The present document focuses on the support of regulatory requirements for Lawful Interception (LI) and Retained Data (RD) when implementing MEC into the network. It describes the problems@ constraints@ interfaces and additional capabilities needed for the different deployment scenarios@ to ensure full support of LI RD regulatory requirements when implementing MEC.