TIA Subcommittee TR

advertisement
TR-45.6 LIG/2007.05.15.09
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
TIA Subcommittee TR-45.6
Adjunct Wireless Packet Data Standards
TITLE: Proposed Text Changes to 5.5.2 Confidentiality and Access Control
Source
Scott Sheets
Verizon Wireless
500 W. Dove Rd.
Southlake, TX 76092
682-831-3363
scott.sheets@verizonwireless.com
Abstract
This contribution proposes changes to section 5.5.2 Confidentiality and Access
Control regarding access to or knowledge of interception equipment and capabilities.
Recommendation
TR-45.6 discuss and agree on the proposed text changes.
The contributor grants a free, irrevocable license to the Telecommunications Industry Association (TIA) to incorporate text
contained in this contribution and any modifications thereof in the creation of a TIA Publication; to copyright and sell in TIA's
name any TIA Publication even though it may include all or portions of this contribution; and at TIA's sole discretion to permit
others to reproduce in whole or in part such contribution or the resulting TIA Publication.
This document has been prepared by the contributors to assist the TIA/EIA TR45.6 Subcommittee. It is proposed to the Committee
as a basis for discussion and is not to be construed as a binding proposal on the contributors. The contributor specifically reserves
the right to amend or modify the material contained herein. Nothing contained herein shall be construed as conferring by
implication, estoppel, or otherwise any license or right under any patent, whether or not the use of information herein necessarily
employs an invention of any existing or later issued patent.
The company represented by this individual may have patents or published pending patent applications, the use of which may be
essential to the practice of all or part of this contribution incorporated in a TIA Publication and the company represented by this
individual is willing to grant a license to applicants for such intellectual property contained in this contribution in a manner
consistent with 2a) or 2b) of Annex H of the TIA Engineering Manual.
TR-45.6 LIG/2007.05.15.09
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Background
Authorized persons is not a defined term and as used in the first paragraph of
this section as “non-authorized persons” suggests it refers to a small subset of
personnel at the SP who deal directly with and have knowledge of the specific
targets under surveillance. The second paragraph below limits the knowledge of
the interception capabilities and the interception related equipment to these same
personnel. While this concept is accurate as it relates to the knowledge of actual
targets under surveillance, it is not accurate with regards to knowledge of
intercept related equipment and intercept capabilities. Additionally, in order to
perform normal maintenance and monitoring of health of the intercept related
equipment, access to the intercept related equipment is expanded to authorized
employees outside of the small subset of personnel authorized to have
knowledge of targets under surveillance. Note that the database’s containing
information on targets under surveillance are protected from access by anyone
other than the smallest subset of “authorized employees”.
20
5.5.2
21
22
23
24
25
26
27
28
29
30
31
32
33
The fact that an interception is being conducted must be undetectable to all nonauthorized employees of the SP as well as to all other non-authorized persons.
Proposed Modifications to the Working Document
Confidentiality and Access Control
Access to, or knowledge of, an intercept, interception capabilities, interceptrelated equipment, and intercepted communications and data must be protected
and limited to only authorized persons or employees with a need to know in order
to perform their job responsibilities. Knowledge of interception capabilities and
intercept related equipment beyond the subset of authorized employees with
knowledge of actual surveillance or intercept information is acceptable in order to
support normal business activities (e.g., normal maintenance, monitoring of the
health of the intercept related equipment, planning).
2
Download