Abstract
The document focuses on the support of regulatory requirements for Lawful Interception (LI) and Retained Data (RD) when implementing MEC into the network. It describes the problems, constraints, interfaces and additional capabilities needed for the different deployment scenarios, to ensure full support of LI and RD regulatory requirements when implementing MEC.
Associated Landscape report
ICT rolling plan topic
Cloud and Edge Computing
SDO
ETSI
Standard/Working group
Standard
Standard Number
ETSI GS MEC 026 V2.1.1 (2019-01)