4. General requirements in respect of interception
5. Unchanged state of service
6. Security requirements for interception
7. Technical and functional requirements in respect of interception