{"id":20311,"date":"2014-12-23T12:37:03","date_gmt":"2014-12-23T12:37:03","guid":{"rendered":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2\/"},"modified":"2014-12-23T12:37:03","modified_gmt":"2014-12-23T12:37:03","slug":"sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2","status":"publish","type":"gsma_theme_resources","link":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2\/","title":{"rendered":"SG.13 Confidentiality and Restricted Usage Undertaking Related to Test Data for the cipher algorithm A5 v3.2"},"content":{"rendered":"<p>The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised signatories on behalf of the provider and the beneficiary.\u00a0\u00a0 Any party wishing to receive copies of A5 for EDGE must sign this document and any party passing copies of the algorithm to third parties must first receive a signed a copy from the beneficiary.<\/p>\n<p><a href=\"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/SG.13-v3.2.pdf\" target=\"_blank\" rel=\"noopener\">Download<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised &#8230;<\/p>\n","protected":false},"author":11,"featured_media":0,"template":"","meta":{"image":null,"json":{"gsma_resources_type":"Document","gsma_resources_thumb":"[]","gsma_resources_file":"[]","gsma_resources_multi":null,"gsma_resources_wgr":null,"gsma_resources_video":null,"gsma_resources_image":"[]","gsma_resources_url":"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/SG.13-v3.2.pdf","gsma_resources_date":"23-12-2014","gsma_resources_button":null}},"tags":[],"resource_categories":[4754,4760],"algolia_discover_state":[6602],"algolia_discover_topic":[6617],"algolia_discover_region":[],"algolia_discover_type":[6631],"algolia_discover_series":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SG.13 Confidentiality and Restricted Usage Undertaking Related to Test Data for the cipher algorithm A5 v3.2 - Newsroom<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SG.13 Confidentiality and Restricted Usage Undertaking Related to Test Data for the cipher algorithm A5 v3.2\" \/>\n<meta property=\"og:description\" content=\"The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Newsroom\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gsma\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@GSMA\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SG.13 Confidentiality and Restricted Usage Undertaking Related to Test Data for the cipher algorithm A5 v3.2 - Newsroom","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2\/","og_locale":"en_GB","og_type":"article","og_title":"SG.13 Confidentiality and Restricted Usage Undertaking Related to Test Data for the cipher algorithm A5 v3.2","og_description":"The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised ...","og_url":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2\/","og_site_name":"Newsroom","article_publisher":"https:\/\/www.facebook.com\/gsma\/","twitter_card":"summary_large_image","twitter_site":"@GSMA","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2\/","url":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2\/","name":"SG.13 Confidentiality and Restricted Usage Undertaking Related to Test Data for the cipher algorithm A5 v3.2 - Newsroom","isPartOf":{"@id":"https:\/\/www.gsma.com\/newsroom\/#website"},"datePublished":"2014-12-23T12:37:03+00:00","dateModified":"2014-12-23T12:37:03+00:00","breadcrumb":{"@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-13-confidentiality-and-restricted-usage-undertaking-related-to-test-data-for-the-cipher-algorithm-a5-v3-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gsma.com\/newsroom\/"},{"@type":"ListItem","position":2,"name":"SG.13 Confidentiality and Restricted Usage Undertaking Related to Test Data for the cipher algorithm A5 v3.2"}]},{"@type":"WebSite","@id":"https:\/\/www.gsma.com\/newsroom\/#website","url":"https:\/\/www.gsma.com\/newsroom\/","name":"Newsroom","description":"","publisher":{"@id":"https:\/\/www.gsma.com\/newsroom\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gsma.com\/newsroom\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.gsma.com\/newsroom\/#organization","name":"GSMA","url":"https:\/\/www.gsma.com\/newsroom\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.gsma.com\/newsroom\/#\/schema\/logo\/image\/","url":"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/GSMA_logo_colour_web.jpg","contentUrl":"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/GSMA_logo_colour_web.jpg","width":1000,"height":1000,"caption":"GSMA"},"image":{"@id":"https:\/\/www.gsma.com\/newsroom\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gsma\/","https:\/\/x.com\/GSMA","https:\/\/www.instagram.com\/gsmaonline\/","https:\/\/www.linkedin.com\/company\/12380","https:\/\/www.youtube.com\/user\/GSMAOnline"]}]}},"cats":[{"term_id":4754,"name":"All Documents","slug":"all-documents","term_group":0,"term_taxonomy_id":4757,"taxonomy":"resource_categories","description":"","parent":0,"count":181,"filter":"raw"},{"term_id":6633,"name":"Blog","slug":"blog","term_group":0,"term_taxonomy_id":6636,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":4759,"name":"Configuration","slug":"configuration","term_group":0,"term_taxonomy_id":4762,"taxonomy":"resource_categories","description":"","parent":5080,"count":2,"filter":"raw"},{"term_id":6368,"name":"COVID-19","slug":"covid-19","term_group":0,"term_taxonomy_id":6371,"taxonomy":"resource_categories","description":"","parent":0,"count":5,"filter":"raw"},{"term_id":4760,"name":"Fraud and Security Group","slug":"fraud-and-security-group","term_group":0,"term_taxonomy_id":4763,"taxonomy":"resource_categories","description":"","parent":5081,"count":10,"filter":"raw"},{"term_id":4762,"name":"GSMA Corporate Documents","slug":"gsma-corporate-documents","term_group":0,"term_taxonomy_id":4765,"taxonomy":"resource_categories","description":"","parent":5080,"count":2,"filter":"raw"},{"term_id":4761,"name":"Internet Group","slug":"web-working-group","term_group":0,"term_taxonomy_id":4764,"taxonomy":"resource_categories","description":"","parent":5081,"count":6,"filter":"raw"},{"term_id":4764,"name":"Market Intelligence","slug":"market-intelligence","term_group":0,"term_taxonomy_id":4767,"taxonomy":"resource_categories","description":"","parent":5080,"count":7,"filter":"raw"},{"term_id":4758,"name":"Networks Group","slug":"networks-group","term_group":0,"term_taxonomy_id":4761,"taxonomy":"resource_categories","description":"","parent":5081,"count":55,"filter":"raw"},{"term_id":4763,"name":"OMTP Documents","slug":"omtp-documents","term_group":0,"term_taxonomy_id":4766,"taxonomy":"resource_categories","description":"","parent":5080,"count":5,"filter":"raw"},{"term_id":6600,"name":"Post Quantum Telco Network","slug":"post-quantum-telco-network","term_group":0,"term_taxonomy_id":6603,"taxonomy":"resource_categories","description":"","parent":5081,"count":0,"filter":"raw"},{"term_id":6599,"name":"Post Quantum Telco Network Task Force","slug":"post-quantum-telco-network-task-force","term_group":0,"term_taxonomy_id":6602,"taxonomy":"resource_categories","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":4757,"name":"SIM Working Group","slug":"sim-working-group","term_group":0,"term_taxonomy_id":4760,"taxonomy":"resource_categories","description":"","parent":5081,"count":25,"filter":"raw"},{"term_id":4755,"name":"Technical Documents","slug":"technical-documents","term_group":0,"term_taxonomy_id":4758,"taxonomy":"resource_categories","description":"","parent":5080,"count":34,"filter":"raw"},{"term_id":4756,"name":"Terminal Steering Group","slug":"terminal-steering-group","term_group":0,"term_taxonomy_id":4759,"taxonomy":"resource_categories","description":"","parent":5081,"count":32,"filter":"raw"},{"term_id":5080,"name":"Type","slug":"type","term_group":0,"term_taxonomy_id":5083,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":5086,"name":"Web Working Group","slug":"web-working-group-2","term_group":0,"term_taxonomy_id":5089,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":5081,"name":"Working Group","slug":"working-group","term_group":0,"term_taxonomy_id":5084,"taxonomy":"resource_categories","description":"","parent":0,"count":4,"filter":"raw"}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources\/20311"}],"collection":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources"}],"about":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/types\/gsma_theme_resources"}],"author":[{"embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/users\/11"}],"version-history":[{"count":0,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources\/20311\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/media?parent=20311"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/tags?post=20311"},{"taxonomy":"resource_categories","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/resource_categories?post=20311"},{"taxonomy":"algolia_discover_state","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_state?post=20311"},{"taxonomy":"algolia_discover_topic","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_topic?post=20311"},{"taxonomy":"algolia_discover_region","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_region?post=20311"},{"taxonomy":"algolia_discover_type","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_type?post=20311"},{"taxonomy":"algolia_discover_series","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_series?post=20311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}