Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ETR 331 : 20001

Current

Current

The latest, up-to-date edition.

SECURITY TECHNIQUES ADVISORY GROUP (STAG) - DEFINITION OF USER REQUIREMENTS FOR LAWFUL INTERCEPTION OF TELECOMMUNICATIONS

Available format(s)

Hardcopy , PDF

Language(s)

English

$43.16
Including GST where applicable

Foreword
1 Scope
2 References
3 Abbreviations and Definitions
  3.1 Abbreviations
  3.2 Definitions
4 General Introduction
5 Architecture
6 User (LEA) requirements
  6.1 General requirements
  6.2 Result of interception
  6.3 Location information
  6.4 Time constraints
  6.5 Non disclosure
  6.6 Information transmission and information protection
       requirements
  6.7 Internal security
  6.8 Unchanged state of service, etc.
  6.9 Technical handover interfaces and format requirements
  6.10 Independence of the network operator or service provider
  6.11 Temporary obstacles to transmission
  6.12 Identification of the identity to be intercepted
  6.13 Multiple interception measures
Annex A: Explanatory diagrams
      A.1 General network arrangements
      A.2 Service provider
      A.3 Home country service from a foreign territory
      A.4 Identification of a target service
Annex B: Draft requirements for interception across national
         frontiers
History

Gives guidance for ETSI bodies in the area of co-operation by network operators/service providers with the lawful interception of telecommunications.

Committee
NA
DocumentType
Standard
Pages
22
PublisherName
European Telecommunications Standards Institute
Status
Current

EG 201 620 : 1.1.1 INTELLIGENT NETWORKS (IN) - SECURITY STUDIES FOR CORDLESS TERMINAL MOBILITY (CTM)
TR 101 750 : 1.1.2 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); SECURITY; STUDIES INTO THE IMPACT OF LAWFUL INTERCEPTION
EG 201 040 : 1.1.1 TERRESTRIAL TRUNKED RADIO (TETRA) - SECURITY - LAWFUL INTERCEPTION (LI) INTERFACE - FEASIBILITY STUDY REPORT
EG 201 781 : 1.1.1 INTELLIGENT NETWORKS (IN); LAWFUL INTERCEPTION
TS 121 133 : 4.1.0 UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); 3G SECURITY; SECURITY THREATS AND REQUIREMENTS
SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
TS 101 040 : 1.1.1 TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY; LAWFUL INTERCEPTION (LI) INTERFACE
TS 101 331 : 1.4.1 LAWFUL INTERCEPTION (LI); REQUIREMENTS OF LAW ENFORCEMENT AGENCIES
EG 201 057 : 1.1.2 TELECOMMUNICATIONS SECURITY; TRUSTED THIRD PARTIES (TTP); REQUIREMENTS FOR TTP SERVICES
TR 101 772 : 1.1.2 TIPHON RELEASE 3; SERVICE INDEPENDENT REQUIREMENTS DEFINITION; LAWFUL INTERCEPTION - TOP LEVEL REQUIREMENTS

ETR 330 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more