Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security and Lawful Intercept (LI)

Similar presentations


Presentation on theme: "Security and Lawful Intercept (LI)"— Presentation transcript:

1 Security and Lawful Intercept (LI)
Contributions from ATIS, ETSI, TIA Highlights Areas highlighted included improving security of RFID, wireless security (LTE, IMS, CDMA, TDMA), Intelligent Transport Systems (ITS) security, Machine-to-Machine security, electronic signatures, LAES for VoIP, Security and LI for Cloud Computing, IMS based POC LAES capabilities, North American updates to 3GPP LAES, Smart Card security, LI and DR standards, equipment numbering ID security, LI for femtocells, and more Responding to regional legal and regulatory frameworks and needs for LI and LAES Next Steps Continue to develop new standards and make revisions to existing standards Continue cross-organizational coordination, collaboration, and liaisons relationships, where appropriate Continue to address the security environment faced by operators and users Continue to address the issues presented in technology area such as internet access, cloud computing, smart grid, and any other emerging technologies. Recommendation Retain HIS for GSC-18 Standards for Shared ICT


Download ppt "Security and Lawful Intercept (LI)"

Similar presentations


Ads by Google