Telecommunications interception and access regulation framework in the US and the UK
by Nazzal Kisswani
International Journal of Technology Policy and Law (IJTPL), Vol. 1, No. 1, 2012

Abstract: As telecommunication interception and access technology has evolved and become more widely used, the need for effective interception of telecommunications and access laws has increased. Telecommunications interception and access laws need to appropriately balance the need to protect national security, conduct proper criminal investigations and counter terrorism with maintenance of the privacy of the individual. This paper looks at the applicability of regulations and laws aimed at controlling telecommunication interception and access in the USA and the UK. The article then goes on to identify certain areas of weakness in the present laws and presents strategies for strengthening these areas.

Online publication date: Sat, 20-Sep-2014

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Technology Policy and Law (IJTPL):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com