Security and Freedom Through Encryption Act

Security and Freedom Through Encryption Act

The 'Security and Freedom Through Encryption Act' was approved on 1997 by the US Congress to affirm the rights of United States persons to use and sell encryption and to relax export controls on encryption.

Overview

* Freedom to use encryption.

* Freedom to sell encryption.

* Prohibition on mandatory key escrow.

* Unlawful use of encryption in furtherance of a criminal act.

References

* [http://thomas.loc.gov/cgi-bin/query/z?c106:H.R.850: The Library of Congress Thomas] .


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Encryption — Encrypt redirects here. For the film, see Encrypt (film). This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography. In cryptography, encryption is the process of… …   Wikipedia

  • Freedom of Information Act (United States) — This article is about the U.S. federal law. For freedom of information in the fifty U.S., see Freedom of information in the United States. For freedom of information in other countries, see Freedom of information legislation. The Freedom of… …   Wikipedia

  • Freedom of the press — The freedom of the press redirects here. For George Orwell s preface, see Animal Farm# The Freedom of the Press . For the report by Freedom House, see Freedom of the Press (report). Journalism News  …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Legal aspects of computing — Part of a series on the Legal aspects of computing Major topics File sharing Legal aspects of hyperlinking and framing Lesser or historical topics Spamming …   Wikipedia

  • Law, Crime, and Law Enforcement — ▪ 2006 Introduction Trials of former heads of state, U.S. Supreme Court rulings on eminent domain and the death penalty, and high profile cases against former executives of large corporations were leading legal and criminal issues in 2005.… …   Universalium

  • Media and Publishing — ▪ 2007 Introduction The Frankfurt Book Fair enjoyed a record number of exhibitors, and the distribution of free newspapers surged. TV broadcasters experimented with ways of engaging their audience via the Internet; mobile TV grew; magazine… …   Universalium

  • Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Business and Industry Review — ▪ 1999 Introduction Overview        Annual Average Rates of Growth of Manufacturing Output, 1980 97, Table Pattern of Output, 1994 97, Table Index Numbers of Production, Employment, and Productivity in Manufacturing Industries, Table (For Annual… …   Universalium

  • Intelligence cycle security — This article is part of a series under the intelligence cycle management, and deals with protection of the intelligence cycle. For a hierarchical list of articles, see the intelligence cycle management hierarchy. National intelligence programs,… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”