The IT Law Wiki
m
Tag: sourceedit
Tag: sourceedit
Line 3: Line 3:
 
An '''interception subject''' is a
 
An '''interception subject''' is a
   
{{Quote| person or persons, specified in a lawful [[authorization]], whose [[telecommunications]] are to be [[intercept]]ed.<ref>[[ETSI]]: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) ([http://www.etsi.org/deliver/etsi_ts/101600_101699/101671/02.08.01_60/ts_101671v020801p.pdf full-text]).</ref>}}
+
{{Quote|person or persons, specified in a lawful [[authorization]], whose [[telecommunications]] are to be [[intercept]]ed.<ref>[[ETSI]]: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) ([http://www.etsi.org/deliver/etsi_ts/101600_101699/101671/02.08.01_60/ts_101671v020801p.pdf full-text]).</ref>}}
   
 
== References ==
 
== References ==

Revision as of 04:46, 2 April 2017

Definition

An interception subject is a

person or persons, specified in a lawful authorization, whose telecommunications are to be intercepted.[1]

References

  1. ETSI: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) (full-text).

See also