5. Export control. In accordance with the laws of the United States and other countries, the user assures and guarantees that he: (a) understands that programs and their components may be subject to export controls in accordance with the rules of the U.S. Department of Commerce`s Export Administration (EAR); (b) is not in a destination country prohibited in accordance with the sanctions provisions of the EAR or the United States (currently Cuba, Iran, Iraq, North Korea, Sudan and Syria, subject to amendments, as revealed by the United States government); (c) programs are not allocated to prohibited destinations or persons or entities on the U.S. Bureau of Industry and Security Denied Parties or U.S. Office of Foreign Assets Control List of specifically designated nationals or blocked persons or similar lists held by other countries without the necessary export licenses or authorizations; (d) do not use or transmit programmes related to nuclear, chemical or biological weapons, missile technologies or military purposes, as long as an arms embargo in force prohibits it, unless it has been authorized by the relevant government authority through a specific regulation or licence; (e) agrees that, when it is in the United States and exports or transfers programs to authorized end-users, it transmits, to the extent necessary, to the extent necessary, to the extent required, to the extent requested in Section 740.17 (e) of the EAR, semi-annual reports to the Office of Industry and Security of the Department of Commerce , containing the name and address (including the country) of each taker; and (f) understands that countries, including the United States, may restrict the import, use or export of encryption products (including programs and components) and agrees that they are solely responsible for complying with these import, use or export restrictions. These terms of use and additional conditions (if any) constitute a legally binding agreement between you and Red Hat. Therefore, it is important that you read them carefully before accessing Red Hat content. To use Red Hat content, you must first accept these Terms of Use. You cannot access or use Red Hat content if you do not accept these Terms of Use. By using Red Hat content, you recognize that you have read these Terms of Use and that you agree with it. If you are a natural person acting on behalf of a company or other corporation, you declare that you are entitled to accept these Terms of Use on behalf of the corporation.