4 Requirements realisation

33.1273GPPLawful Interception (LI) architecture and functionsRelease 18TS

The LI architecture set out in the present document is designed to allow CSP deployments to meet the set of LI requirements described in TS 33.126 [3] that are determined to be applicable by the relevant national regulation for that deployment. For more details on the relationship between LI requirements and national legislation, see TS 33.126 [3] clause 4.

A CSP may deploy different network technologies or services considered in the present document. A CSP should consider each of these network technologies or services separately with respect to the present document, bearing in mind that a different subset of LI requirements may apply according to relevant national legislation, and that a warrant may require the CSP to intercept multiple network technologies or services.