The IT Law Wiki
Tag: Source edit
Tag: Source edit
 
Line 2: Line 2:
   
 
An '''interception subject''' is a
 
An '''interception subject''' is a
  +
 
{{Quote|person or persons, specified in a lawful [[authorization]], whose [[telecommunications]] are to be [[intercept]]ed.<ref>[[ETSI]]: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) ([http://www.etsi.org/deliver/etsi_ts/101600_101699/101671/02.08.01_60/ts_101671v020801p.pdf full-text]).</ref>}}
 
{{Quote|person or persons, specified in a lawful [[authorization]], whose [[telecommunications]] are to be [[intercept]]ed.<ref>[[ETSI]]: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) ([http://www.etsi.org/deliver/etsi_ts/101600_101699/101671/02.08.01_60/ts_101671v020801p.pdf full-text]).</ref>}}
   

Latest revision as of 20:46, 8 June 2021

Definition[]

An interception subject is a

person or persons, specified in a lawful authorization, whose telecommunications are to be intercepted.[1]

References[]

  1. ETSI: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) (full-text).

See also[]