Quote:
Originally Posted by SMHarman
How do you monitor something without intercepting it?
|
From RIPA with my bold:
Quote:
(2) For the purposes of this Act, but subject to the following provisions of this section, a person intercepts a communication in the course of its transmission by means of a telecommunication system if, and only if, he—
(a) so modifies or interferes with the system, or its operation,
(b) so monitors transmissions made by means of the system, or
(c) so monitors transmissions made by wireless telegraphy to or from apparatus comprised in the system,
as to make some or all of the contents of the communication available, while being transmitted, to a person other than the sender or intended recipient of the communication.
|
I think I can see one way around this definition but I don't want to help the opposition and I'm not a lawyer either.
---------- Post added at 14:32 ---------- Previous post was at 14:17 ----------
Pretty good article on ZDNet:
http://news.zdnet.co.uk/security/0,1...48963-1,00.htm
Note there are 6 pages of text - 1 with each photo.
Edit: I see DaveTheJag beat me to that one.