ITU-T SG 11 Workshop Global Approaches on Combating Counterfeiting and Stolen ICT Devices

Size: px
Start display at page:

Download "ITU-T SG 11 Workshop Global Approaches on Combating Counterfeiting and Stolen ICT Devices"

Transcription

1 ITU-T SG 11 Workshop Global Approaches on Combating Counterfeiting and Stolen ICT Devices ITU-T SG 11 Meeting, July rd July, 2018

2 CONTROL SYSTEM IN COLOMBIA FOR STOLEN MOBILE DEVICES OR WITH ALTERED/DUPLICATE IMEI Communications Regulation Commission Hugo Romero Adviser

3 AGENDA COMPREHENSIVE SET OF MEASURES IMEI BASED CONTROL SYSTEM DUPLICATED IMEI DETECTION AND CONTROL REGIONAL BLOCKING OF STOLEN IMEI RESULTS MAIN CHALLENGES

4 COMPREHENSIVE SET OF MEASURES ICT SECTOR Legal Framework use through Databases Regional Black Listing Not Reg IMEI Malformed IMEI Duplicated IMEI Control of sales Invalid IMEI Not Approved ME

5 COMPREHENSIVE SET OF MEASURES ICT SECTOR JUSTICE & DEFENSE Penalization of the IMEI tampering Domain extintion of ilegal POS Legal Framework use through Databases Regional Black Listing Not Reg IMEI Malformed IMEI Duplicated IMEI Law Enforcement Special Task Force Control of sales International operations & Border Controls Invalid IMEI New Police Code Not Approved ME

6 COMPREHENSIVE SET OF MEASURES ICT SECTOR JUSTICE & DEFENSE COMMERCE & CUSTOMS Penalization of the IMEI tampering Importations Domain extintion of ilegal POS Legal Framework use through Databases Regional Black Listing Not Reg IMEI Malformed IMEI Duplicated IMEI Law Enforcement Special Task Force Control of sales Exportations International operations & Border Controls Invalid IMEI New Police Code Not Approved ME

7 IMEI BASED CONTROL SYSTEM - LAW ENFORCEMENT TAC TYPE APPROVED POS User MOBILE OPERATORS + - IMEI (+) IMEI (-) NATIONAL DB + - IMEI (+/-) CUSTOMS Importer CDRs DETECTION INVALID NON- TYPE APPROVED NOT-REGISTERED CLONED (DUPLICATED) (+) Positive List + - (-) Negative List TAC TYPE APPROVED

8 ICT MEASURES FOCUS Each user is responsable of his device procedence Legal Device Registry POSITIVE DATA BASE Make lost/stolen device useless Blocking in mobile networks NEGATIVE DATA BASE Detect and control Altered/duplicated devices DAILY CONTROL OF IMEIS WITH ACTIVITY IN MOBILE NETWORKS

9 IMEI ACTIVITY CONTROL: DEPLOYMENT PROCESS oct 2015 mar 2016 jul 2016 sep 2016 oct 2016 mar 2017 may 2017 sep 2017 mar 2018 Invalids Not Type Approved Duplicated Transition periods (amnesties for existing devices)

10 PURPOSE OF MEASURES & IMEI CONTROL PROCESS Type Approval Importation of Approved and not reported devices Detect&Control Altered stolen devices Register of legally imported in DB + Make Stolen Device useless

11 INITIAL DIAGNOSTIC 47 M OF POPULATION WITH 57 M OF ACTIVE LINES 42 M OF IMEI WITH ACTIVITY IN MOBILE NETWORKS 7,1 M : Non Type Approved 1,8 M : Invalids 9,5 M : Not Registered 6,8 M Potential duplicated (Same IMEI seen with 3+ SIMs) March % of Irregular IMEIs

12 DAILY DETECTION&CONTROL PROCESS MOBILE NETWORK 24 H IMEI TAC DBs CROSS CHECKS

13 CONTROLS AND USER s OPTIONS IMEI TYPE DEFINITION CONTROL USER s OPTION Malformed (with no standard format) Invalid Non-type approved Not Registered Duplicated Less than 14 dígit or With alphabetic characters Not in GSMA TAC DB Not in CRC TAC DB Not in CRC TAC DB (Not homologated) Not in Positive DB (Unknown user/origin) Same IMEI in different devices No network access Blocked in 48 hr Blocked in 45 Days Blocked in 20 Days Blocked in 30 Days Control IMSI-IMEI Claim to vendor Definitive blocking Claim to vendor Claim to vendor Or proceed to homologate in CRC Proceed to register & Unblock Restricted use with one or more lines

14 CONTROLS AND USER s OPTIONS IMEI TYPE DEFINITION CONTROL USER s OPTION Malformed (with no standard format) Invalid Non-type approved Not Registered Duplicated Less than 14 dígit or With alphabetic characters Not in GSMA TAC DB Not in CRC TAC DB Not in CRC TAC DB (Not homologated) Not in Positive DB (Unknown user/origin) Same IMEI in different devices SOURCES OF ALTERED DEVICES No network access Blocked in 48 hr Blocked in 45 Days Blocked in 20 Days Blocked in 30 Days Control IMSI-IMEI Claim to vendor Definitive blocking Claim to vendor Claim to vendor Or proceed to homologate in CRC Proceed to register & Unblock Restricted use with one or more lines

15 DUPLICATED IMEI DETECTION 1. Same IMEI with different SIM making calls at the same time 2. Or within not posible time and distance frames

16 GENUINE VS ALTERED MEs VALUE CHAIN OF GENUINE DEVICES OEM TAC MANUFACT IMPORTER VENDOR OPERATOR USER GENUINE ME VALUE CHAIN OF ALTERED DEVICES GENUINE ME STOLE RECEIVING IMEI ALTERATION ILLEGAL RE SALE USER OPERATOR ALTERED ME

17 GENUINE VS ALTERED MEs VALUE CHAIN OF GENUINE DEVICES OEM TAC MANUFACT IMPORTER VENDOR OPERATOR USER GENUINE ME IMPACT VALUE CHAIN OF ALTERED DEVICES GENUINE ME STOLE RECEIVING IMEI ALTERATION ILLEGAL RE SALE USER OPERATOR ALTERED ME

18 GENUINE VS ALTERED MEs Match of TAC, Brand and Model Internal IMEI = external IMEI Original Label Importation papers Authorized vendors (Big surfaces/operator) Invoice consistency (value, IMEI, etc) IMEI history associated with a subscription data TAC, Brand, Model don t Match Internal IMEI different from external IMEI Fake label Case Brand and Model are different from the TAC No importation papers Invoice inconsistencys (value, IMEI, etc.) No IMEI history associated to a subscription IMEI technical diagnostic required (Case manufacturer) STAKEHOLDERS DON T HAVE CHANCE TO PREVENT DUPLICATION IN OTHER ME ME ALLOWS IMEI TAMPERING TO USE OTHER s GENUINE ME IMEI

19 Duplicated IMEI Control

20 REGIONAL BLOCKING OF STOLEN IMEI SOURCE: GSMA LATIN AMERICA OTHER REGIONS CONNECTIONS TO GSMA IMEI DB (# of Countries) EUROPE: 39% ASIA: 5% AFRICA: 4% OCEANIA: 7%

21 RESULTS Controlled Irregular IMEIs Invalid Not registered Duplicated Not-Type approved Unformatted 5,28 M 3,16 M 6,44 M 2,67M 1,15 M 2,65 M No network access 2,6 M 11,15 M 17,55 M Registered in Positive Database 85,6 M 31,1 M 13,8 M 8,0 M 142,8 M

22 THOUSANDS THOUSANDS THOUSANDS THOUSANDS RESULTS Trends of Irregular IMEI presence INVALID NOT HOMOLOGATED NOT REGISTERED DUPLICATED

23 MILLION RESULTS Year Lost + Stolen.vs. Users ,7% 44,48 3,4% 46,20 3,7% 3,9% 55,33 49,07 50,30 3,1% 62,22 58,68 57,33 3,2% 3,0% 2,9% 4,5% 4,0% 3,5% 3,0% 2,5% 30 2,0% ,67 1,57 1,83 1,95 1,70 1,70 1,89 1, ,5% 1,0% 0,5% 0,0% Lost+Stolen Active Users

24 MAIN CHALLENGES - GOVERNMENT Challenge Active role by different goverment entities Attack criminal economy Follow up of the problem trends Impacts on stakeholders How to built the positive and negative data bases Enforcement of ICT measures Device repair technicians Black market of device parts Treatment Leadership from the top of the government Legal framework & revisions All law enforcement involvement International scope Police findings & statistics Multisector f.u. Meetings Dialog focused on solving public safety issue By law, is a financial/operational responsabiltiy of operators Per law is ict ministry function Educate them in ethics in front of alteration Police controls on points of sale

25 MAIN CHALLENGES -REGULATOR Challenge Empowerment to regulate Know how of the problem Dynamics of the problem Volume and types of IMEI to control Not registered devices Blocking of not homologated devices duplicated IMEIs Law issued by congress Decree issued by ict ministry Treatment Experienced team profile Exchange of experiences with other countries Technical follow up commitees Continuos regulation adjustments pashed deployment priorization per imei type transition periods for each type of existing imeis gov&operators public campaigns start blocking of not registered imeis Re engineering of homologation process (on-line, for any person) Search of technology to control duplicates Adoption of 2 criteria to define genuine devices: 1. The ones owned by registered user in db+ 2. The one who proves having genuine device

26 MAIN CHALLENGES - OPERATORS CHALLENGE Operate national DBs Consistency & Concilliation of DBs Block rigth IMEI of stolen devices Volumes of IMEI to block Centralized + Distributed DBs Protocols Automatization TREATMENT Daily treatment of error messaging Take IMEI from netowork activity Upgrade EIR Keep entries on EIR for a limit of time Add new IMEIs to blacklists deleting earliest entries malformed IMEIs not homologated devices Detection of duplicated IMEI Apply changes on Radio acces and core networks Daily CRC homologated TAC list Agree on duplicated IMEI definition Agree on criteria and algorithms to detect duplicates Given time to develop, test and opérate algotihms

27 MAIN CHALLENGES - OPERATORS CHALLENGE Detect both intra network and inter network duplicates (with activity in different mobile operators) Volume of data to analyze in the process of duplicates detection Protection of personal data contained in CDRs duplicated IMEIs Identify genuine devices from several with same IMEI Rotation of devices with irregular IMEIs TREATMENT Split processes, one for intranetwork detection and other for inter network detection by a third party thac collects information and apply defined criteria and algorithms Only Voice CDR is taken to analysis Use of minimun fields of CDRs to analyze in the detection For inter network detection, use only data related to those IMEI with activity in more than one network for a month period. Only using fields that are not personal data by itself (or alone) Sending only fields required for analysis to the third party in charge of inter network detection of duplicates. Upgrading EIR to IMSI-IMEI check functionality Updating of CRM to EIR provisioning process Establishing customer care processes Agree on criteria of genuine devices with the regulator. Using general criteria to let the operator take decision based in each case, proves and the devices involved. Reduction on bllocking times

28 MAIN CHALLENGES LAW ENFORCEMENT CHALLENGE Better and on line information of stolen devices Low technical know how on mobile theft Increase Street surveillance Control to Points of Sale of mobile devices Judicialization of people that alter IMEI Impact all links in to the criminal chain Very low denounce levels of stolen devices from users Access to centralized DB TREATMENT ICT Ministry and Regulator training Georeference of hot spots with centralized DB info Device Sale Authorization Regime by ICT Ministry On line information system of authorized POS Legal framework (closings + Domain extintion) Proposal for law revision to pass in the congress New Police Code (mobile device contraventions) Legal framework & revisions Create several interinstitutional groups (intelligence/operations) Actions with international scope Change presencial process to virtual denounces Public campaings

29 Findings and Recommendations Reach global exchange and blocking of IMEI reported as stolen/lost Complement black lists with national detection / control of altered devices Detect and control all IMEI types that identify posible altered devices: Malformed (Unformatted) Invalid Not homologated (Not-Type approved) No Registered in positive/white data bases Duplicated Thieves act and adapt rapidly. Continuos follow up of the application of measures. Key success factor: Reference Data Base with unique regular identifiers of legally imported and acquired devices Mid Term process (~3 year). Phased deployment recommended: Diagnostic Design Implementation Operation Transition (amnesty) periods to existing devices User processes

30 REFERENCES 1. GSMA and ETSI standards (ETSI 3GPP TS v ( ), 3GPP TS ) 2. GSMA TS.06 IMEI Allocation and Approval Process 3. GSMA Latin America quarterly reports of GSMA IMEI DB to CITEL Permanent Consultive Committee I 4. IDC Consulting Latin America: Using IMEI Control Systems to combat stolen, fraudulent and counterfeit mobile phones: A Colombia case study. March, English: Español:

31 ITU-T SG 11 Workshop Global Approaches on Combating Counterfeiting and Stolen ICT Devices THANKS HUGO ROMERO ITU-T SG 11 Meeting, July rd July, 2018

Combat of Counterfeit and Stolen ICT Devices

Combat of Counterfeit and Stolen ICT Devices SG 11 Regional Workshop for Africa on Counterfeit ICT Devices, Conformance and Interoperability Testing Challenges in Africa (Cairo, Egypt 5 April 2017) Combat of Counterfeit and Stolen ICT Devices João

More information

Outcomes of the ITU Workshop. Global approaches on combating counterfeiting and stolen ICT devices. (23 July 2018, Geneva)

Outcomes of the ITU Workshop. Global approaches on combating counterfeiting and stolen ICT devices. (23 July 2018, Geneva) Outcomes of the ITU Workshop Global approaches on combating counterfeiting and stolen ICT devices (23 July 2018, Geneva) Appreciation The workshop convener appreciated all speakers and moderators for their

More information

IMEI Counterfeit Update

IMEI Counterfeit Update IMEI Counterfeit Update Presented by Mohamed Abbes, MENA Public Policy Director, GSMA mabbes@gsma.com 23 April 2018, ITU Study Group 11 Regional Workshop for Africa 2 www.gsma.com/services /gsma-imei/

More information

ITU Workshop Combating grey devices. Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016

ITU Workshop Combating grey devices. Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016 ITU Workshop Combating grey devices Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016 Security solutions Qualcomm s vision Theft Deterrence Enterprise

More information

IMEI Security Technical Design Principles

IMEI Security Technical Design Principles IMEI Security Technical Design Principles Enabling stolen mobile device blocking V4.0 August 2016 Table of Contents 1. Introduction... 1 2. Device Identity Security... 1 3. Design Principles... 2 4. IMEI

More information

GSME proposals regarding mobile theft and IMEI security

GSME proposals regarding mobile theft and IMEI security GSM Europe The European interest group of the GSM Association http://www.gsmeurope.org GSME proposals regarding mobile theft and IMEI security The question of mobile theft and ways of combating it has

More information

GSMA TAC Allocation and IMEI Programming Rules for Device Brand Owners and Manufacturers

GSMA TAC Allocation and IMEI Programming Rules for Device Brand Owners and Manufacturers GSMA TAC Allocation and IMEI Programming Rules for Device Brand Owners and Manufacturers Training Guide February 2018 v1.0 Copyright 2018 GSMA Introduction About this document This is a practical training

More information

Scope of the Member State mechanism

Scope of the Member State mechanism FIRST MEETING OF THE MEMBER STATE MECHANISM ON SUBSTANDARD/SPURIOUS/FALSELY-LABELLED/ 2 November 2012 FALSIFIED/COUNTERFEIT MEDICAL PRODUCTS Provisional agenda item 4 Scope of the Member State mechanism

More information

Calidad Celular: Case for Colombia

Calidad Celular: Case for Colombia CITEL (PCC.I)/ ITU Forum on Information and Communication Technology Service: Quality, Control and Surveillance (Cartagena de Indias, Colombia, 23-24 September 2013) Calidad Celular: Case for Colombia

More information

Workshop on Addressing the Barriers to IPv6 Deployment Spanish use case

Workshop on Addressing the Barriers to IPv6 Deployment Spanish use case Workshop on Addressing the Barriers to IPv6 Deployment Spanish use case Cristina Ramos cristinapilar.ramos@correo.gob.es Agenda Agenda IPv6 addressing plan Barriers Conclusions 1 Background Digital Agenda

More information

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the

More information

LTE in Industry Verticals: Market Opportunities and Forecasts

LTE in Industry Verticals: Market Opportunities and Forecasts LTE in Industry Verticals: Market Opportunities and Forecasts 2013 2018 January 2013 Overview: There is a rapidly growing demand for broadband-enabled data applications within certain vertical market segments

More information

BDT Activities on Spectrum Management István Bozsóki Head of Division BDT/IEE/SBD

BDT Activities on Spectrum Management István Bozsóki Head of Division BDT/IEE/SBD BDT Activities on Spectrum Management István Bozsóki Head of Division BDT/IEE/SBD 07/05/2015 EUR RI 2015, Budapest 1 Recent Activities on Spectrum Management Spectrum Management Master Plan (SM MP) Spectrum

More information

Overview on the Project achievements

Overview on the Project achievements Overview on the Project achievements Closing Conference, Tbilisi, Georgia 14 May 2010 Cristina Schulman Council of Europe Strasbourg, France Tel +33-3-8841-2103 cristina.schulman@coe.int www.coe.int/cybercrime-georgia

More information

Mutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits

Mutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits Conformity and Interoperability Training for SADC Region on Type Approval testing for Mobile Terminals, Homologation Procedures and Market Surveillance Mutual Recognition Agreement/Arrangement: General

More information

Sustainable Management of Waste Electrical and Electronic Equipment (WEEE) in Latin America

Sustainable Management of Waste Electrical and Electronic Equipment (WEEE) in Latin America Sustainable Management of Waste Electrical and Electronic Equipment (WEEE) in Latin America Content The Context The Report Country Assessment WEEE Management Challenges in Latin America Main Findings of

More information

IMEI Systems Under Convergence Conditions. Yurii Kargapolov Ukrainian Network Information Center

IMEI Systems Under Convergence Conditions. Yurii Kargapolov Ukrainian Network Information Center New prospective of DNStechnology: 3d Generation of MNP & IMEI Systems Under Convergence Conditions Yurii Kargapolov Ukrainian Network Information Center 3 Systems of the 3.0 Generation (3G Systems) 2 Mobile

More information

ETSI TS V6.2.0 ( )

ETSI TS V6.2.0 ( ) TS 100 508 V6.2.0 (2000-07) Technical Specification Digital cellular telecommunications system (Phase 2+); International Mobile station Equipment Identities (IMEI) (GSM 02.16 version 6.2.0 Release 1997)

More information

The Export Control and Related Border Security (EXBS) Program in ASEAN And ASEAN Single Window (ASW) Initiative

The Export Control and Related Border Security (EXBS) Program in ASEAN And ASEAN Single Window (ASW) Initiative The Export Control and Related Border Security (EXBS) Program in ASEAN And ASEAN Single Window (ASW) Initiative United States Department of State International Security and Nonproliferation Bureau Office

More information

Status of preparations for PP-18. Inter-American Telecommunication Commission (CITEL) Permanent Executive Committee (Com/CITEL)

Status of preparations for PP-18. Inter-American Telecommunication Commission (CITEL) Permanent Executive Committee (Com/CITEL) Status of preparations for PP-18 Inter-American Telecommunication Commission (CITEL) Permanent Executive Committee (Com/CITEL) Working Group for PP-18 Established within COM/CITEL Chairperson: Santiago

More information

Utimaco OX Summit

Utimaco OX Summit Utimaco LIMS @ OX Summit Utimaco TS GmbH October 2017 Dirk Börgerding Key Account Manager Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 1 Utimaco Group Company Facts Founded 1983 HQ in Aachen, Germany

More information

COUNTERFEIT ICT DEVICES, CONFORMANCE AND INTEROPERABILITY TESTING CHALLENGES IN AFRICA COUNTERFEIT ICT DEVICES: THE NIGERIAN PERSEPCTIVE

COUNTERFEIT ICT DEVICES, CONFORMANCE AND INTEROPERABILITY TESTING CHALLENGES IN AFRICA COUNTERFEIT ICT DEVICES: THE NIGERIAN PERSEPCTIVE 1 COUNTERFEIT ICT DEVICES, CONFORMANCE AND INTEROPERABILITY TESTING CHALLENGES IN AFRICA COUNTERFEIT ICT DEVICES: THE NIGERIAN PERSEPCTIVE Engr. Ubale A. S. Maska, Executive Commissioner, Technical Services,

More information

Mutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits

Mutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits Workshop for Caribbean countries to promote the development and implementation of Conformity Assessment programmes St. Augustine (Trinidad and Tobago) 2-4 December 2014 Mutual Recognition Agreement/Arrangement:

More information

ETSI TS V7.0.0 ( )

ETSI TS V7.0.0 ( ) TS 100 508 V7.0.0 (1999-08) Technical Specification Digital cellular telecommunications system (Phase 2+); International Mobile station Equipment Identities (IMEI) (GSM 02.16 version 7.0.0 Release 1998)

More information

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM THE THREAT WE FACE On average, the Department of Administration information officers identify: 200 brute force attempts per day;

More information

Telecom Sector Outlook and Spectrum Trading: the Case of Pakistan

Telecom Sector Outlook and Spectrum Trading: the Case of Pakistan Telecom Sector Outlook and Spectrum Trading: the Case of Pakistan Shahbaz Nasir Pakistan Telecommunication Authority ITU Workshop on Economic Aspects of Spectrum Management 21 st 23 rd November 2016 Tehran

More information

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber

More information

3GPP TS V ( )

3GPP TS V ( ) TS 22.016 V10.0.0 (2011-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; International Mobile station Equipment Identities (IMEI)

More information

A comprehensive approach on personal data protection in the European Union

A comprehensive approach on personal data protection in the European Union A comprehensive approach on personal data protection in the Justice Date 1 Main legal instruments on EU level Data Protection Directive 95/46/EC Directive 2002/58/EC on privacy and electronic communications

More information

THE IMPACT OF SPECTRUM MANAGEMENT ON MOBILE BROADBAND General framework and technological choices

THE IMPACT OF SPECTRUM MANAGEMENT ON MOBILE BROADBAND General framework and technological choices THE IMPACT OF SPECTRUM MANAGEMENT ON MOBILE BROADBAND General framework and technological choices Wladimir Bocquet, Head of Policy Planning, GSMA 11 APRIL 2014 28 NOVEMBER 2014 AGENDA GSMA Overview Mobile

More information

BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal CIPF

BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal CIPF BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal Geneve Switzerland, August 26th 2010 1 NATION WIDE PUBLIC SAFETY NETWORK THE BACKBONE An advanced telecommunications and information

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

10007/16 MP/mj 1 DG D 2B

10007/16 MP/mj 1 DG D 2B Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting

More information

Pilot Study on Big Data: Philippines. World Telecommunications/ICT Indicators Symposium (WTIS) November 2017 Hammamet, Tunisia

Pilot Study on Big Data: Philippines. World Telecommunications/ICT Indicators Symposium (WTIS) November 2017 Hammamet, Tunisia Pilot Study on Big Data: Philippines World Telecommunications/ICT Indicators Symposium (WTIS) 14-16 November 2017 Hammamet, Tunisia Background, Objective, Scope - In June 2016, ITU initiated a pilot project

More information

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Legal framework of ensuring of cyber security in the Republic of Azerbaijan Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic

More information

mr. sci. Suada Hadžović, dipl.ing.el. Communications Regulatory Agency Bosnia and Herzegovina Ohrid, Republic of Macedonia, May 24 26, 2017.

mr. sci. Suada Hadžović, dipl.ing.el. Communications Regulatory Agency Bosnia and Herzegovina Ohrid, Republic of Macedonia, May 24 26, 2017. International Regulatory Conference The trend and regulatory issues in OTT mr. sci. Suada Hadžović, dipl.ing.el. Bosnia and Herzegovina,. Agenda 1. OTT definition and taxonomy 2. OTT - small companies

More information

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius Presented By Mrs K.Gunesh-Balaghee,, Assistant Solicitor General Mr M.Armmogum,, Ag Senior State Counsel Mrs B.Kissoon-Luckputtya,

More information

Virtual Currencies and The Commonwealth. 1 June 2016

Virtual Currencies and The Commonwealth. 1 June 2016 1 Virtual Currencies and The Commonwealth 1 June 2016 The Commonwealth Cybercrime Initiative Mission CCI aims to provide coherent, comprehensive and sustainable assistance to member states to build capacity

More information

GSMA Embedded SIM 9 th December Accelerating growth and operational efficiency in the M2M world

GSMA Embedded SIM 9 th December Accelerating growth and operational efficiency in the M2M world GSMA Embedded SIM 9 th December 2013 Purpose of this Reference Messaging Pack Appropriate slides may be selected to used for within different presentations for multiple audiences To provide consistent

More information

SAMSUNG HANDSET TRADE IN PROGRAMME TERMS AND CONDITIONS

SAMSUNG HANDSET TRADE IN PROGRAMME TERMS AND CONDITIONS SAMSUNG HANDSET TRADE IN PROGRAMME TERMS AND CONDITIONS 1. THESE TERMS 1.1 What these terms cover. These are the terms and conditions on which you may take part in our Handset Trade In Programme ( Trade

More information

Homologation of telecommunication equipment experience in India Vineet Verma Director, Department of Telecom India

Homologation of telecommunication equipment experience in India Vineet Verma Director, Department of Telecom India Conformity and Interoperability regimes of Telecommunication/ICT equipment in [India] Homologation of telecommunication equipment experience in India Vineet Verma Director, Department of Telecom India

More information

Port 25 Management in Brazil: A Multistakeholder Effort to Reduce Direct Delivery from End User Networks

Port 25 Management in Brazil: A Multistakeholder Effort to Reduce Direct Delivery from End User Networks Port 25 Management in Brazil: A Multistakeholder Effort to Reduce Direct Delivery from End User Networks Henrique Faulhaber, Board Member Brazilian Internet Steering Committee CGI.br Dr. Cristine Hoepers,

More information

Spectrum Audit - What does the mobile world look like today?

Spectrum Audit - What does the mobile world look like today? Spectrum Audit - What does the mobile world look like today? Herman Schepers, Head of Regional Strategy and Government Affairs, GSMA 11 APRIL 2013 OCTOBER 2013 GSMA BY THE NUMBERS ENABLING A MOBILE FUTURE

More information

Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1

Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1 Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1 Presentation Overview What is BTOP? Making BTOP work for our state What

More information

Joint ITU-UNIDO Forum on Sustainable Conformity Assessment for Asia-Pacific Region (Yangon City, Republic of Union of Myanmar November 2013)

Joint ITU-UNIDO Forum on Sustainable Conformity Assessment for Asia-Pacific Region (Yangon City, Republic of Union of Myanmar November 2013) Joint ITU-UNIDO Forum on Sustainable Conformity Assessment for Asia-Pacific Region (Yangon City, Republic of Union of Myanmar 25-27 November 2013) Mark Amos Business Manager, IECEx Secretariat, IEC mark.amos@iecex.com

More information

World Conference on International Telecommunications (WCIT-12) Revision of the International Telecommunication Regulations (ITR)

World Conference on International Telecommunications (WCIT-12) Revision of the International Telecommunication Regulations (ITR) World Conference on International Telecommunications (WCIT-12) Revision of the International Telecommunication Regulations (ITR) Maria Häll, Deputy Director Division of IT Policy, Ministry of Enterprise,

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

Zambia National Standardization Organization Audit

Zambia National Standardization Organization Audit Sixth SG13 Regional Workshop for Africa on Standardization of future networks: What opportunities for Africa? (Abidjan, Côte d Ivoire, 26-27 March 2018) Zambia National Standardization Organization Audit

More information

DIGITAL AGENDA FOR EUROPE

DIGITAL AGENDA FOR EUROPE DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background

More information

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA. ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY 2005. PAPER ON THE STATE OF CYBERSECURITY IN UGANDA. BY : UGANDA COMMUNICATIONS COMMISSION 1.0: Background Uganda, like

More information

UNODC tackling cybercrime in support of a safe and secure AP-IS

UNODC tackling cybercrime in support of a safe and secure AP-IS UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway

More information

Market Surveillance and enforcement

Market Surveillance and enforcement Conformity and Interoperability Training for AMS Region on Type Approval testing for Mobile Terminals, NGN testing, Homologation Procedures and Market Surveillance Campinas-Brazil, 8-12 June 2015 Market

More information

CYBERSECURITY LEGISLATION IT OUT!

CYBERSECURITY LEGISLATION IT OUT! ATTEMPTS TO PASS US U.S. CYBERSECURITY LEGISLATION YOU NEED A SCORECARD TO FIGURE YOU NEED A SCORECARD TO FIGURE IT OUT! Professor Pauline C. Reich Waseda University School of Law cyberasia2@gmail.com

More information

The Challenge of Spam An Internet Society Public Policy Briefing

The Challenge of Spam An Internet Society Public Policy Briefing The Challenge of Spam An Internet Society Public Policy Briefing 30 October 2015 Introduction Spam email, those unsolicited email messages we find cluttering our inboxes, are a challenge for Internet users,

More information

ECC Recommendation (17)04. Numbering for ecall

ECC Recommendation (17)04. Numbering for ecall ECC Recommendation (17)04 Numbering for ecall Approved 22 November 2017 ECC/REC/(17)04 Page 2 INTRODUCTION ecall is a service designed for automotive vehicles to provide quick emergency response in case

More information

NIST UPDATES TELECOM MRAS

NIST UPDATES TELECOM MRAS NIST UPDATES TELECOM MRAS ACIL Mid-Winter Meeting March 28, 2012 Jogindar Dhillon 2 Topics G-to-G Telecom/EMC MRAs Current MRAs NIST Role Various MRA activities Other activities & meetings Other programs

More information

PacNOG-21. Migrating to IPv6 : Experiences from Asia-Pacific

PacNOG-21. Migrating to IPv6 : Experiences from Asia-Pacific PacNOG-21 Migrating to IPv6 : Experiences from Asia-Pacific Goals for a Sustainable Future : The SDGs 17 Sustainable Development Goals and 169 Targets Available for download at http://www.itu.int/en/itu-d/statistics/pages/publications/mis2017.aspx

More information

5G roadmap: challenges and opportunities ahead

5G roadmap: challenges and opportunities ahead Information Session by ITU-R and ITU-T 5G roadmap: challenges and opportunities ahead July 217 ITU Overview Committed to connecting the world 193 Member States 874 Sector Members 171 Associates 127 Academia

More information

The Regional Internet Registries

The Regional Internet Registries The Regional Internet Registries Managing Internet Number Resources www.afrinic.net www.apnic.net www.arin.net www.lacnic.net www.ripe.net www.nro.net Global Coordination A Fair and Stable Platform Whether

More information

Cell and PDAs Policy

Cell and PDAs Policy Cell and PDAs Policy CHAPTER: 13 Information Services Department SECTION: 13 SUBJECT: Cell Phones and PDAs POLICY #: 13.13.00 Revised OFFICE/DEPARTMENT: Information Services EFFECTIVE DATE: October 1,

More information

DIGITAL FINANCIAL INCLUSION FOR MONGOLIA

DIGITAL FINANCIAL INCLUSION FOR MONGOLIA DIGITAL FINANCIAL INCLUSION FOR MONGOLIA ITU-TRAI Asia-Pacific Regulators Roundtable, 21-22 August 2017 D.SEREEDORJ Vice Chairman Communications Regulatory Commission of Mongolia 1. Country profile 2.

More information

Maintaining Trust: Visa Inc. Payment Security Strategy

Maintaining Trust: Visa Inc. Payment Security Strategy Maintaining Trust: Visa Inc Payment Security Strategy Ellen Richey 2010 Payments Conference Chicago Federal Reserve Global Electronic Payments Protecting the payment system is a shared responsibility among

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

EUROPEAN ETS TELECOMMUNICATION April 1997 STANDARD

EUROPEAN ETS TELECOMMUNICATION April 1997 STANDARD EUROPEAN ETS 300 921 TELECOMMUNICATION April 1997 STANDARD Source: ETSI TC-SMG Reference: DE/SMG-010211Q ICS: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile communications

More information

Don t plug me in just yet.

Don t plug me in just yet. Easy Transfer Cable for Windows 7 Don t plug me in just yet. We need to do a few things first to get your computers ready to transfer your files and user accounts. Quick Start Guide F5U279 i 1 Prepare

More information

Status of activities Joint Working Group on standards for Smart Grids in Europe

Status of activities Joint Working Group on standards for Smart Grids in Europe Status of activities Joint Working Group on standards for Smart Grids in Europe Ralph Sporer Chairman JWG on standards for Smart Grids ETSI - Smart Grids Workshop 5-6 April 2011 Sophia-Antipolis Page 1

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

P.O BOX 7289 KIGALI, Tel: , Fax: Website:

P.O BOX 7289 KIGALI, Tel: , Fax: Website: P.O BOX 7289 KIGALI, Tel: +250 252584562, Fax: +250 252584563 Email: info@rura.rw Website: www.rura.rw GUIDELINES N.../GL/UAS-ICS/ RURA/017 OF.../.../2017 ON MINIMUM BANDWIDTH FOR BROADBAND INTERNET CONNECTIVITY

More information

ITU Workshop on "Combating Counterfeit Using Conformance and Interoperability Solutions" Geneva, Switzerland 28 June 2016

ITU Workshop on Combating Counterfeit Using Conformance and Interoperability Solutions Geneva, Switzerland 28 June 2016 ITU Workshop on "Combating Counterfeit Using Conformance and Interoperability Solutions" Geneva, Switzerland 28 June 2016 ITU SURVEY ON COUNTERFEIT ICT DEVICES IN AFRICA REGION: FINDINGS, CONCLUSIONS AND

More information

PRODUCT CERTIFICATION SCHEME FOR ENERGY DRINKS

PRODUCT CERTIFICATION SCHEME FOR ENERGY DRINKS Ref No: RACS/PCS/11 Page 1 of 6 1. Objective: This procedure describes the criteria implemented by RACS as Notified Body of Emirates Authority of Standardization and Metrology (ESMA) that Energy Drinks

More information

The below represents a summary of Section 1 of Chapter 9 of the National Integrated ICT Policy White Paper.

The below represents a summary of Section 1 of Chapter 9 of the National Integrated ICT Policy White Paper. Opening Access: Infrastructure and supply-side issues The below represents a summary of Section 1 of Chapter 9 of the National Integrated ICT Policy White Paper. Contents Introduction... 1 Goals... 1 What

More information

Pay as you go Terms and Charges

Pay as you go Terms and Charges Pay as you go Terms and Charges Would you prefer this information in large print, on disk, or in Braille? Call our specialist accessibility team on 03333 043 222 or email disability.access@vodafone.co.uk

More information

UTC - Global Advisory Council

UTC - Global Advisory Council UTC - Global Advisory Council JRC Autumn Seminar 13 th September 2017 Utilities Technology Council Global Focus on Utility Information and Communications Technology Mission UTC is the source and resource

More information

SILVER SPRINGS HOTEL, KAMPALA, UGANDA FROM 24TH 28TH JULY 2017 AGENDA ITEM AND AGREED

SILVER SPRINGS HOTEL, KAMPALA, UGANDA FROM 24TH 28TH JULY 2017 AGENDA ITEM AND AGREED REF NO AGENDA ITEM AND AGREED RESPONSIBLE DEPARTMENT 8.0 CONSIDERATION OF THE REPORTS OF WGs AND COMMITTEES STATUS ON THE IMPLIMENTATION OF AGREEDS BY MEMBER COUNTRY (BURUNDI, KENYA, RWANDA, SOUTH SOUDAN,

More information

Overview of ITU capacity building activities

Overview of ITU capacity building activities Europe Centers of Excellence Steering Committee Meeting Copenhagen, Denmark 12 December 2017 Overview of ITU capacity building activities Mike Nxele Senior Human Capacity Building Officer, Human Capacity

More information

ESSA Q INTEGRITY REPORT

ESSA Q INTEGRITY REPORT ESSA Q3 2017 INTEGRITY REPORT EDITORIAL ESSA held its first major event on sports betting and integrity at Lords Cricket ground in mid-october. It was fitting that the event took place at the home of cricket,

More information

Donor Countries Security. Date

Donor Countries Security. Date PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information

More information

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08

More information

Workday s Robust Privacy Program

Workday s Robust Privacy Program Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield

More information

The Global Research Council

The Global Research Council The Global Research Council Preamble The worldwide growth of support for research has presented an opportunity for countries large and small to work in concert across national borders. Cooperation and

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

Australian Government Cyber-security Activities in the Pacific

Australian Government Cyber-security Activities in the Pacific Australian Government Cyber-security Activities in the Pacific Daniel Wells International Branch Department of Broadband, Communications and the Digital Economy Overview Australia s engagement with the

More information

Tech Data s Acquisition of Avnet Technology Solutions

Tech Data s Acquisition of Avnet Technology Solutions Tech Data s Acquisition of Avnet Technology Solutions Creating a Premier Global IT Distributor: From the Data Center to the Living Room September 19, 2016 techdata.com 1 Forward-Looking Statements Safe

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Cybersecurity Strategy of the Republic of Cyprus George Michaelides Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy 12 th February 2016 Cybersecurity Strategy of

More information

Digital government toolkit

Digital government toolkit Digital Government Strategies: Good Practices Colombia: Government Enterprise Architecture Framework The OECD Council adopted on 15 July 2014 the Recommendation on Digital Government Strategies. The Recommendation

More information

ETSI TS V ( )

ETSI TS V ( ) TS 122 016 V15.0.0 (2018-07) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; International Mobile station Equipment

More information

In the Balkans, UNODC is part of the consortium with GIZ and the Center for International Legal Cooperation of the Netherlands who will implement the

In the Balkans, UNODC is part of the consortium with GIZ and the Center for International Legal Cooperation of the Netherlands who will implement the The Organized and Serious Crime Programme (GPTOC) focuses on assisting states with the implementation of the core elements of the Organized Crime convention. This includes judicial and law enforcement

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations

How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations By Dr. Saeed Al Dhaheri @DDSaeed Chairman, We are the leading Smart Solutions Integrator. With our far sight and

More information

Canada Anti-Spam Legislation: Review and Update

Canada Anti-Spam Legislation: Review and Update Canada Anti-Spam Legislation: Review and Update Agenda Introduction Overview Nuts and Bolts Compliance Strategies CRTC Administrative Penalties July 1, 2017 Changes July 1, 2017 What Does it Mean? Final

More information

NATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post

NATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post Introduction Telecommunication and Post The n legislation in the field of telecommunication and post is almost in full incompliance with that of the EU, except for certain legal rules on general legal

More information

APCO Canada November 6, MHz Public Safety Broadband Network. From Vision to Action. Claudio Lucente, P.ENG, M.ENG. Senior technical advisor

APCO Canada November 6, MHz Public Safety Broadband Network. From Vision to Action. Claudio Lucente, P.ENG, M.ENG. Senior technical advisor APCO Canada November 6, 2013 700 MHz Public Safety Broadband Network From Vision to Action Claudio Lucente, P.ENG, M.ENG. Senior technical advisor Disclaimer The statements contained in this presentation

More information

SAMSUNG HANDSET TRADE IN PROGRAMME TERMS AND CONDITIONS

SAMSUNG HANDSET TRADE IN PROGRAMME TERMS AND CONDITIONS SAMSUNG HANDSET TRADE IN PROGRAMME TERMS AND CONDITIONS 1. THESE TERMS 1.1 What these terms cover. These are the terms and conditions on which you may take part in our Handset Trade In Programme ( Trade

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

Launched at UNCTAD 14. Nairobi Azimio

Launched at UNCTAD 14. Nairobi Azimio Launched at UNCTAD 14 We welcome the formal unveiling of the etrade for All initiative at UNCTAD XIV. It provides a new approach to trade development through electronic exchanges by allowing developing

More information

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D KENYA YOUR RELIABLE PARTNER AT THE ITU Candidate for the ITU Council in Region D KENYA: CANDIDATE FOR ITU COUNCIL IN REGION D (AFRICA) The Republic of Kenya has been a member of the International Telecommunication

More information

IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities

IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities 59 th General Conference Senior Regulators Meeting Security Session 16 September 2015 IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities Khammar Mrabit Director,

More information

Accountability Conceptual Framework

Accountability Conceptual Framework Accountability Conceptual Framework Massimo Felici, HP Trust in the Digital World and Cyber Security & Privacy EU Forum Brussels,18 th April 2013 Motivations for an accountability-based approach Drivers

More information