing as a primary function, and components therefor, not specified in 5A002.a.1. or 5A002.a.2.;
Items, not specified in 5A002.a.1. to 5A002.a.3., where the ‘cryptography for data confidentiality’ having a ‘described security algorithm’ meets all of the following:
It supports a non-primary function of the item; and
It is performed by incorporated equipment or "software" that would, as a standalone item, be specified in Category 5 – Part 2.
"Authentication";
Digital signature;
Data integrity;
Non-repudiation;
Digital rights management, including the execution of copy-protected "software";
Encryption or decryption in support of entertainment, mass commercial broadcasts or medical records management; or
Key management in support of any function described in paragraph a. to f. above.
A "symmetric algorithm" employing a key length in excess of 56 bits, not including parity bits;
An "asymmetric algorithm" where the security of the algorithm is based on any of the following:
Factorisation of integers in excess of 512 bits (e.g., RSA);
Computation of discrete logarithms in a multiplicative group of a finite field of size greater than 512 bits (e.g., Diffie-Hellman over Z/pZ); or
Discrete logarithms in a group other than mentioned in paragraph b.2. in excess of 112 bits (e.g., Diffie-Hellman over an elliptic curve); or
An "asymmetric algorithm" where the security of the algorithm is based on any of the following:
Shortest vector or closest vector problems associated with lattices (e.g., NewHope, Frodo, NTRUEncrypt, Kyber, Titanium);
Finding isogenies between Supersingular elliptic curves (e.g., Supersingular Isogeny Key Encapsulation); or
Decoding random codes (e.g., McEliece, Niederreiter).
An algorithm described by Technical Note 2.c. may be referred to as being post-quantum, quantum-safe or quantum-resistant.
Whether the item meets the criteria of 5A002.a.1. to 5A002.a.4.; or
Whether the cryptographic capability for data confidentiality specified in 5A002.a. is usable without "cryptographic activation".
Smart cards and smart card ‘readers/writers’ as follows:
A smart card or an electronically readable personal document (e.g., token coin, e-passport) that meets any of the following:
The cryptographic capability meets all of the following:
It is restricted for use in any of the following:
Equipment or systems not described by 5A002.a.1. to 5A002.a.4.;
Equipment or systems not using ‘cryptography for data confidentiality’ having a ‘described security algorithm’; or
Equipment or systems, excluded from 5A002.a., by paragraphs b. to f. of this Note; and
It cannot be reprogrammed for any other use; or:
Having all of the following:
It is specially designed and limited to allow protection of ‘personal data’ stored within;
Has been, or can only be, personalised for public or commercial transactions or individual identification; and
Where the cryptographic capability is not user-accessible;
‘Personal data’ includes any data specific to a particular person or entity, such as the amount of money stored and data necessary for "authentication".
Cryptographic equipment specially designed and limited for banking use or ‘money transactions’;
‘Money transactions’ in 5A002.a. Note 2.b. includes the collection and settlement of fares or credit functions.
Portable or mobile radiotelephones for civil use (e.g., for use with commercial civil cellular radio communication systems) that are not capable of transmitting encrypted data directly to another radiotelephone or equipment (other than Radio Access Network (RAN) equipment), nor of passing encrypted data through RAN equipment (e.g., Radio Network Controller (RNC) or Base Station Controller (BSC));
Cordless telephone equipment not capable of end-to-end encryption where the maximum effective range of unboosted cordless operation (i.e. a single, unrelayed hop between terminal and home base station) is less than 400 metres according to the manufacturer’s specifications;
Portable or mobile radiotelephones and similar client wireless devices for civil use, that implement only published or commercial cryptographic standards (except for anti-piracy functions, which may be non-published) and also meet the provisions of paragraphs a.2. to a.4. of the Cryptography Note (Note 3 in Category 5, Part 2), that have been customised for a specific civil industry application with features that do not affect the cryptographic functionality of these original non-customised devices;
Items, where the "information security" functionality is limited to wireless "personal area network" functionality, implementing only published or commercial cryptographic standards;
Mobile telecommunications Radio Access Network (RAN) equipment designed for civil use, which also meet the provisions of paragraphs a.2. to a.4. of the Cryptography Note (Note 3 in Category 5, Part 2), having an RF output power limited to 0,1 W (20 dBm) or less, and supporting 16 or fewer concurrent users;
Routers, switches, gateways or relays, where the "information security" functionality is limited to the tasks of "Operations, Administration or Maintenance" ("OAM") implementing only published or commercial cryptographic standards; or
General purpose computing equipment or servers, where the "information security" functionality meets all of the following:
Uses only published or commercial cryptographic standards; and
Is any of the following:
Integral to a CPU that meets the provisions of Note 3 to Category 5–Part 2;
Integral to an operating system that is not specified in 5D002; or
Limited to "OAM" of the equipment.
Items specially designed for a ‘connected civil industry application’, meeting all of the following:
Being any of the following:
A network-capable endpoint device meeting any of the following:
The "information security" functionality is limited to securing ‘non-arbitrary data’ or the tasks of "Operations, Administration or Maintenance" ("OAM"); or
The device is limited to a specific ‘connected civil industry application’; or
Networking equipment meeting all of the following:
Being specially designed to communicate with the devices specified in paragraph j.1.a. above; and
The "information security" functionality is limited to supporting the ‘connected civil industry application’ of devices specified in paragraph j.1.a. above, or the tasks of "OAM" of this networking equipment or of other items specified in paragraph j. of this Note; and
Where the "information security" functionality implements only published or commercial cryptographic standards, and the cryptographic functionality cannot easily be changed by the user.
Being a ‘cryptographic activation token’;
A ‘cryptographic activation token’ is an item designed or modified for any of the following:
Converting, by means of "cryptographic activation", an item not specified in Category 5 – Part 2 into an item specified in 5A002.a. or 5D002.c.1., and not released by the Cryptography Note (Note 3 in Category 5 – Part 2); or
Enabling, by means of "cryptographic activation", additional functionality specified in 5A002.a. of an item already specified in Category 5 – Part 2.
Designed or modified to use or perform "quantum cryptography";
"Quantum cryptography" is also known as Quantum Key Distribution (QKD).
Designed or modified to use cryptographic techniques to generate channelising codes, scrambling codes or network identification codes, for systems using ultra-wideband modulation techniques and having any of the following:
A bandwidth exceeding 500 MHz; or
A "fractional bandwidth" of 20 % or more;
Designed or modified to use cryptographic techniques to generate the spreading code for "spread spectrum" systems, other than those specified in 5A002.d., including the hopping code for "frequency hopping" systems.
[5A003] Systems, equipment and components, for non-cryptographic "information security", as follows:
Communications cable systems designed or modified using mechanical, electrical or electronic means to detect surreptitious intrusion;
Specially designed or modified to reduce the compromising emanations of information-bearing signals beyond what is necessary for health, safety or electromagnetic interference standards.
[5A004] Systems, equipment and components for defeating, weakening or bypassing "information security", as follows:
Designed or modified to perform ‘cryptanalytic functions’.
‘Cryptanalytic functions’ are functions designed to defeat cryptographic mechanisms in order to derive confidential variables or sensitive data, including clear text, passwords or cryptographic keys.
Items, not specified in 4A005 or 5A004.a., designed to perform all of the following:
‘Extract raw data’ from a computing or communications device; and
Circumvent "authentication" or authorisation controls of the device, in order to perform the function described in 5A004.b.1.
‘Extract raw data’ from a computing or communications device means to retrieve binary data from a storage medium (e.g., RAM, flash or hard disk) of the device without interpretation by the device’s operating system or filesystem.
Debuggers, hypervisors;
Items limited to logical data extraction;
Data extraction items using chip-off or JTAG; or
Items specially designed and limited to jail-breaking or rooting.
[5B002] "Information security" test, inspection and "production" equipment, as follows:
Equipment specially designed for the "development" or "production" of equipment specified in 5A002, 5A003, 5A004 or 5B002.b.;
Measuring equipment specially designed to evaluate and validate the "information security" functions of the equipment specified in 5A002, 5A003 or 5A004, or of "software" specified in 5D002.a. or 5D002.c.
None.
[5D002] "Software" as follows:
"Software" specially designed or modified for the "development", "production" or "use" of any of the following:
Equipment specified in 5A002 or "software" specified in 5D002.c.1.;
Equipment specified in 5A003 or "software" specified in 5D002.c.2.; or
Equipment or "software", as follows:
Equipment specified in 5A004.a. or "software" specified in 5D002.c.3.a.;
Equipment specified in 5A004.b. or "software" specified in 5D002.c.3.b.
"Software" having the characteristics of a ‘cryptographic activation token’ specified in 5A002.b.;
"Software" having the characteristics of, or performing or simulating the functions of, any of the following:
Not used.
[5E002] "Technology" as follows:
"Technology" according to the General Technology Note for the "development", "production" or "use" of equipment specified in 5A002, 5A003, 5A004 or 5B002, or of "software" specified in 5D002.a. or 5D002.c.
"Technology" having the characteristics of a ‘cryptographic activation token’ specified in 5A002.b.
The Whole Regulation you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
The Schedules you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area.
Original (As adopted by EU): The original version of the legislation as it stood when it was first adopted in the EU. No changes have been applied to the text.
Geographical Extent: Indicates the geographical area that this provision applies to. For further information see ‘Frequently Asked Questions’.
Show Timeline of Changes: See how this legislation has or could change over time. Turning this feature on will show extra navigation options to go to these specific points in time. Return to the latest available version by using the controls above in the What Version box.
Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include:
This timeline shows the different versions taken from EUR-Lex before exit day and during the implementation period as well as any subsequent versions created after the implementation period as a result of changes made by UK legislation.
The dates for the EU versions are taken from the document dates on EUR-Lex and may not always coincide with when the changes came into force for the document.
For any versions created after the implementation period as a result of changes made by UK legislation the date will coincide with the earliest date on which the change (e.g an insertion, a repeal or a substitution) that was applied came into force. For further information see our guide to revised legislation on Understanding Legislation.
Use this menu to access essential accompanying documents and information for this legislation item. Dependent on the legislation item being viewed this may include:
Click 'View More' or select 'More Resources' tab for additional information including: