The IT Law Wiki
m
Tag: sourceedit
Tag: Source edit
 
(2 intermediate revisions by the same user not shown)
Line 3: Line 3:
 
An '''interception subject''' is a
 
An '''interception subject''' is a
   
{{Quote| person or persons, specified in a lawful [[authorization]], whose [[telecommunications]] are to be [[intercept]]ed.<ref>[[ETSI]]: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) ([http://www.etsi.org/deliver/etsi_ts/101600_101699/101671/02.08.01_60/ts_101671v020801p.pdf full-text]).</ref>}}
+
{{Quote|person or persons, specified in a lawful [[authorization]], whose [[telecommunications]] are to be [[intercept]]ed.<ref>[[ETSI]]: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) ([http://www.etsi.org/deliver/etsi_ts/101600_101699/101671/02.08.01_60/ts_101671v020801p.pdf full-text]).</ref>}}
   
 
== References ==
 
== References ==

Latest revision as of 20:46, 8 June 2021

Definition[]

An interception subject is a

person or persons, specified in a lawful authorization, whose telecommunications are to be intercepted.[1]

References[]

  1. ETSI: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) (full-text).

See also[]