{"id":1612,"date":"2015-06-30T11:19:37","date_gmt":"2015-06-30T15:19:37","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=1612"},"modified":"2015-06-30T12:27:35","modified_gmt":"2015-06-30T16:27:35","slug":"wtdc-2014_22","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/wtdc\/wtdc-2014\/wtdc-2014_22\/","title":{"rendered":"WTDC Resolution 22"},"content":{"rendered":"<p><style type=\"text\/css\">\nbody {}\n\n:link { color: #0000ff; text-decoration:none;}\n:visited { color: #6666ff; text-decoration:none; }\na:active { color: #0000ff; text-decoration:none;}\na:hover {color: #0000ff; text-decoration:underline; }\n\ndiv.basetext {}\n\ndiv.basetop {}\n\nh1 {\n    text-align:center;\n}\n\nspan.h2 {}\n\ndiv.year {}\n\ndiv.form {}\n\nspan.cpt {}\n\nspan.cm {}\n\n.fl {}\n\nul {}\n\nli {}\n\nul li {\n\tlist-style:square;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n\nli.basic {\n\tlist-style:square;\n\tlist-style-image:none;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\nspan.links {\n}\n\n\n\n\n.sub { display: none; }\n.subexp {display: block; }\n.sub { display: none; } \n\n.subexp {display: block; } \n\nli.exp {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.col {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.exp_active {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;  \n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer;\n}\n\nli.col_active {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer; \/* if not included, bullets are not shown right in moz*\/\n}\n\n\nli.basic_active {\n  list-style:square;\n  list-style-image:none;\n  background-color:#eeeeff;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\n\/* the 'boxed' and 'attributes' styles are used to display notes and attributes\n*\/\n\n.boxed,.nodecontent {display:inline;}\n.boxed .note-and-attributes {display:none;}\n\n.boxed:hover .note-and-attributes {\n\tposition:fixed; top:2em;right:10px;z-index:3;\n\tdisplay:block;\n\tmin-width:33%;\n\tmax-width:60%;\n\tmax-height:95%;\n\tcolor:black;\n\tbackground:#ffffff;\n\tfont:normal 16px courier, sans-serif;\n\tborder:1px solid black;\n\tpadding:10px;\n}\n\n.note:before {\n\tcontent:\"NOTE: \";\n\tfont-weight:bold;\n}\n\ntable.attributes {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable.attributes td,th {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\ntable.attributes th {\n\ttext-align:center;\n}\ntable.attributes caption {\n\tmargin-top:1em;\n\tfont-style:italic;\n\ttext-align:center;\n}\n\/* Thanks to wolfgangradke, https:\/\/sourceforge.net\/forum\/message.php?msg_id=5991663 *\/\ndiv.nodecontent > p {\n\tmargin-top:0pt;\n\tmargin-bottom:0pt;\n\tdisplay:inline;\n}\n\np + p { \n \tmargin-top: 0.5em !important;\n\tdisplay:block !important;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747128&group_id=7118*\/\ntable {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable td {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747000&group_id=7118*\/\nol {\n\tmargin-top:1px;\n    margin-bottom:1px;\n\tmargin-left:0px;\n\tpadding-left:3%;\n}\n\nol li {\n\tlist-style:decimal;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n<\/style><br \/>\n<script type=\"text\/javascript\">\r\n\/* MarkTree JavaScript code\r\n * \r\n * Distributed under the terms of the MIT License.\r\n * See \"LICENCE.MIT\" or http:\/\/www.opensource.org\/licenses\/mit-license.php for details.\r\n *\r\n * Software distributed under the License is distributed on an \"AS IS\" basis,\r\n * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License\r\n * for the specific language governing rights and limitations under the\r\n * License.\r\n * \r\n * Miika Nurminen, 12.7.2004.\r\n *\/\r\n\r\n\/* cross-browser (tested with ie5, mozilla 1 and opera 5) keypress detection *\/\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u2030vi\u2030 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/script><\/p>\n<h3><span style=\"\">WTDC RESOLUTION 22 (Rev. Dubai, 2014)<\/span><\/h3>\n<h4><span style=\"\">Alternative calling procedures on international telecommunication networks, identification of origin and apportionment of revenues in providing international telecommunication services<\/span><\/h4>\n<p><span style=\"\">The World Telecommunication Development Conference (Dubai, 2014),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\" id=\"FMID_780869684FM\">\n<div class=\"nodecontent\">recalling<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">Resolution 22 (Rev. Hyderabad, 2010) of the World Telecommunication Development Conference,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" id=\"FMID_1700632032FM\">\n<div class=\"nodecontent\">considering<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a) the sovereign right of each State to regulate its telecommunications\/information and communication technologies (ICTs), which may include the provision of calling line identification, calling party number delivery and origin identification;<\/div>\n<\/li>\n<li class=\"col\">\n<div class=\"nodecontent\">b) the purposes of the Union, which include, inter alia:<\/div>\n<ul class=\"subexp\">\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2022 to maintain and extend international cooperation among all Member States of the Union for the improvement and rational use of telecommunications\/ICTs of all kinds;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2022 to promote the development of technical facilities and their most efficient operation with a view to improving the efficiency of telecommunication services, increasing their usefulness, and making them, as far as possible, generally available to the public;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2022 to foster collaboration among its Member States and Sector Members with a view to the establishment of rates at levels as low as possible consistent with efficient services and taking into account the necessity for maintaining independent financial administration of telecommunications on a sound basis, pursuant to the purposes of the Union as set forth in Article 1, No. 16, of the ITU Constitution;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2022 to facilitate peaceful relations, international cooperation among peoples and economic and social development by means of efficient telecommunication services;<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c) the necessity of identifying the origin of calls as one of the aims of national security;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d) the need to facilitate the determination of routing and charging;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e) Resolution 21 (Rev. Antalya, 2006) of the Plenipotentiary Conference, on alternative calling procedures on telecommunication networks, which states &#8220;that the use of certain alternative calling procedures that are not harmful to networks may contribute to competition in the interests of consumers&#8221;,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" id=\"FMID_1430012019FM\">\n<div class=\"nodecontent\">recognizing<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a) that alternative calling procedures are not permitted in many countries, while being permitted in others;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b) that the use of alternative calling procedures, including refile, adversely affects the economies of developing countries and may seriously hamper the efforts of these countries for the sound development of their telecommunication networks and services, may prejudice national security aims and may have an economic effect;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c) that some forms of alternative calling procedures may have an impact on traffic management and network planning, and degrade the quality and performance of the public switched telephone network,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" id=\"FMID_160673106FM\">\n<div class=\"nodecontent\">recalling<\/div>\n<ul class=\"sub\">\n<li class=\"col\">\n<div class=\"nodecontent\">a) Resolution 21 (Rev. Antalya, 2006), which resolves:<\/div>\n<ul class=\"subexp\">\n<li class=\"basic\">\n<div class=\"nodecontent\">&#8220;1 to encourage administrations and international telecommunication operators to implement the ITU\u2011T recommendations referred to in considering d) in order to limit the negative effects that in some cases alternative calling procedures have on developing countries;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2 to request administrations and international operators which permit the use of alternative calling procedures on their territory in accordance with their national regulations to pay due regard to the decisions of other administrations and international operators whose regulations do not permit such services;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3 to request the appropriate ITU\u2011T study groups, through contributions of Member States and Sector Members, to continue to study alternative calling procedures, such as refile and call-back, and issues related to identification of origin, in order to take into account the importance of these studies as they relate to next-generation networks and network degradation&#8221;;<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b) Resolution 1099 of adopted by the 1996 session of the ITU Council concerning alternative calling procedures on international telecommunication networks, which urged the ITU Telecommunication Standardization Sector (ITU\u2011T) to develop, as soon as possible, the appropriate Recommendations concerning alternative calling procedures;<\/div>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">c) Resolution 29 (Rev. Johannesburg, 2008) of the World Telecommunication Standardization Assembly (WTSA) which notes:<\/div>\n<ul class=\"sub\">\n<li class=\"col\">\n<div class=\"nodecontent\">&#8220;that in order to minimize the effect of alternative calling procedures:<\/div>\n<ul class=\"subexp\">\n<li class=\"basic\">\n<div class=\"nodecontent\">i) operating agencies authorized by Member States should, within their national law, make every effort to establish the level of collection charges on a cost-oriented basis, taking into account Article 6.1.1 of the International Telecommunication Regulations and Recommendation ITU\u2011T D.5;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">ii) administrations and operating agencies authorized by Member States should vigorously pursue the implementation of Recommendation ITU\u2011T D.140 and the principle of cost-oriented accounting-rates and accounting rate shares&#8221;,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"col\">\n<div class=\"nodecontent\">and resolves:<\/div>\n<ul class=\"subexp\">\n<li class=\"basic\">\n<div class=\"nodecontent\">&#8220;1 that administrations and operating agencies authorized by Member States should take all reasonable measures, within the constraints of their national law, to suspend the methods and practices of call-back which seriously degrade the quality and the performance of the PSTN, such as constant calling (or bombardment or polling) and answer suppression;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2 that administrations and operating agencies authorized by Member States should take a cooperative and reasonable approach to respecting the national sovereignty of others, and suggested guidelines for this collaboration are attached;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3 to continue developing appropriate recommendations concerning alternative calling procedures and, in particular, the technical aspects of the methods and practices of call-back which seriously degrade the quality and the performance of the PSTN, such as constant calling (or bombardment or polling) and answer suppression;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4 to request Study Group 2 to study other aspects and forms of alternative calling procedures, including refiling and non-identification;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">5 to request Study Group 3 to study the economic effects of call-back on the effort of developing countries, including the least developed countries, small island developing states and countries with economies in transition, for sound development of their local telecommunication networks and services, and to evaluate the effectiveness of the suggested guidelines for consultation on call-back&#8221;,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" id=\"FMID_1755834033FM\">\n<div class=\"nodecontent\">further recalling<\/div>\n<ul class=\"sub\">\n<li class=\"col\">\n<div class=\"nodecontent\">a) Resolution 22 (Rev. Antalya, 2006) of the Plenipotentiary Conference, on the apportionment of revenues in providing international telecommunication services, which resolves to urge ITU\u2011T:<\/div>\n<ul class=\"subexp\">\n<li class=\"basic\">\n<div class=\"nodecontent\">&#8220;1 to expedite its work on completing its study on the concept of network externalities for international traffic in relation to both fixed and mobile services;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2 to follow up its work on developing the appropriate costing methodo\u00adlogies for both fixed and mobile services;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3 to agree on transitional arrangements which may allow for some flexibility, taking into account the situation of the developing countries and the rapidly changing international telecommunication environment;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4 to take into consideration the interests of all users of telecommunications\/ICTs as a high priority&#8221;;<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b) the need to take into account also the results of the ITU workshop on alternative calling procedures and origin identification held in Geneva on 19-20 March 2012 and \u00a7 32 of the Final Acts of the World Conference on International Telecommunications (WCIT\u201112), on the provision of international calling line identification information, taking into account relevant ITU\u2011T Recommendations,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" id=\"FMID_1900227644FM\">\n<div class=\"nodecontent\">noting<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">the decisions of this conference with respect to the programme on Policy and regulatory environment, Questions to be studied by the study groups of the ITU Telecommunication Development Sector (ITU\u2011D), and actions to be taken by the Director of the Telecommunication Development Bureau to support joint activities with ITU\u2011T Study Group 3 for assisting developing countries with accounting-rate reform and with ITU\u2011T Study Group 2 for determining international call origins and limiting misuse of international telecommunication numbering, addressing, naming and call-origin identification systems,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" id=\"FMID_510101504FM\">\n<div class=\"nodecontent\">resolves<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1 to continue to encourage all administrations and international telecommunication operators to enhance the effectiveness of ITU&#8217;s role and to give effect to its Recommendations, particularly those of ITU\u2011T Study Groups 2 and 3, in order to promote a new and more effective basis for the accounting regime which would help limit the negative effects of alternative calling procedures and calling party number delivery on developing countries, and limit the negative effects of misappropriation and misuse of international telecommunication numbering resources;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2 to request ITU\u2011D and ITU\u2011T to collaborate so as to avoid overlap and duplication of effort in studying the issue of refile in order to achieve an outcome based on the spirit of Resolution 21 (Rev. Antalya, 2006);<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3 to request ITU\u2011D to play an effective role in connection with the implementation of Resolution 22 (Rev. Antalya, 2006) with respect to the apportionment of revenues in favour of developing countries, particularly the least developed among them, in situations where cost-oriented accounting rates reflect asymmetric costs for terminating international traffic, and any amendments thereto by the forthcoming Plenipotentiary Conference (Busan, 2014);<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4 to request administrations and international operators which permit the use of alternative calling procedures but do not provide calling party number delivery in their countries in accordance with their national regulations to respect the decisions of other administrations and international operators whose regulations do not permit such services and which request the provision of international calling line identification information, taking into account the relevant ITU\u2011T Recommendations, for security and economic reasons;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">5 that cooperation is required with ITU\u2011T, and specifically ITU\u2011T Study Group 2, in implementing Resolution 20 (Rev. Dubai, 2012) of WTSA in relation to telecommunication origin identification and misuse of numbering, addressing and naming resources,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" id=\"FMID_1610805739FM\">\n<div class=\"nodecontent\">instructs the Director of the Telecommunication Development Bureau<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">to invite the Director of the Telecommunication Standardization Bureau to collaborate in the implementation of this resolution.<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WTDC RESOLUTION 22 (Rev. Dubai, 2014) Alternative calling procedures on international telecommunication networks, identification of origin and apportionment of revenues in providing international telecommunication services The World Telecommunication Development Conference (Dubai, 2014), recalling Resolution 22 (Rev. Hyderabad, 2010) of the World Telecommunication Development Conference, considering a) the sovereign right of each State to regulate its [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1580,"menu_order":22,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1612","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=1612"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1612\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1580"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=1612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}