Telecommunications (Interception Capability and Security) Act 2013

Interception capability duties - Duty to have full interception capability

10: When duty to have full interception capability is complied with

You could also call this:

"When phone and internet companies must help intercept communications"

Illustration for Telecommunications (Interception Capability and Security) Act 2013

You need to know what a public telecommunications network or a telecommunications service can do. It must be able to identify and intercept telecommunications without intercepting ones that are not allowed. It must also obtain traffic data and the content of telecommunications in a useable format. You should be aware that a network operator must decrypt a telecommunication if the content has been encrypted and the operator provided the encryption. However, the operator does not have to decrypt a telecommunication if the encryption was provided by someone else. The operator must provide traffic data or the content of the telecommunication to the surveillance agency. In this law, traffic data means information that identifies the nature of a telecommunication, and useable format means a format that is acceptable to the network operator and the surveillance agency, as determined by a notice issued under section 42, or a format that is acceptable to the network operator and the surveillance agency. You can find more information about traffic data in section 3AB(1)(a)(i). The law also explains what a useable format is.

This text is automatically generated. It might be out of date or be missing some parts. Find out more about how we do this.

This page was last updated on

View the original legislation for this page at https://legislation.govt.nz/act/public/1986/0120/latest/link.aspx?id=DLM5178031.


Previous

9: Network operators must ensure public telecommunications networks and telecommunications services have full interception capability, or

"Network operators must help police intercept telecommunications by making sure their networks can be tapped."


Next

11: Interception ready, or

"Networks must be set up to allow police to intercept communications when needed."

Part 2Interception capability duties
Duty to have full interception capability

10When duty to have full interception capability is complied with

  1. A public telecommunications network or a telecommunications service has full interception capability if every surveillance agency that is authorised under an interception warrant or any other lawful interception authority to intercept telecommunications or services on that network, or the network operator concerned, is able to—

  2. identify and intercept telecommunications without intercepting telecommunications that are not authorised to be intercepted under the warrant or lawful authority; and
    1. obtain traffic data relating to telecommunications (other than telecommunications that are not authorised to be intercepted under the warrant or lawful authority); and
      1. obtain traffic data and the content of telecommunications (other than telecommunications that are not authorised to be intercepted under the warrant or lawful authority) in a useable format; and
        1. carry out the interception of telecommunications unobtrusively, without unduly interfering with any telecommunications, and in a manner that protects the privacy of telecommunications that are not authorised to be intercepted under the warrant or lawful authority; and
          1. undertake the actions referred to in paragraphs (a) to (d) efficiently and effectively and,—
            1. if it is reasonably achievable, at the time of transmission of the telecommunication; or
              1. if it is not reasonably achievable, as close as practicable to that time.
              2. If a network operator, or an employee or agent of a network operator, undertakes the interception of a telecommunication on behalf of a surveillance agency under subsection (1), the interception must be taken to be complete when the network operator provides the traffic data or the content of the telecommunication, or both, to the surveillance agency.

              3. Nothing in subsection (1)(b) or (c) requires a network operator to be able to obtain specified traffic data relating to a telecommunication carried over a public data network that they own, control, or operate to the extent that the telecommunication is transmitted using a service that—

              4. is dependent on Internet access; and
                1. is provided by someone other than the network operator.
                  1. Guidance note

                    This subsection relates to telecommunications that pass “over the top” of a public data network using Internet-dependent services provided by a person other than the network operator that owns, controls, or operates the public data network.

                    For example, an effect of this subsection is that the network operator is not required to be able to obtain information that identifies the nature of a telecommunication as an email or instant message if the network operator does not provide a related email or instant messaging service.

                  2. A network operator must, in order to comply with subsection (1)(c), decrypt a telecommunication on that operator's public telecommunications network or telecommunications service if—

                  3. the content of that telecommunication has been encrypted; and
                    1. the network operator intercepting the telecommunication has provided that encryption.
                      1. However, subsection (3) does not require a network operator to—

                      2. decrypt any telecommunication on that operator's public telecommunications network or telecommunications service if the encryption has been provided by means of a product that is—
                        1. supplied by a person other than the operator and is available to the public; or
                          1. supplied by the operator as an agent for that product; and
                          2. ensure that a surveillance agency has the ability to decrypt any telecommunication.
                            1. In this section,—

                              specified traffic data, in relation to a telecommunication, means traffic data that identifies the nature of the telecommunication (see section 3AB(1)(a)(i))

                                useable format means—

                                1. a format that is determined by a notice issued under section 42; or
                                  1. a format that is acceptable to the network operator and the surveillance agency executing the interception warrant or other lawful interception authority.

                                  Notes
                                  • Section 10(1)(b): amended, on , by section 51(1) of the Budapest Convention and Related Matters Legislation Amendment Act 2025 (2025 No 39).
                                  • Section 10(1)(c): amended, on , by section 51(1) of the Budapest Convention and Related Matters Legislation Amendment Act 2025 (2025 No 39).
                                  • Section 10(2): amended, on , by section 51(1) of the Budapest Convention and Related Matters Legislation Amendment Act 2025 (2025 No 39).
                                  • Section 10(2A): inserted, on , by section 51(2) of the Budapest Convention and Related Matters Legislation Amendment Act 2025 (2025 No 39).
                                  • Section 10(5): replaced, on , by section 51(3) of the Budapest Convention and Related Matters Legislation Amendment Act 2025 (2025 No 39).