ETR 331 : 20001
Current
The latest, up-to-date edition.
SECURITY TECHNIQUES ADVISORY GROUP (STAG) - DEFINITION OF USER REQUIREMENTS FOR LAWFUL INTERCEPTION OF TELECOMMUNICATIONS
Hardcopy , PDF
English
Foreword
1 Scope
2 References
3 Abbreviations and Definitions
3.1 Abbreviations
3.2 Definitions
4 General Introduction
5 Architecture
6 User (LEA) requirements
6.1 General requirements
6.2 Result of interception
6.3 Location information
6.4 Time constraints
6.5 Non disclosure
6.6 Information transmission and information protection
requirements
6.7 Internal security
6.8 Unchanged state of service, etc.
6.9 Technical handover interfaces and format requirements
6.10 Independence of the network operator or service provider
6.11 Temporary obstacles to transmission
6.12 Identification of the identity to be intercepted
6.13 Multiple interception measures
Annex A: Explanatory diagrams
A.1 General network arrangements
A.2 Service provider
A.3 Home country service from a foreign territory
A.4 Identification of a target service
Annex B: Draft requirements for interception across national
frontiers
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.