Quote:
Originally Posted by SelfProtection
It could be both if the profiler itself was also deemed to be an interception of the data stream.
|
I think the tricky bit is the use of the word interception. I'm not using it in any dictionary sense. I'm using it in the context of the Regulation of Investigatory Powers Act. So to convince me that the profiler is intercepting the data stream you'll have to refer to parts of the act and state how each bit relates to phorm.
Perhaps I've missed some important clause. Or maybe I've failed to see how it could be applied in a particular way to a particular part of the phorm system. Please do enlighten me