Commit f37ef65b authored by Mark Shepherd's avatar Mark Shepherd
Browse files

Update file TR_104196.md

parent 00626c47
Loading
Loading
Loading
Loading
Loading
+9 −9
Original line number Diff line number Diff line
@@ -56,25 +56,25 @@ The present document describes considerations for situations in which providers
Normative references are not applicable in the present document.


<span id="_ref_i.1"></span><a name="_ref_i.1">[i.1]</a> [ETSI TS 103 976](https://www.etsi.org/): \"Interface for Lawful Disclosure of vehicle-related data\".

<span id="_ref_i.2"></span><a name="_ref_i.2">[i.2]</a> [ETSI TS 103 120](https://www.etsi.org/): \"Lawful Interception (LI); Interface for warrant information\".
## 2.2 Informative references

<span id="_ref_i.3"></span><a name="_ref_i.3">[i.3]</a> [ETSI TS 103 307](https://www.etsi.org/): \"CYBER; Security Aspects for LI and RD Interfaces\".
References are either specific (identified by date of publication and/or edition number or version number) or nonspecific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies.

<span id="_ref_i.4"></span><a name="_ref_i.4">[i.4]</a> [ETSI TS 103 280](https://www.etsi.org/): \"Lawful Interception (LI); Dictionary for common parameters\".
> NOTE:    While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity.

<span id="_ref_i.5"></span><a name="_ref_i.5">[i.5]</a> [ETSI TS 103 705](https://www.etsi.org/): \"Lawful Interception (LI); Data Structures for Lawful Disclosure\".
The following referenced documents may be useful in implementing an ETSI deliverable or add to the reader's understanding but are not required for conformance to the present document.


## 2.2 Informative references
<span id="_ref_i.1"></span><a name="_ref_i.1">[i.1]</a> [ETSI TS 103 976](https://www.etsi.org/): \"Interface for Lawful Disclosure of vehicle-related data\".

References are either specific (identified by date of publication and/or edition number or version number) or nonspecific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies.
<span id="_ref_i.2"></span><a name="_ref_i.2">[i.2]</a> [ETSI TS 103 120](https://www.etsi.org/): \"Lawful Interception (LI); Interface for warrant information\".

> NOTE:    While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity.
<span id="_ref_i.3"></span><a name="_ref_i.3">[i.3]</a> [ETSI TS 103 307](https://www.etsi.org/): \"CYBER; Security Aspects for LI and RD Interfaces\".

The following referenced documents may be useful in implementing an ETSI deliverable or add to the reader's understanding but are not required for conformance to the present document.
<span id="_ref_i.4"></span><a name="_ref_i.4">[i.4]</a> [ETSI TS 103 280](https://www.etsi.org/): \"Lawful Interception (LI); Dictionary for common parameters\".

<span id="_ref_i.5"></span><a name="_ref_i.5">[i.5]</a> [ETSI TS 103 705](https://www.etsi.org/): \"Lawful Interception (LI); Data Structures for Lawful Disclosure\".