Part 2 : Interception of Indirect Communications

Purchase cart Previous page Return to chapter overview Next page

 

4. General requirements in respect of interception

5. Unchanged state of service

6. Security requirements for interception

7. Technical and functional requirements in respect of interception