Ancillary cryptography is
|“||[t]he incorporation or application of "cryptography" by items that are not primarily useful for computing (including the operation of "digital computers"), communications, networking (includes operation, administration, management and provisioning) or "information security."||”|
|“||N.B. Examples of commodities and software that perform "ancillary cryptography" are items specially designed and limited to: Piracy and theft prevention for software, music, etc.; games and gaming; household utilities and appliances; printing, reproduction, imaging and video recording or playback (but not videoconferencing); business process modeling and automation (e.g., supply chain management, inventory, scheduling and delivery); industrial, manufacturing or mechanical systems (including robotics, other factory or heavy equipment, and facilities systems controllers, such as fire alarms and HVAC); automotive, aviation and other transportation systems. Commodities and software included in this description are not limited to wireless communication and are not limited by range or key length.||”|
U.S. Export Administration Regulations, Part 772 (15 C.F.R. §772.1) (footnote omitted).