Statistics Act, 1999
R 385
Regulation of Interception of Communications and Provision of Communication-Related Information Act, 2002 (Act 70 of 2002)Directives in Respect of Different Categories of Telecommunications Service Providers made in terms of The Regulation of Interception of Communications and Provision of Communication-Related Information Act, 2002 (Act No. 70 of 2002)Schedule B : Directive for Mobile Cellular Operators in terms of Section 30(7)(a) read with Section 30(2) of the Regulation of Interception of Communications Information Act, 2002 (Act No. 70 of 2002)Part 6 : Detailed Security, Functional and Technical Requirements of the Facilities and Devices for Lawful Interception18. Facilities and Devices |
MCOs are expected to abide by the following in terms of the functionality and security of the facilities and devices implemented to make their networks compliant to lawful interception (LI) requirements.
18.1 | The operator is expected to implement a marking facility for lawful interception (LI) compliance purposes. |
18.2 | Within this marking facility, the operator must implement an Interception Management System (IMS) for the centralized marking and management of targets and interceptions. |
18.3 | Where necessary, the operator must implement mediation device(s) for the collection from network elements, normalization and delivery to an interception centre (IC) of intercept related information (IRI) tickets in the format specified within the technical requirement section of this document. |
18.4 | The internal interception function (IIF) of network elements (when provided by the vendor) must be used in preference to physical wiretap and external interception equipment. |
18.5 | When external interception equipment is necessary (ie, no HF is provided by the equipment vendor), the interception function must be implemented in dedicated hardware or firmware and must be connected in a manner as to: |
• | not disrupt normal operation of the telecommunication network when the equipment fails; and |
• | provide the same coverage of interception as an equivalent IIF solution would provide. |