Hi AndreasB
Seems you didn’t get yet any answer yet about your application for PP at French administration for approval.
From Décret n°2007-663 du 2 mai 2007 pris pour l’application des articles 30, 31 et 36 de la loi n° 2004-575 du 21 juin 2004 pour la confiance dans l’économie numérique et relatif aux moyens et aux prestations de cryptologie (sorry for the French, but this is the official source).
Chapter III, Article 4, if your application was complete, in case of absence of response, this is equivalent of an approval valid for one year.
Automatic translation from the “Décret”
If the application is complete, the Director General of the National Information Systems Security Agency shall notify the applicant of his decision by registered letter with acknowledgment of receipt within four months of the date of delivery of the acknowledgment of receipt or confirmation of receipt of the application. Failure to notify the applicant within this period shall be deemed to constitute authorization for a period of one year.
The application is deemed complete if, within two months of receiving the application, the National Agency for Information Systems Security has not requested the applicant to provide additional documents by registered letter with acknowledgment of receipt. In the latter case, the four-month period specified in the previous paragraph shall run from the date of receipt of the additional documents.
So if they didn’t ask you for any additional information, you’re good to go.
Btw, I also think that you might don’t even need to apply for it. Because in Annex I of same “Décret”, there is a list of equipment exemptions, and your application should fall under Operation A/Category 6
Annex 1
SUPPLY, TRANSFER FROM OR TO A MEMBER STATE OF THE EUROPEAN COMMUNITY, IMPORT OR EXPORT OPERATIONS EXEMPT FROM PRIOR FORMALITIES.
OPERATIONS
A. - The supply, transfer from or to a Member State of the European Community, import, or export of the following categories of cryptologic equipment:
CATEGORY: 6
Equipment specially designed and limited to ensure the protection of software or computer data against copying or unauthorized use, and whose cryptographic capability is not accessible to the user.
Anyway, if you need some help to fill the application or more investigation on this part, maybe I can help.
—
Neoih, A French guy ![]()