<spanid="_ref_i.3"></span><aname="_ref_i.3">[i.3]</a> [ETSI TS 103 307](https://www.etsi.org/): \"CYBER; Security Aspects for LI and RD Interfaces\".
<spanid="_ref_i.4"></span><aname="_ref_i.4">[i.4]</a> [ETSI TS 103 280](https://www.etsi.org/): \"Lawful Interception (LI); Dictionary for common parameters\".
<spanid="_ref_i.5"></span><aname="_ref_i.5">[i.5]</a> [ETSI TS 103 705](https://www.etsi.org/): \"Lawful Interception (LI); Data Structures for Lawful Disclosure\".
## 2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or nonspecific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies.
@@ -73,11 +84,11 @@ The following referenced documents may be useful in implementing an ETSI deliver
For the purposes of the present document, the terms given in ETSI TS 103 976 [i.1] and the following apply:
Authorized Organization (AO): any organization legally authorized to make requests and receive results
**Authorized Organization (AO):** any organization legally authorized to make requests and receive results
Provider: The organization responding to a request (the organization that includes the Request Processing System)
**Provider:** The organization responding to a request (the organization that includes the Request Processing System)
Request Processing System (RPS): system within an organization which holds the data that is subject to the request where there is a lawful reason for it to respond to requests for information
**Request Processing System (RPS):** system within an organization which holds the data that is subject to the request where there is a lawful reason for it to respond to requests for information