* [http://www.legifrance.gouv.fr/eli/decret/2015/10/1/JUSC1520448D/jo Decree 2015-1211 of 1 October 2015] on the litigation of the implementation of information technology subject to authorization and interesting files the State security.
* [http://www.legifrance.gouv.fr/eli/decret/2015/10/1/JUSC1520448D/jo Decree 2015-1211 of 1 October 2015] on the litigation of the implementation of information technology subject to authorization and interesting files the State security.
* [https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000031601177 Decree 2015-1639 of 11 December 2015] on the designation of the services other than specialised intelligence services, authorised to use the techniques mentioned title V of book VIII of the code of Homeland security, made under [https://www.legifrance.gouv.fr/affichCodeArticle.do?cidTexte=LEGITEXT000025503132&idArticle=LEGIARTI000030935042 Article L. 811-4 of the Code of domestic internal security].
* [https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000031601177 Decree 2015-1639 of 11 December 2015] on the designation of the services other than specialised intelligence services, authorised to use the techniques mentioned title V of book VIII of the code of Homeland security, made under [https://www.legifrance.gouv.fr/affichCodeArticle.do?cidTexte=LEGITEXT000025503132&idArticle=LEGIARTI000030935042 Article L. 811-4 of the Code of domestic internal security].
−
* [Https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000031940885&categorieLien=id Decree 2016-67 of 29 January 2016] on intelligence collection techniques.
+
* [https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000031940885&categorieLien=id Decree 2016-67 of 29 January 2016] on intelligence collection techniques.
Version du 17 août 2016 à 10:51
On 6 May 2016 a priority question of constitutionality was raised following the appeals lodged against 4 of the 5 aforementioned decrees:
Decree 2015-1211 of 1 October 2015 on the litigation of the implementation of information technology subject to authorization and interesting files the State security.