Intellectual Property Rights from Publicly Financed Research and
R 385
Regulation of Interception of Communications and Provision of Communication-Related Information Act, 2002 (Act 70 of 2002)Directives in Respect of Different Categories of Telecommunications Service Providers made in terms of The Regulation of Interception of Communications and Provision of Communication-Related Information Act, 2002 (Act No. 70 of 2002)Schedule A : Directive for Fixed Line Operators in Terms of Section 30(7)(a) read with Section 30(2) of The Regulation of Interception of Communications and Provision of Communication-Related Information Act, 2002 (Act No. 70 of 2002)Part 6 : Detailed Security, Functional and Technical Requirements of the Facilities and Devices for Lawful Interception18. Facilities and Devices |
18.1 | The operator is expected to implement a marking facility for lawful interception (LI) compliance purposes. This facility must comply with the physical and access control security measures specified in the security requirement section of this document. |
18.2 | Within this marking facility, the operator must implement an Interception Management System (IMS), composed of one or more LI servers and one or more administration workstations, for the marking and management of targets and interceptions. The IMS must be protected from the rest of the operator’s network by means of one or more network firewalls; - |
18.3 | Where necessary, the operator must implement mediation device(s) for the collection from network elements, normalization and delivery to an interception centre (IC) of intercept related information (IRI) tickets in the format specified within the technical requirement section of this document. |
18.4 | The internal interception function (IIF) of network elements (when provided by the vendor) must be used in preference to physical wiretap and external interception equipment. |
18.5 | When external interception equipment is necessary-(i.e. –no IIF is provided by the equipment vendor), the interception function must be implemented in dedicated hardware or firmware and must be connected in a manner as to: |
• | not disrupt normal operation of the telecommunication network when the equipment fails. |