{"id":20316,"date":"2014-12-16T12:32:13","date_gmt":"2014-12-16T12:32:13","guid":{"rendered":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1\/"},"modified":"2014-12-16T12:32:13","modified_gmt":"2014-12-16T12:32:13","slug":"sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1","status":"publish","type":"gsma_theme_resources","link":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1\/","title":{"rendered":"SG.02 Confidentiality and Restricted Usage Undertaking Related to the A5\/1 Algorithm for Signalling and Data privacy in the GSM System v4.1"},"content":{"rendered":"<p>The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised signatories on behalf of the provider and the beneficiary.\u00a0\u00a0 Any party wishing to receive copies of A5 must sign this document and any party passing copies of the algorithm to third parties must first receive a signed a copy from the beneficiary.<\/p>\n<p><a href=\"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/SG.02-v4.1.pdf\" target=\"_blank\" rel=\"noopener\">Download<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised &#8230;<\/p>\n","protected":false},"author":11,"featured_media":0,"template":"","meta":{"image":null,"json":{"gsma_resources_type":"Document","gsma_resources_thumb":"[]","gsma_resources_file":"[]","gsma_resources_multi":null,"gsma_resources_wgr":null,"gsma_resources_video":null,"gsma_resources_image":"[]","gsma_resources_url":"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/SG.02-v4.1.pdf","gsma_resources_date":"16-12-2014","gsma_resources_button":null}},"tags":[],"resource_categories":[4754,4760],"algolia_discover_state":[6602],"algolia_discover_topic":[6617],"algolia_discover_region":[],"algolia_discover_type":[6631],"algolia_discover_series":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SG.02 Confidentiality and Restricted Usage Undertaking Related to the A5\/1 Algorithm for Signalling and Data privacy in the GSM System v4.1 - Newsroom<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SG.02 Confidentiality and Restricted Usage Undertaking Related to the A5\/1 Algorithm for Signalling and Data privacy in the GSM System v4.1\" \/>\n<meta property=\"og:description\" content=\"The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Newsroom\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gsma\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@GSMA\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SG.02 Confidentiality and Restricted Usage Undertaking Related to the A5\/1 Algorithm for Signalling and Data privacy in the GSM System v4.1 - Newsroom","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1\/","og_locale":"en_GB","og_type":"article","og_title":"SG.02 Confidentiality and Restricted Usage Undertaking Related to the A5\/1 Algorithm for Signalling and Data privacy in the GSM System v4.1","og_description":"The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised ...","og_url":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1\/","og_site_name":"Newsroom","article_publisher":"https:\/\/www.facebook.com\/gsma\/","twitter_card":"summary_large_image","twitter_site":"@GSMA","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1\/","url":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1\/","name":"SG.02 Confidentiality and Restricted Usage Undertaking Related to the A5\/1 Algorithm for Signalling and Data privacy in the GSM System v4.1 - Newsroom","isPartOf":{"@id":"https:\/\/www.gsma.com\/newsroom\/#website"},"datePublished":"2014-12-16T12:32:13+00:00","dateModified":"2014-12-16T12:32:13+00:00","breadcrumb":{"@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-02-confidentiality-and-restricted-usage-undertaking-related-to-the-a51-algorithm-for-signalling-and-data-privacy-in-the-gsm-system-v4-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gsma.com\/newsroom\/"},{"@type":"ListItem","position":2,"name":"SG.02 Confidentiality and Restricted Usage Undertaking Related to the A5\/1 Algorithm for Signalling and Data privacy in the GSM System v4.1"}]},{"@type":"WebSite","@id":"https:\/\/www.gsma.com\/newsroom\/#website","url":"https:\/\/www.gsma.com\/newsroom\/","name":"Newsroom","description":"","publisher":{"@id":"https:\/\/www.gsma.com\/newsroom\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gsma.com\/newsroom\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.gsma.com\/newsroom\/#organization","name":"GSMA","url":"https:\/\/www.gsma.com\/newsroom\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.gsma.com\/newsroom\/#\/schema\/logo\/image\/","url":"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/GSMA_logo_colour_web.jpg","contentUrl":"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/GSMA_logo_colour_web.jpg","width":1000,"height":1000,"caption":"GSMA"},"image":{"@id":"https:\/\/www.gsma.com\/newsroom\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gsma\/","https:\/\/x.com\/GSMA","https:\/\/www.instagram.com\/gsmaonline\/","https:\/\/www.linkedin.com\/company\/12380","https:\/\/www.youtube.com\/user\/GSMAOnline"]}]}},"cats":[{"term_id":4754,"name":"All Documents","slug":"all-documents","term_group":0,"term_taxonomy_id":4757,"taxonomy":"resource_categories","description":"","parent":0,"count":181,"filter":"raw"},{"term_id":6633,"name":"Blog","slug":"blog","term_group":0,"term_taxonomy_id":6636,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":4759,"name":"Configuration","slug":"configuration","term_group":0,"term_taxonomy_id":4762,"taxonomy":"resource_categories","description":"","parent":5080,"count":2,"filter":"raw"},{"term_id":6368,"name":"COVID-19","slug":"covid-19","term_group":0,"term_taxonomy_id":6371,"taxonomy":"resource_categories","description":"","parent":0,"count":5,"filter":"raw"},{"term_id":4760,"name":"Fraud and Security Group","slug":"fraud-and-security-group","term_group":0,"term_taxonomy_id":4763,"taxonomy":"resource_categories","description":"","parent":5081,"count":10,"filter":"raw"},{"term_id":4762,"name":"GSMA Corporate Documents","slug":"gsma-corporate-documents","term_group":0,"term_taxonomy_id":4765,"taxonomy":"resource_categories","description":"","parent":5080,"count":2,"filter":"raw"},{"term_id":4761,"name":"Internet Group","slug":"web-working-group","term_group":0,"term_taxonomy_id":4764,"taxonomy":"resource_categories","description":"","parent":5081,"count":6,"filter":"raw"},{"term_id":4764,"name":"Market Intelligence","slug":"market-intelligence","term_group":0,"term_taxonomy_id":4767,"taxonomy":"resource_categories","description":"","parent":5080,"count":7,"filter":"raw"},{"term_id":4758,"name":"Networks Group","slug":"networks-group","term_group":0,"term_taxonomy_id":4761,"taxonomy":"resource_categories","description":"","parent":5081,"count":55,"filter":"raw"},{"term_id":4763,"name":"OMTP Documents","slug":"omtp-documents","term_group":0,"term_taxonomy_id":4766,"taxonomy":"resource_categories","description":"","parent":5080,"count":5,"filter":"raw"},{"term_id":6600,"name":"Post Quantum Telco Network","slug":"post-quantum-telco-network","term_group":0,"term_taxonomy_id":6603,"taxonomy":"resource_categories","description":"","parent":5081,"count":0,"filter":"raw"},{"term_id":6599,"name":"Post Quantum Telco Network Task Force","slug":"post-quantum-telco-network-task-force","term_group":0,"term_taxonomy_id":6602,"taxonomy":"resource_categories","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":4757,"name":"SIM Working Group","slug":"sim-working-group","term_group":0,"term_taxonomy_id":4760,"taxonomy":"resource_categories","description":"","parent":5081,"count":25,"filter":"raw"},{"term_id":4755,"name":"Technical Documents","slug":"technical-documents","term_group":0,"term_taxonomy_id":4758,"taxonomy":"resource_categories","description":"","parent":5080,"count":34,"filter":"raw"},{"term_id":4756,"name":"Terminal Steering Group","slug":"terminal-steering-group","term_group":0,"term_taxonomy_id":4759,"taxonomy":"resource_categories","description":"","parent":5081,"count":32,"filter":"raw"},{"term_id":5080,"name":"Type","slug":"type","term_group":0,"term_taxonomy_id":5083,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":5086,"name":"Web Working Group","slug":"web-working-group-2","term_group":0,"term_taxonomy_id":5089,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":5081,"name":"Working Group","slug":"working-group","term_group":0,"term_taxonomy_id":5084,"taxonomy":"resource_categories","description":"","parent":0,"count":4,"filter":"raw"}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources\/20316"}],"collection":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources"}],"about":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/types\/gsma_theme_resources"}],"author":[{"embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/users\/11"}],"version-history":[{"count":0,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources\/20316\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/media?parent=20316"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/tags?post=20316"},{"taxonomy":"resource_categories","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/resource_categories?post=20316"},{"taxonomy":"algolia_discover_state","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_state?post=20316"},{"taxonomy":"algolia_discover_topic","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_topic?post=20316"},{"taxonomy":"algolia_discover_region","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_region?post=20316"},{"taxonomy":"algolia_discover_type","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_type?post=20316"},{"taxonomy":"algolia_discover_series","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_series?post=20316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}