SERIES A : GUIDANCE DOCUMENTS. Document Nr 3
|
|
|
- Egbert Maxwell
- 10 years ago
- Views:
Transcription
1 DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC SERIES A : GUIDANCE DOCUMENTS Document Nr 3 Closer understanding of the term Transit Providers in relation to its application in Directive 2006/24/EC version 3 December final Scope This paper examines which provider needs to retain Internet data according to Directive 2006/24/EC, and especially which the obligations are of transit providers to retain such data on the basis of the rules that apply to providers of electronic communications services. N.B. Not in the scope of this paper are providers which carry out measures that disguise the origin of the transported data (e.g. so- called anonymizers) whose liability will be the object of further examination. Date and Status This document was unanimously endorsed by the meeting of the Expert Group of 3 December A disclaimer applies (see at the end of the document) Aspects of Directive 2006/24/EC covered in this paper Article 1 - Scope: the application of the Directive to communications data only, and not to content; Recital 13 and 23: these recitals state that providers are only expected to retain data relating to their own services; Recital 13: the statement that it is intended that data is only retained once, rather than requiring copies to be retained by each provider. Page 1 of 12
2 Key Observations Discussions in some Member States concerning the application of the Data Retention Directive have sought to clarify which electronic communications service providers must comply with the obligation to retain data. This paper seeks to explain why certain service providers should not be obliged to retain data, on the basis that (i) it is technically impossible or disproportionately difficult to do so, and/or (ii) other providers are already obliged to retain the relevant data, or are the appropriate providers to do so in accordance with the Directive. In this context, this document also seeks to provide a practical interpretation of the term retention of data "generated or processed in connection with publicly available services or networks. Recommendations In respect of data relating to Internet access, the provider which must retain data is the Internet access provider; In respect of data, the provider which must retain data is the provider of the service (where this is a provider of publicly available electronic communications networks or services); Entities that simply carry Internet data across networks but that do neither provide access to the Internet, nor to , nor to VoIP services (i.e. transit providers ), are not required to retain data under the Directive because they do not have the necessary data to correlate logs to a specific user. Page 2 of 12
3 Appendix A: Interpretation of the Data Retention Directive: which type of provider must retain Internet data? Executive Summary The Data Retention Directive requires providers of publicly available electronic communications services and networks to retain certain data that are generated or processed by them. Since many providers are connected and involved in providing Internet access and use, the question arises as to which provider is required to retain what type of data. The Directive provides three main aids to interpreting which provider feels the burden of its requirements: the scoping provision in Article 1, that says that it only applies to communications data, and not to content; Recital 13 and 23 state that providers are only expected to retain data relating to their own services; and a statement in Recital 13 that it is intended that data is only retained once, rather than requiring copies to be retained by each provider. Applying these interpretive aids it can be seen that in respect of data relating to Internet access, the provider that must retain data is the Internet access provider; in respect of data, the provider that needs to retain data is the provider of the service (where this is a provider of publicly available electronic communications networks or services); Entities that simply carry Internet data across networks but that do neither provide access to the Internet, nor to , nor to VoIP services (i.e. transit providers ), are not required to retain data under the Directive because they do not have the necessary data to correlate logs to a specific user. The non-application of the Directive to transit providers is consistent with Articles 12 and 15 of the Electronic Commerce Directive (2000/31/EC), which prohibits that Member States impose requirements on them that are similar to those incumbent on service and network providers. Page 3 of 12
4 Typology of Network and Service Providers For reasons of convenience and ease of reference, this paper uses the following typology to describe the network and service providers it considers. EXPRESSION DEFINITION Internet Service Providers (ISP) Access providers Gateways A service provider that uses Internet Protocol to route data That subset of ISP that controls access to the Internet, by authenticating the user against their customer list That subset of ISP that provides a point of interconnection between the publicly routable Internet and a network with an alternative protocol or addressing scheme. This includes both gateways between the Internet and private, non-routable IP address space (e.g.10.x.x.x) and gateways to non- Internet Protocol networks (e.g. PSTN, X25) relay An operator of an server that receives at an address and retransmits it to a separate e- mail address or addresses. Transit provider That subset of ISP that simply carries data transmitted to it by another party, without alteration of the data or selection of the ultimate recipient, and is (with respect to a particular communications, neither an Access Provider nor a Gateway, nor an relay. Vi t l id Th t b t f id th t li thi d NB: as a point of clarification, it should be noted that while it is stated above that access providers and transit providers are subsets of the ISP, in many cases the ISP, access provider and transit provider are different organisations/companies. Also should be noted, that those providers which - without operating a gateway - carry out measures that disguise the origin of the transported data (e.g. so called anonymizers) do not fall under the scope of this typology. Note: this typology refers to the role that an organisation plays with regard to a particular communication or class of communications. For example, a particular organisation might be an Access Provider and also an Relay for certain communications, while at the same time being only an Access Provider for others. Page 4 of 12
5 Scope of the Directive The Directive covers Public Electronic Communications Networks and Public Electronic Communications Services; these are terms defined by the EU regulatory framework for electronic communications, and are defined in the Framework Directive 1. Entities that do not come under the definition of those terms are therefore also outside of the scope of the Data Retention Directive. This paper builds on those definitions and their inherent limitations. Introduction Data Retention Directive (2006/24/EC) provides that: Member States shall adopt measures to ensure that the data specified in Article 5 of this Directive are retained in accordance with the provisions thereof, to the extent that those data are generated or processed by providers of publicly available electronic communications services or of a public communications network within their jurisdiction in the process of supplying the communications services concerned. The obligation to retain data falls on providers of publicly available electronic communications services or of a public communications network. As many providers are involved in the transmission of many communications over the Internet, the question arises as to which provider or providers are bound by this obligation. Article 1 of the Directive states: 1 This Directive aims to harmonise Member States' provisions concerning the obligations of the providers of publicly available electronic communications services or of public communications networks with respect to the retention of certain data which are generated or processed by them, in order to ensure that the data are available for the purpose of the investigation, detection and prosecution of serious crime, as defined by each Member State in its national law. 2. This Directive shall apply to traffic and location data on both legal entities and natural persons and to the related data necessary to identify the subscriber or registered user. It shall not apply to the content of electronic communications, including information consulted using an electronic communications network. 1 Directive 2002/21/EC of the European Parliament and of the Council of 7 March 2002 on a common regulatory framework for electronic communications networks and services (Framework Directive). Page 5 of 12
6 Recital 13 of the Directive states: This Directive relates only to data generated or processed as a consequence of a communication or a communication service and does not relate to data that are the content of the information communicated. Data should be retained in such a way as to avoid their being retained more than once [ ] In particular, as regards the retention of data relating to Internet and Internet telephony, the obligation to retain data may apply only in respect of data from the providers or the network providers own services. Recital 23 of the Directive states: Given that the obligations on providers of electronic communications services should be proportionate, this Directive requires that they retain only such data as are generated or processed in the process of supplying their communications services. To the extent that such data are not generated or processed by those providers, there is no obligation to retain them [...]. From this it can be understood that the obligation does not necessarily fall on every network or service provider that might be involved in some way in a communication. Occasions when a provider will not be required to retain data relating to a communication include: When the data is the content of the communication, rather than communications data such as traffic and location data; or When the data relates to a communication that is not part of that provider s service. This paper offers examples of cases where this will apply, by reference to common Internet usage. Internet access A commercial provider of Internet access will invariably restrict access to their service to their own customers, and those who obtain access through their customers. In practice, this means that the access provider will demand a user name and password - or equivalent credentials - at the point of access. These credentials link the user to the customer account. In order to make use of Internet access a user needs to be assigned an Internet Protocol address ( IP address ). All communications on the Internet are sent using the IP address as the destination, and so use of an IP address is integral to Internet access. By recording which users were assigned which IP address at any given moment, the access provider performs a critical function in ensuring the traceability of Internet communications. Page 6 of 12
7 Figure 1 - Illustration of a common case of Internet access Page 7 of 12
8 A consumer on a laptop (labelled 1) connects over a wireless link to a combined wireless access point and router (labelled 3). The customer router connects to an Internet Access Provider s entry point over a communications link (labelled 4), which might be DSL line or a cable network. The Access Provider s entry point (labelled 5) verifies the customer identity with the Access Provider s database of customer records (labelled 6), before assigning the customer router an IP address. This is commonly done by asking the customer router for a password, which is checked against the customer database. Once an IP address has been assigned the entry point (labelled 5) will route Internet traffic from the customer (labelled: 3), to a second ISP (labelled 7) over the Internet (labelled: 8), so that it may ultimately reach another its destination (labelled 10). This destination could be (e.g.) a web server or another individual. The first Access Provider, which knows the identity of its customers, can record the IP address at the point of assignment. The second ISP, in cases where it is also an Access Provider, can for its part do the same with respect to its customer. Since each communication must necessarily have a destination IP address, law enforcement can trace the recipient of communications, by asking the ISP which IP address was assigned to which customer at the time the communication was made. The Access Providers are obliged to retain this data, which is identified in Article 5 of the Directive. Note that each Access Provider only knows the identity of its own customer. This may sometimes directly implicate a user who is directly connected (e.g. the user at labelled: 10). However if the customer runs a network, the Access Provider will not be able to distinguish between individual users (labelled 1 and 2): in a domestic situation, this is usually sufficient. Virtual Access Providers There is a variant of the above case known as the Virtual Access provider. This is similar to the above, except that while the Virtual Access provider holds the customer relationship and authenticates the customer to authorise the commencement of a network session, it relies on a third party to provide the network session to the customer. In this case two entities combine to fulfil the role of Access provider. Where the Access provider role is split in such a fashion, the availability of data may be split between them. An example of a common architecture would be as follows: The Virtual Access provider does not assign the customer with an IP address itself, and so does not have the record of assignments available to it; The network access service provider may not have access to the customer account records. Page 8 of 12
9 In such a case, when the Virtual Access provider may not assign the customer with an IP address itself, it will instead identifies the customer to the network access service provider that will provide the network session, for example by providing the customer with a User ID (session token). Reseller ISPs In contrast to the situation described as a Virtual Access provider, stands the case where an entity, which may be termed a Reseller, acts solely as a reseller of an Access providers services; having sold the customer the service, it transfers all the relevant data to the Access provider, which is responsible for fulfilling the sale. Such a reseller is not considered an Access Provider for the purposes of this analysis. Transit providers The commercial service provided by an Access Provider is to route traffic between its customers and other Internet users across the Internet. In doing so, they may make use of intermediary networks known as Transit Providers. A Transit Provider is (normally) a public electronic communications network. Its only function with regard to the communication is to route it onwards towards the final destination, which is identified by the IP address attached to each packet. If the Transit Provider does more than this (such as routing the communication over a non-internet network such as the PSTN) then, for these purposes, they are no longer considered a Transit Providers. Transit providers, which in figure 1 are contained within the cloud labelled 8, have no access to the customer databases (labelled 6 and 11) and cannot therefore retain that data. Recital 13 of Directive 2006/24/EC acknowledges that there is no obligation in this case, saying: Data generated or processed when supplying the communications services concerned refers to data which are accessible. Gateways An ISP that connects the public Internet to another network that is not publicly routable is said to be operating a Gateway to that network. Some examples of gateways include: X25 gateways. X25 is an alternative network protocol to Internet Protocol. Although largely superseded by the Internet Protocol in most markets, it is still in use in some public sector and large corporate networks. A PSTN gateway. A voice call between a publicly routable Internet address and the public telephone system must pass through a gateway that provides interconnection between these diverse networks. That gateway Page 9 of 12
10 will provide translation between the IP addresses used on the Internet and the E.164 addresses used on the PSTN. Network Address Translation (NAT). An Internet Access Provider may assign its users non-routable private IP address space, as described in RFC1918. In such cases, in order to provide connectivity between its local network and the public Internet it must operate a NAT gateway which is connect to Internet transit using a public address. As traffic passes from its local network to the Internet through the gateway, the source address in each packet is translated on the fly from the private addresses to the public address(es). The gateway tracks basic data about each active connection (particularly the destination address and port). When a reply returns to the gateway, it uses the connection tracking data it stored during the outbound phase to determine where on the internal network to forward the reply. An ISP that operates a Gateway is not merely a Transit Provider. Note however that this definition of a Gateway only refers to a point where publicly routable Internet networks are connected to other types of networks: this distinguishes the Gateway from a Transit Provider or an Internet Exchange Point, which connect two or more publicly routable Internet networks. Who needs to retain data? The above shows that the service provider that must retain records of the provision of access to the network is the organisation that provides the customer with access. This is in accord with the assertion in Recital 13 that states that the obligation to retain data may apply only in respect of data from the providers or the network providers own services The service of the Access Provider is providing access to the Internet, and customer sign-on details and account records are data that are "generated and processed" in the context of that service. Whether the Access Provider is a unified entity or not, or consists of a network provider and a virtual access provider, does not alter the fact that the obligations of the Directive to retain data are exclusively on the Access Provider. In each case, from the perspective of the transit provider, that provides a separate and independent service, all relevant data is data [ ] in respect of the provider's own services. When data relating to Article 5 of the Directive is physically unavailable to the transit provider, he is not required to retain that data under the terms of the Directive. Transit providers and Article 1 of the Directive states: This Directive shall apply to traffic and location data on both legal entities and natural persons and to the related data necessary to identify the Page 10 of 12
11 subscriber or registered user. It shall not apply to the content of electronic communications, including information consulted using an electronic communications network. In transmitting across the Internet, may pass across the networks of one or more intermediary transit providers before it reaches the recipient mail server. A transit provider is (normally) a public electronic communications network. Its only function with regard to the communication is, by definition, to route it onwards towards the final destination, which is identified by the IP address attached to each packet. The IP address used as routing information therefore could fall within the scope of Article addresses (and for that matter VoIP identifiers and E-164 addresses) are solely an application-level function. From the perspective of a transit provider, data relating to or VoIP, beyond the bare destination IP-address constitutes content: it forms no part of the transit provider s service, would normally be unknown to the transit provider, and can indeed be made completely unavailable to the transit provider if the user chooses to employ encryption. Article 1 of the Directive states that the Directive does not apply to the content of communications passing over the network, which provides a further reason why a transit provider is outside the scope of the Directive. A similar legislative approach can be seen in Article 15 of the Electronic Commerce Directive, which protects such intermediary providers from having any general duty to monitor the traffic that passes over their networks imposed by Member States. Taken together, these Directives show a consistent view of the limited role of intermediary networks, which provides further support for this interpretation of Article 1. It can therefore be seen that under Article 1 transit providers are not required to retain data related to by sole virtue of being a transit provider. Activities beyond pure transit provision An ISP that operates end-point services, rather than merely carrying Internet traffic, goes beyond the status of a transit provider with regard to those services, for the purpose of this analysis. An important relevant example of this would be where the ISP operates a mail server that receives the , and retransmits it to a new address or addresses. Such an ISP will be considered an Relay with respect to such a communication. An relay is not considered a Transit Provider for the purposes of this analysis, and in the case of will incur additional obligations under the Directive. 2 It is outside the scope of this document to consider how the retention obligation is to be discharged by the Access Provider when that role is split between more than one entity. Page 11 of 12
12 Disclaimer The views and opinions expressed in this document are not necessarily shared by all Members of the Expert Group "the Platform for Electronic Data Retention for the investigation, detection and prosecution of serious crime" and do not constitute legal advice. For details about the origin and status of the guidance contained in this document refer to the accompanying document "Introduction to the Series". The opinions expressed in this document do not necessarily reflect the views of the European Commission which accepts no responsibility or liability whatsoever with regard to its contents. Page 12 of 12
DATRET/EXPGRP (2009) 6 FINAL 11 10 2010. Document 6
DATRET/EXPGRP (2009) 6 FINAL 11 10 2010 EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC
ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive
October 2005 ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive INTRODUCTION 1.- Purpose of the document This document
Position Paper 4. Closer understanding of the term third party networks and service providers" in relation to its application in Directive 2006/24/EC
DATRET/EXPGRP (2009) 4 FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC
COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 21.9.2005 COM(2005) 438 final 2005/0182 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the retention of data processed
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses
IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public
Matrix Technical Support Mailer 27 SIP to SIP & SIP to PSTN calling through SIP Registrar (ITSP)
Matrix Technical Support Mailer 27 SIP to SIP & SIP to PSTN calling through SIP Registrar (ITSP) 21/06/2011 Dear Friends, This Mailer Provides the Information Related to SIP to SIP Calling Through SIP
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Written Testimony of John L. Barnes Director of Product Development Verizon Business. Hearing on VoIP: Who Has Jurisdiction to Tax It?
Written Testimony of John L. Barnes Director of Product Development Verizon Business Hearing on VoIP: Who Has Jurisdiction to Tax It? House Committee on the Judiciary Subcommittee on Commercial and Administrative
European Commission Consultation document on Voice over IP
STELLUNGNAHME European Commission Consultation document on Voice over IP This paper provides the eco comment on the European Commission consultation document. eco is the association of German internet
Securing Internet Payments. The current regulatory state of play
Securing Internet Payments The current regulatory state of play In recent years the European Union (EU) institutions have shown a growing interest on the security of electronic payments. This interest
Network Address Translation (NAT) Good Practice Guideline
Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell
EUROPEAN UNION. Brussels, 12 July 2002 (OR. en) PE-CONS 3636/02 2000/0189 (COD) LEX 365 ECO 217 CODEC 778
EUROPEAN UNION THE EUROPEAN PARLIAMT THE COUNCIL Brussels, 12 July 2002 (OR. en) 2000/0189 (COD) LEX 365 PE-CONS 3636/02 ECO 217 CODEC 778 DIRECTIVE 2002/58/EC OF THE EUROPEAN PARLIAMT AND OF THE COUNCIL
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA Updated: 20 Jun 2015 (substitutes previous versions) This Privacy Policy describes
IP Voice Reseller. Deliver the VoIP services your customers demand without costly infrastructure investment or increased management complexity.
BT One for Communications IP Voice Reseller Deliver the VoIP services your customers demand without costly infrastructure investment or increased management complexity. We manage the technology to enable
ARTICLE 29 Data Protection Working Party
ARTICLE 29 Data Protection Working Party 11601/EN WP 90 Opinion 5/2004 on unsolicited communications for marketing purposes under Article 13 of Directive 2002/58/EC Adopted on 27 February 2004 This Working
Guidelines for VoIP Service Providers
Consultation Document Austrian Regulatory Authority for Broadcasting and Telecommunications (RTR-GmbH) Vienna April 2005 Executive Summary This consultation document aims to clarify the position of the
TAXONOMY OF TELECOM TERMS
TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe
Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS
Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS Section 1. Interpretation. 2. Non-application of Act. 3. Obligation to retain data. 4. Data security. 5. Access to data.
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION These Guidelines apply to all Licensees providing Internet access services or any other Internet Protocol
Reference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE
SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE The following terms and conditions are additional to those in the prevailing Viatel General Terms and
The treatment of Voice over Internet Protocol (VoIP) under the EU Regulatory Framework
The treatment of Voice over Internet Protocol (VoIP) under the EU Regulatory Framework Response from the UK s Internet Telephony Service Providers Association (ITSPA) About ITSPA This response is on behalf
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
Voice over IP is Transforming Business Communications
White Paper Voice over IP is Transforming Business Communications Voice over IP (VoIP) is changing the world of telecommunications. It entails the transmission of voice calls over data networks that support
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING 20 APRIL 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Feature and Technical
BlackBerry Mobile Voice System for SIP Gateways and the Avaya Aura Session Manager Version: 5.3 Feature and Technical Overview Published: 2013-06-19 SWD-20130619135120555 Contents 1 Overview...4 2 Features...5
ENTERPRISE VOICE SERVICE TERMS. Enterprise Voice Service Terms
Enterprise Voice Service Terms Contents 1. How these Service Terms work... 3 2. Our Obligations... 3 3. Your Obligations... 3 4. Emergency Calls... 4 5. Service Constraints... 4 6. Number Porting... 5
Click here for Explanatory Memorandum
Click here for Explanatory Memorandum AN BILLE CUMARSÁIDE (SONRAÍ A CHOIMEÁD) 2009 COMMUNICATIONS (RETENTION OF DATA) BILL 2009 Section 1. Interpretation. Mar a tionscnaíodh As initiated ARRANGEMENT OF
RONAN TELEPHONE COMPANY BROADBAND PROVIDER DISCLOSURES November 20, 2011
RONAN TELEPHONE COMPANY BROADBAND PROVIDER DISCLOSURES November 20, 2011 Ronan Telephone Company (RTC) provides fixed wireline broadband services over Digital Subscriber Line (DSL) and fiber platforms
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
Network Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
Technical White Paper
Instant APN Technical White Paper Introduction AccessMyLan Instant APN is a hosted service that provides access to a company network via an Access Point Name (APN) on the AT&T mobile network. Any device
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
Integrating a Hitachi IP5000 Wireless IP Phone
November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition
BT Master Services Agreement VOIP Obligations Annex to the General Services Schedule
1 Definitions ALI means automatic location information. ANI means automatic number information. Basic 911 service means an emergency calling service that routes a 911 call (911 is the number a User calls
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
What would you like to protect?
Network Security What would you like to protect? Your data The information stored in your computer Your resources The computers themselves Your reputation You risk to be blamed for intrusions or cyber
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Licensing Options for Internet Service Providers June 23, 2001 Updated September 25, 2002
Licensing Options for Internet Service Providers June 23, 2001 Updated September 25, 2002 Some countries require Internet Service Providers ( ISPs ) to obtain government- issued licenses before commencing
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
How To Regulate Voice Over Internet Protocol (Voip) In The Uk
Introduction This note is intended to provide informal guidance for companies who are using Voice over Internet Protocol (VoIP) technology to deliver communications services to customers. The guidance
Methods for Lawful Interception in IP Telephony Networks Based on H.323
Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering
Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security
Chapter 12 Network Security Security Policy Life Cycle A method for the development of a comprehensive network security policy is known as the security policy development life cycle (SPDLC). Network Security
Com.X Router/Firewall Module. Use Cases. White Paper. Version 1.0, 21 May 2014. 2014 Far South Networks
Com.X Router/Firewall Module Use Cases White Paper Version 1.0, 21 May 2014 2014 Far South Networks Document History Version Date Description of Changes 1.0 2014/05/21 Preliminary 2014 Far South Networks
Southern Law Center Law Center Policy #IT0004. Title: Email Policy
Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of
UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures
Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic
Broadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
4-column document Net neutrality provisions (including recitals)
4-column document Net neutrality provisions (including recitals) [Text for technical discussions. It does not express any position of the Commission or its services] Proposal for a REGULATION OF THE EUROPEAN
VoIP telephony over internet
VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)
Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014
Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014 [Type text] As the limited number of remaining IPv4 addresses are allocated to ISPs, it is becoming increasingly
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya
3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.
THE IDENTIFIED EMERGING POLICY RESPONSES 1. INSERT Traffic shaping 2. The UK Parliament is presently considering introducing technical measures to tackle the problem of unlawful peer-to-peer (P2P) file-sharing.
Configuring Positron s V114 as a VoIP gateway for a 3cx system
Assumptions: Configuring Positron s V114 as a VoIP gateway for a 3cx system The IP address of the V114 is 192.168.1.2 The IP address of the 3CX PBX System is 192.168.1.110 3CX already has some IP phones
Firewalls (IPTABLES)
Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context
Unified Lync Voice, Hosted IP, PBX or SIP-Trunk Service Document
Unified Lync Voice, Hosted IP, PBX or SIP-Trunk Service Document 1. How these Terms and Conditions work 1.1 This Service Document shall form part of the Agreement and shall apply to the Hosted IP Telephony
ADDITIONAL TERMS FOR ENTERPRISE VOICE SERVICES SCHEDULE 2K
ADDITIONAL TERMS FOR ENTERPRISE VOICE SERVICES SCHEDULE 2K CONTENTS 1 Service Description... 3 2 Definitions... 3 3 Services Terms... 4 3.1 Interoute One Termination Service... 4 3.2 Inbound Number Service...
CONSULTATION. National Numbering Plan Review. A short Consultation issued by the Telecommunications Regulatory Authority 28 August 2007
National Numbering Plan Review A short Consultation issued by the Telecommunications Regulatory Authority 28 August 2007 The address for responses to this document is: The General Director, Telecommunications
Trust Operational Policy. Information Security Department. Third Party Remote Access Policy
Trust Operational Policy Information Security Department Policy Reference: 3631 Document Control Document Title Author/Contact Document Reference 3631 Pauline Nordoff-Tate, Information Assurance Manager
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
VoIP Regulation Klaus Nieminen Helsinki University of Technology [email protected]
VoIP Regulation Klaus Nieminen Helsinki University of Technology [email protected] Abstract Voice over IP (VoIP) is currently the uppermost telecommunication regulatory question globally. The purpose
Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University
Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier
EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199
EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of
Opinion 04/2012 on Cookie Consent Exemption
ARTICLE 29 DATA PROTECTION WORKING PARTY 00879/12/EN WP 194 Opinion 04/2012 on Cookie Consent Exemption Adopted on 7 June 2012 This Working Party was set up under Article 29 of Directive 95/46/EC. It is
White Paper. SIP Trunking. Abstract
White Paper SIP Trunking Abstract This paper provides a brief description of SIP Trunks, how they are deployed and the benefits widely put forward in the marketplace as a reason for adopting them. Analysts
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:
Policy Statement: NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION The following policies apply to mass market broadband Internet services offered by NineStar Connect. NineStar
1. Public Switched Telephone Networks vs. Internet Protocol Networks
Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
2 Voice over IP Network
2 Voice over IP Network VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 8 2.1 VoIP Network Elements...3 2.2 Single-Site VoIP Location...4 2.3 Multi-Site VoIP Location...5 2.4 PBX Networking
AASTMT Acceptable Use Policy
AASTMT Acceptable Use Policy Classification Information Security Version 1.0 Status Not Active Prepared Department Computer Networks and Data Center Approved Authority AASTMT Presidency Release Date 19/4/2015
