VoIP legislation runs into opposition

Legislation that would except voice over Internet Protocol (VOIP) service from most state and federal regulation has run into...

US legislation that would excempt voice over Internet Protocol (VoIP) service from most state and federal regulation ran into objections from several groups, including the Department of Justice (DOJ), which said the bill could allow terrorists and criminals to circumvent wiretaps.

The VoIP Regulatory Freedom Act of 2004 would exempt VoIP service from a wire-tapping regulation called the Communications Assistance for Law Enforcement Act, or Calea, commonly used to listen in on traditional telephone calls, said Laura Parsky, deputy assistant attorney general for the DOJ's criminal division.

"This type of telephone service [must] not become a haven for criminals, terrorists and spies," said Parsky.

"If any particular technology is singled out for special exemption from these requirements, that technology will quickly attract criminals and create a hole in law enforcement's ability to protect the public and national security."

A bill defining VoIP as an unregulated information service instead of a heavily regulated telecommunications service is needed before dozens of state regulators begin to tax and regulate the promising technology, said supporters of the bill.

The DOJ supports most of the bill, Parsky said, but it doesn't want to lose law-enforcement powers it has now as more traditional telephone traffic is likely to move to VoIP in coming years.

Grant Gross writes for IDG News Service

Read more on IT strategy

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close