Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Similar documents
RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 67 (Rev. Buenos Aires, 2017)

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

Cybersecurity & Spam after WSIS: How MAAWG can help

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Promoting Global Cybersecurity

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

RESOLUTION 140 (REV. BUSAN, 2014)

Asia-Pacific Telecommunity Administrations ASIA-PACIFIC COMMON PROPOALS FOR THE WORK OF THE CONFERENCE

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

Cybersecurity for ALL

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Regional Development Forum For the Arab States(RDF-ARB) 2018

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

Commonwealth Cyber Declaration

Internet Governance and the World Summit on the Information Society (WSIS)

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

INTERNATIONAL TELECOMMUNICATION UNION

Related to the Internet

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

RESOLUTION 47 (Rev. Buenos Aires, 2017)

ITU Academia. Smart Partnership for ICT4SDG. Jaroslaw K. PONDER Coordinator for Europe Region

GENERAL ASSEMBLY RESOLUTION A/RES/67/195. Information and communications technologies for development

INTERNATIONAL TELECOMMUNICATION UNION. WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, November 2012

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

Global cybersecurity and international standards

2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)]

A1. Actions which have been undertaken by Governments

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/65/433)]

UPU UNIVERSAL POSTAL UNION. CA C 4 SDPG AHG DRM Doc 3. Original: English COUNCIL OF ADMINISTRATION. Committee 4 Development Cooperation

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

World Conference on International Telecommunications 2012 (WCIT-12) Arab Views on the ITRs and the WCIT-2012

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

Draft Resolution for Committee Consideration and Recommendation

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Joint Declaration by G7 ICT Ministers

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]

Security and resilience in Information Society: the European approach

2014 ITU Plenipotentiary Conference PP-14 SNAPSHOT OF SOME OF THE KEY ISSUES

WSIS Action Lines Roadmaps C2, C5, C6

WSIS Forum Open Consultation Process

13967/16 MK/mj 1 DG D 2B

RESOLUTION ADOPTED BY THE GENERAL ASSEMBLY. [on the report of the Second Committee (A/54/588/Add.2)]

ITU FRAMEWORK FOR COOPERATION IN EMERGENCIES

ITU, UNESCO. Comments submitted jointly by ITU and UNESCO on chapters one and four of the operational part of the Tunis Final Documents

Resolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)]

General Secretariat (SG)

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

TUNIS AGENDA FOR THE INFORMATION SOCIETY INTRODUCTION

INTERNATIONAL TELECOMMUNICATION UNION. WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, November 2012

Bridging Standardization Gap BDT Sylvester Cadette

Internet Governance for Operators

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

General Secretariat (SG)

THE CONNECT 2020 AGENDA FOR GLOBAL TELECOMMUNICATION/ICT DEVELOPMENT. April 8, 2015

Global Cybersecurity Agenda

ITU-T Study Group 5. Environment, Climate Change and Circular Economy. Qi Shuguang Vice Chairman. ITU-T Study Group 5.

Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

National Policy and Guiding Principles

UN FREEDOM OF INFORMATION POLICIES INTERNATIONAL TELECOMMUNICATION UNION (ITU)

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Encouraging the deployment of IPv6 in the developing countries

Cyber Security in Europe

World Summit on the Information Society (WSIS) and the Digital Divide

PacNOG-21. Migrating to IPv6 : Experiences from Asia-Pacific

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release September 23, 2014 EXECUTIVE ORDER

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015!

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

CHAPTER 13 ELECTRONIC COMMERCE

GUIDING PRINCIPLES I. BACKGROUND. 1 P a g e

Smart Sustainable Cities

UN/Germany Conference November 2017 Thematic Priority 6: International cooperation towards low-emission and resilient societies

Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

DIGITAL AGENDA FOR EUROPE

Garry Mukelabai Communications Authority Zambia

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

Transcription:

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 WGPL AHG Document DL/13(Rev.2)- E 28 October 2014 English only WGPL Ad Hoc Group on Resolution 174 RESOLUTION 174 (GUADALAJARA, 2010REV. BUSAN, 2014) ITU's role with regard to international public policy issues relating to the risk of illicit use of information and communication technologies The Plenipotentiary Conference of the International Telecommunication Union (Guadalajara, 2010Busan, 2014), aware a) that technological innovation driven by information and communication technologies (ICTs) has significantly modified the ways in which people access telecommunications; b) that the illicit use of ICTs could have a detrimental impact on a Member State's infrastructure, national security and economic development; c) that the definition of "telecommunication", as stated in the ITU Constitution, reads as follows: "Any transmission, emission or reception of signs, signals, writing, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic systems", reaffirming a) Resolutions 55/63 and 56/121 of the United Nations General Assembly, which established the legal framework on countering the criminal misuse of information technologies; b) Resolution 57/239 of the United Nations General Assembly, on the creation of a global culture of cybersecurity; c) Resolution 58/199 of the United Nations General Assembly, on the creation of a global culture of cybersecurity and the protection of essential information infrastructures; www.itu.int/plenipotentiary/ C:\USERS\MANIAS\DROPBOX\PROPOSALMANAGEMENT\PROPOSALSHARING\PP14\TEMPLATES\PP14- E.DOCX 29.10.14 00.00.00

2 d) Resolution 41/65 of the United Nations General Assembly, on principles relating to remote sensing of the Earth from outer space,; [CUB/70/3 Cuba To be Further discussed e) Resolution 68/243 of the United Nations General Assembly, on developments in the field of information and telecommunications in the context of international security, ARB/79A4/4 - Arab e) Resolutions 65/41, 66/24, 67/27 and 68/243 of the United Nations General Assembly, on developments in the field of information and telecommunications in the context of international security, B/75/6 - Brazil e) Resolution 68/167 of the United Nations General Assembly, on the right to privacy in the digital age, which affirms, inter alia, "that the same rights the people have off line must also be protected on line, including the right to privacy",] considering a) that, in the Geneva Declaration of Principles, the World Summit on the Information Society (WSIS) (Geneva, 2003) supported the activities of the United Nations to prevent the potential use of ICTs for purposes that are inconsistent with the objectives of maintaining international stability and security, and may adversely affect the integrity of the infrastructure within States, to the detriment of their security, and that it is necessary to prevent the use of information resources and technologies for criminal and terrorist purposes, while respecting human rights ( 36, WSIS Geneva Declaration of Principles); b) that Action Line C5 (Building confidence and security in the use of ICTs) of the Geneva Plan of Action stipulates the following: "Governments, in cooperation with the private sector, should prevent, detect and respond to cybercrime and misuse of ICTs by: developing guidelines that take into account ongoing efforts in these areas; considering legislation that allows for effective investigation and prosecution of such misuse; promoting effective mutual assistance efforts; strengthening institutional support at the international level for preventing, detecting and recovering from such incidents; and encouraging education and raising awareness", considering further that WSIS (Tunis, 2005) identified ITU as moderator for the implementation of Action Line C5 (Building confidence and security in the use of ICTs), recalling a) Resolution 130 (Rev. Antalya, 2006 Guadalajara, 2010) of the Plenipotentiary Conference, on strengthening the role of ITU in building confidence and security in the use of ICTs; b) Resolution 102 (Rev. Antalya, 2006 Guadalajara, 2010) of the Plenipotentiary Conference, on ITU's role with regard to international public policy issues pertaining to the Internet and the management of Internet resources, including domain names and addresses;

3 c) Resolution 71 (Rev. Antalya, 2006Busan, 2014) of the Plenipotentiary Conference, in particular strategic goal 43: "Developing tools, based on contributions from the membership, to promote end- user confidence, and to safeguard the efficiency, security, integrity and interoperability of networks" Sustainability Manage challenges resulting from telecommunication/ict development, which establish Union focus on enhancing the sustainable and safe use of telecommunication/icts, in close collaboration with other organizations and entities ; d) Resolutions 1282 and 1305 of the ITU Council, the latter of which listed issues pertaining to the use and misuse of the Internet among the main tasks of the role of the Dedicated Group in identifying international Internet- related public policy issues; e) Resolution 45 (Rev. Hyderabad, 2010 Dubai, 2014) of the World Telecommunication Development Conference (WTDC), on mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam; f) thehyderabad Dubai Declaration adopted by WTDC, in particular the Cybersecurity Programme2 (Cybersecurity, ICT applications and IP- based network- related issues); f) thehyderabad Dubai DeclarationDubai Action Plan adopted by WTDC, in particular Programme 2 (Cybersecurity, ICT applications and IP- based network- related issues) Objective 3 (Enhance confidence and security in the use of telecommunications/icts, and roll- out of relevant applications and services); g) Resolutions 50 and 52 (Rev. Johannesburg, 2008 Dubai, 2012) of the World Telecommunication Standardization Assembly, on cybersecurity and countering and combating spam,; h) that WTDC- 14 adopted Resolution 45 (Rev. Dubai, 2014), on mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam, [h) that Question 22/1 of the Telecommunication Development Sector (ITU- D) deals with the securing of information and communication networks through the identification of best practices for developing a culture of cybersecurity, and that WTDC- 14 adopted Resolution 45 (Rev. Dubai, 2014), on mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam, that Question 22/1 of the Telecommunication Development Sector (ITU- D) deals with the securing of information and communication networks through the identification of best practices for developing a culture of cybersecurity,] recognizing further a) that global cooperation and collaboration between Member States, the international organizations and all other stakeholders, are necessary in order to address and prevent the illicit use of ICTs; b) the moderating and facilitating role assigned to the Union under Action Line C5 as referred to above, [b) that multilateral cooperation between Member States and stakeholders, including the ICT private sector, in the field of preventing and combating the risks of misuse of ICTs is essential and

4 important for the sustainable social and economic development of countries and their national security; b) that cooperation between Member States and stakeholders, including the ICT private sector, in the field of preventing and combating risk of illicit use of information and communication technologies is essential and important for the sustainable social and economic development of countries and their security; c) that there is a need to identify collective preventive measures in order to mitigate the effects of illicit use of ICTs at the global level, particularly in developing countries;] c) That sharing information at global level about security practices is of particular value to developing countries in mitigating the effects of illicit uses of ICTs noting a) the importance of ICTs, including telecommunications, for the social and economic development of countries, especially developing countries, through the creation of new public services that facilitate public access to information and enhanced transparency within public administrations and can be helpful for the monitoring and observation of climate change, the management of natural resources and reduction of the risk of natural disasters; b) the vulnerability of critical national infrastructures, their increasing dependence on ICTs and the threats resulting from the illicit use of ICTs, resolves to instruct the Secretary- General to take the necessary measures in order to: i) raise the awareness of Member States regarding the adverse impact that may result from the illicit use of information and communication resources; ii) maintain the role of ITU to cooperate within its mandate with other United Nations bodies in combating the illicit use of ICTs,; [iii) start reflection on the implementation of a global charter related to ICT security, taking into account the work of the ITU Sectors, in particular ITU- T Study Group 2 Question 3/2, on securing information and communication networks: Best practices for developing a culture of cybersecurity, and ITU- T Study Group 17, on security, - ] iii) Inform the Secretary General of the United Nation about the activities undertaken by ITU in implementing this resolution and the ITU recommendations in this regards iv) continue to raise awareness, within the mandate of the ITU of the need to mitigate the risks and related threats posed by illicit use of ICTs, and continue to promote cooperation among appropriate international and regional organizations

5 requests the Secretary- General 1 in his capacity as facilitator for Action Line C5 on building confidence and security in the use of ICTs, to organize international and regional meetings and dialogue of Member States and relevant ICT stakeholders, including geospatial and information service providers, to discuss alternative approaches to solutions and opportunities for regional and global cooperation to address and prevent the illicit application of ICTs, while taking into consideration the overall interests of the ICT industry, [2 to continue his efforts to promote international dialogue and support cooperation,including multilateral and bilateral, in combating the illicit use of ICTs, and to encourage regional cooperation initiatives, 2 to continue his participation in international dialogue and relevant cooperation,including multilateral and bilateral, in combating the illicit use of ICTs, and to encourage regional cooperation initiatives,] to take into account the activities of the three ITU Sectors, and take appropriate measures in order to contribute effectively to the relevant international discussions and initiatives on issues related to the threats caused and the potential misuse and/or illicit use of telecommunications/icts within ITU's mandate,] 2 when carrying out its activities, to take into account ITU relevant initiatives related to combating threats caused by the illicit use of telecommunication/icts within the ITU s mandate, as appropriate. invites Member States and relevant ICT stakeholders to pursue their dialogue at the regional and national levels in order to find mutually acceptable solutions, invites the Secretary- General to collect best practices in terms of actions taken by Member States to prevent the illicit use of ICTs and to provide assistance to interested Member States, as appropriate, toregularly collect and mainstream disseminate best practices in terms of actions taken by Member States to prevent the illicit use of ICTs and to provide technical assistance to interested Member States, as appropriate, instructs the Secretary- General to report to the Council and to the next plenipotentiary conference on the measures taken for] progress made on the implementation of this resolution, invites Member States to provide the necessary support for the implementation of this resolution.