SlideShare a Scribd company logo
WCIT-12
by Jongsoo(Jay) Yoon

iwillbe99@gmail.com
twitter @iwillbe99
www.jayyoon.com

http://www.flickr.com/photos/60648084@N00/2462966749/
http://creativecommons.org/licenses/by-nc-sa/2.0/deed.ko
ITU(International Telecommunication Union)
!

•An agency of the UN
•193 Member States
•around 700 Sector Members and Associates
!

ITU Sectors
!

•Radiocommunication (ITR-U)
•Standardization (ITR-T)
•Development (ITU-D)
!

The Plenipotentiary Conference
!

•the top policy-making body of the ITU.
•Held every four years, next one will be held in Busan in
2014

!
ITRs(International Telecommunication Regulations)
!

•ITRs : a binding international treaty developed in 1988
(ITU-T Recommendations : non-mandatory status until they
are adopted in national laws)
•can be amended through WCIT (World Conference on
International Telecommunications)
!
!

WCIT -12
!

•in December 3~14, 2012, in Dubai
•amending ITRs for the first time since 1988
Signatories of the Final Acts: 89 have signed, 55 have not
ITRs
!

•Preamble
•Article 1 Purpose and scope of the Regulations
•Article 2 Definitions
•Article 3 International network
•Article 4 International telecommunication services
•Article 5 Safety of life and priority of telecommunications
•Article 5A Security and robustness of networks
•Article 5B Unsolicited bulk electronic communications
•Article 6 Charging and accounting
•Article 7 Suspension of services
•Article 8 Dissemination of information
•Article 8A Energy efficiency/e-waste
•Article 8B Accessibility
•Article 9 Special arrangements
•Article 10 Final provisions
Preamble
!

Member States affirm their commitment to implement
these Regulations in a manner that respects and upholds
their human rights obligations.
!

These Regulations recognize the right of access of
Member States to international telecommunication
services.
!
!

Article 1
!

1.1 a) .... These Regulations do not address the contentrelated aspects of telecommunications.
!
!
ARTICLE 5A Security and robustness of networks
Member States shall individually and collectively endeavour to
ensure the security and robustness of international
telecommunication networks in order to achieve effective use
thereof and avoidance of technical harm thereto, as well as the
harmonious development of international telecommunication
services offered to the public.
!

ARTICLE 5B Unsolicited bulk electronic communications
!

41C Member States should endeavour to take necessary
measures to prevent the propagation of unsolicited bulk
electronic communications and minimize its impact on
international telecommunication services. Member States are
encouraged to cooperate in that sense.
RESOLUTION PLEN/3 (DUBAI, 2012)
!
To foster an enabling environment for the greater growth of the Internet The
World Conference on International Telecommunications (Dubai, 2012),
!
recognizing
a) the outcome documents of the Geneva (2003) and Tunis (2005) phases
of the World Summit on the Information Society (WSIS);
b) that the Internet is a central element of the infrastructure of the
information society, which has evolved from a research and academic
facility into a global facility available to the public;
c) the importance of broadband capacity to facilitate the delivery of a
broader range of services and applications, promote investment and provide
Internet access at affordable prices to both existing and new users;
d) the valuable contribution of all stakeholder groups in their respective
roles, as recognized in § 35 of the Tunis Agenda for the Information Society,
to the evolution, functioning and development of the Internet;
e) that, as stated in the WSIS outcomes, all governments should have an
equal role and responsibility for international Internet governance and for
ensuring the stability, security and continuity of the existing Internet and its
future development and of the future internet, and that the need for
development of public policy by governments in consultation with all
stakeholders is also recognized;
f) Resolutions 101, 102 and 133 (Rev. Guadalajara, 2010) of the
Plenipotentiary Conference,
resolves to invite Member States
!
1 to elaborate on their respective positions on international Internet-related
technical, development and public-policy issues within the mandate of ITU at
various ITU forums including, inter alia, the World Telecommunication/ICT
Policy Forum, the Broadband Commission for Digital Development and ITU
study groups;
2 to engage with all their stakeholders in this regard,
!
instructs the Secretary-General
!
1 to continue to take the necessary steps for ITU to play an active and
constructive role in the development of broadband and the multistakeholder
model of the Internet as expressed in § 35 of the Tunis Agenda;
2 to support the participation of Member States and all other stakeholders, as
applicable, in the activities of ITU in this regard.
Copyright by Jay Yoon(www.jayyoon.kr)
Except

More Related Content

What's hot

Net Neutrality
Net NeutralityNet Neutrality
Net Neutrality
Lauren Pressley
 
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESA WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
ijcsit
 
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Charles Mok
 
Marsden net neutrality in the European Parliament
Marsden net neutrality in the European ParliamentMarsden net neutrality in the European Parliament
Marsden net neutrality in the European ParliamentChris Marsden
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
Commonwealth Telecommunications Organisation
 
Network Neutrality and Quality of Experience
Network Neutrality and Quality of ExperienceNetwork Neutrality and Quality of Experience
Network Neutrality and Quality of Experience
Toshiya Jitsuzumi
 
FirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local GovernmentsFirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local Governments
Best Best and Krieger LLP
 
Promo doc tegtdc
Promo doc tegtdcPromo doc tegtdc
Promo doc tegtdc
Pankaj Mitra
 
COM494 Internet Revolution
COM494 Internet RevolutionCOM494 Internet Revolution
COM494 Internet Revolution
Kyounghee Hazel Kwon
 
(Pre-) history of European Network Neutrality and Human Rights
(Pre-) history of European Network Neutrality and Human Rights(Pre-) history of European Network Neutrality and Human Rights
(Pre-) history of European Network Neutrality and Human RightsChris Marsden
 
Andrew Campling-Digital Gateway Seminar
Andrew Campling-Digital Gateway SeminarAndrew Campling-Digital Gateway Seminar
Andrew Campling-Digital Gateway SeminarTGLP
 
Internet for Everyone
Internet for EveryoneInternet for Everyone
Internet for Everyone
ijtsrd
 
Internet governance and the filtering problems
Internet governance and the filtering problemsInternet governance and the filtering problems
Internet governance and the filtering problems
Tan Tran
 
Internet governance and Development 140305
Internet governance and Development 140305Internet governance and Development 140305
Internet governance and Development 140305
Izumi Aizu
 
Internet Society Hong Kong -- Chapter introduction
Internet Society Hong Kong -- Chapter introductionInternet Society Hong Kong -- Chapter introduction
Internet Society Hong Kong -- Chapter introduction
Charles Mok
 
Digital Gateway Seminar: Andrew Campling Presentation
Digital Gateway Seminar: Andrew Campling Presentation Digital Gateway Seminar: Andrew Campling Presentation
Digital Gateway Seminar: Andrew Campling Presentation ThamesGateway
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 

What's hot (20)

Net Neutrality
Net NeutralityNet Neutrality
Net Neutrality
 
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESA WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
 
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
 
Marsden net neutrality in the European Parliament
Marsden net neutrality in the European ParliamentMarsden net neutrality in the European Parliament
Marsden net neutrality in the European Parliament
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Bsnl Broadband
Bsnl BroadbandBsnl Broadband
Bsnl Broadband
 
Network Neutrality and Quality of Experience
Network Neutrality and Quality of ExperienceNetwork Neutrality and Quality of Experience
Network Neutrality and Quality of Experience
 
FirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local GovernmentsFirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local Governments
 
Promo doc tegtdc
Promo doc tegtdcPromo doc tegtdc
Promo doc tegtdc
 
COM494 Internet Revolution
COM494 Internet RevolutionCOM494 Internet Revolution
COM494 Internet Revolution
 
(Pre-) history of European Network Neutrality and Human Rights
(Pre-) history of European Network Neutrality and Human Rights(Pre-) history of European Network Neutrality and Human Rights
(Pre-) history of European Network Neutrality and Human Rights
 
Andrew Campling-Digital Gateway Seminar
Andrew Campling-Digital Gateway SeminarAndrew Campling-Digital Gateway Seminar
Andrew Campling-Digital Gateway Seminar
 
Cocooning
CocooningCocooning
Cocooning
 
Internet for Everyone
Internet for EveryoneInternet for Everyone
Internet for Everyone
 
Internet governance and the filtering problems
Internet governance and the filtering problemsInternet governance and the filtering problems
Internet governance and the filtering problems
 
Internet governance and Development 140305
Internet governance and Development 140305Internet governance and Development 140305
Internet governance and Development 140305
 
Internet Society Hong Kong -- Chapter introduction
Internet Society Hong Kong -- Chapter introductionInternet Society Hong Kong -- Chapter introduction
Internet Society Hong Kong -- Chapter introduction
 
Digital Gateway Seminar: Andrew Campling Presentation
Digital Gateway Seminar: Andrew Campling Presentation Digital Gateway Seminar: Andrew Campling Presentation
Digital Gateway Seminar: Andrew Campling Presentation
 
Stx Citinet
Stx CitinetStx Citinet
Stx Citinet
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 

Viewers also liked

Real money trade
Real money tradeReal money trade
Real money trade
Jay Yoon
 
인터넷 규제와 개방성
인터넷 규제와 개방성인터넷 규제와 개방성
인터넷 규제와 개방성
Jay Yoon
 
개인정보보호법제(201205)
개인정보보호법제(201205)개인정보보호법제(201205)
개인정보보호법제(201205)Jay Yoon
 
창작과 공유
창작과 공유창작과 공유
창작과 공유
Jay Yoon
 
잊혀질 권리
잊혀질 권리잊혀질 권리
잊혀질 권리Jay Yoon
 
소유에서 공유로
소유에서 공유로소유에서 공유로
소유에서 공유로Jay Yoon
 
반공유재의 비극
반공유재의 비극반공유재의 비극
반공유재의 비극Jay Yoon
 

Viewers also liked (7)

Real money trade
Real money tradeReal money trade
Real money trade
 
인터넷 규제와 개방성
인터넷 규제와 개방성인터넷 규제와 개방성
인터넷 규제와 개방성
 
개인정보보호법제(201205)
개인정보보호법제(201205)개인정보보호법제(201205)
개인정보보호법제(201205)
 
창작과 공유
창작과 공유창작과 공유
창작과 공유
 
잊혀질 권리
잊혀질 권리잊혀질 권리
잊혀질 권리
 
소유에서 공유로
소유에서 공유로소유에서 공유로
소유에서 공유로
 
반공유재의 비극
반공유재의 비극반공유재의 비극
반공유재의 비극
 

Similar to Wcit 12

Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222
Asian Paint Bangladesh Ltd
 
Национальные стратегии электронного развития: состояние и перспективы (2010)
Национальные стратегии электронного развития: состояние и перспективы (2010)Национальные стратегии электронного развития: состояние и перспективы (2010)
Национальные стратегии электронного развития: состояние и перспективы (2010)
Victor Gridnev
 
ITU Committed to connecting the world
ITU Committed to connecting the worldITU Committed to connecting the world
ITU Committed to connecting the world
Dr Lendy Spires
 
ITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENGITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENGRoger G Bunch
 
ICT Devolpment Report 2010
ICT Devolpment Report 2010ICT Devolpment Report 2010
ICT Devolpment Report 2010iLatam
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
IGF Indonesia
 
Strategies for the promotion of broadband services and infrastructure: a case...
Strategies for the promotion of broadband services and infrastructure: a case...Strategies for the promotion of broadband services and infrastructure: a case...
Strategies for the promotion of broadband services and infrastructure: a case...
Ed Dodds
 
Bueti introduction
Bueti introductionBueti introduction
Bueti introduction
PrakashKhanal16
 
Bueti introduction
Bueti introductionBueti introduction
Bueti introduction
PrakashKhanal16
 
The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in CyberspaceThe Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
Community Protection Forum
 
I n t e r n a ti o n al tel ec omm u nic a ti o n u ni o n
I n t e r n a ti o n al tel ec omm u nic a ti o n u ni o nI n t e r n a ti o n al tel ec omm u nic a ti o n u ni o n
I n t e r n a ti o n al tel ec omm u nic a ti o n u ni o n
CMR WORLD TECH
 
Wsis10 alf reporting-c2
Wsis10 alf reporting-c2Wsis10 alf reporting-c2
Wsis10 alf reporting-c2
Dr Lendy Spires
 
#Plenipot14 media briefing
#Plenipot14 media briefing#Plenipot14 media briefing
#Plenipot14 media briefing
ITU
 
IoT 2005 от ITU
IoT 2005 от ITUIoT 2005 от ITU
IoT 2005 от ITU
Alexey Kondrashov
 
Broadband bb annual report2013
Broadband bb annual report2013Broadband bb annual report2013
Broadband bb annual report2013
CMR WORLD TECH
 
Broadband penetration worldwide
Broadband penetration worldwideBroadband penetration worldwide
Broadband penetration worldwide
Dmytro Lysiuk
 
The State of Broadband 2013
The State of Broadband 2013 The State of Broadband 2013
The State of Broadband 2013
aminelam
 
MODULE 2.pptx
MODULE 2.pptxMODULE 2.pptx
MODULE 2.pptx
shraddhakathuria
 

Similar to Wcit 12 (20)

Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222
 
Национальные стратегии электронного развития: состояние и перспективы (2010)
Национальные стратегии электронного развития: состояние и перспективы (2010)Национальные стратегии электронного развития: состояние и перспективы (2010)
Национальные стратегии электронного развития: состояние и перспективы (2010)
 
ITU Committed to connecting the world
ITU Committed to connecting the worldITU Committed to connecting the world
ITU Committed to connecting the world
 
ITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENGITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENG
 
ICT Devolpment Report 2010
ICT Devolpment Report 2010ICT Devolpment Report 2010
ICT Devolpment Report 2010
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
Strategies for the promotion of broadband services and infrastructure: a case...
Strategies for the promotion of broadband services and infrastructure: a case...Strategies for the promotion of broadband services and infrastructure: a case...
Strategies for the promotion of broadband services and infrastructure: a case...
 
Bueti introduction
Bueti introductionBueti introduction
Bueti introduction
 
Bueti introduction
Bueti introductionBueti introduction
Bueti introduction
 
The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in CyberspaceThe Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
 
I n t e r n a ti o n al tel ec omm u nic a ti o n u ni o n
I n t e r n a ti o n al tel ec omm u nic a ti o n u ni o nI n t e r n a ti o n al tel ec omm u nic a ti o n u ni o n
I n t e r n a ti o n al tel ec omm u nic a ti o n u ni o n
 
Wsis10 alf reporting-c2
Wsis10 alf reporting-c2Wsis10 alf reporting-c2
Wsis10 alf reporting-c2
 
#Plenipot14 media briefing
#Plenipot14 media briefing#Plenipot14 media briefing
#Plenipot14 media briefing
 
IoT 2005 от ITU
IoT 2005 от ITUIoT 2005 от ITU
IoT 2005 от ITU
 
Broadband bb annual report2013
Broadband bb annual report2013Broadband bb annual report2013
Broadband bb annual report2013
 
Broadband penetration worldwide
Broadband penetration worldwideBroadband penetration worldwide
Broadband penetration worldwide
 
The State of Broadband 2013
The State of Broadband 2013 The State of Broadband 2013
The State of Broadband 2013
 
Competitionregulation
CompetitionregulationCompetitionregulation
Competitionregulation
 
Competitionregulation
CompetitionregulationCompetitionregulation
Competitionregulation
 
MODULE 2.pptx
MODULE 2.pptxMODULE 2.pptx
MODULE 2.pptx
 

More from Jay Yoon

공공데이터 분쟁조정사례
공공데이터 분쟁조정사례공공데이터 분쟁조정사례
공공데이터 분쟁조정사례
Jay Yoon
 
지적재산권법의 기원
지적재산권법의 기원지적재산권법의 기원
지적재산권법의 기원
Jay Yoon
 
모바일오픈마켓
모바일오픈마켓모바일오픈마켓
모바일오픈마켓
Jay Yoon
 
디지털시대의 공유 고려대
디지털시대의 공유 고려대디지털시대의 공유 고려대
디지털시대의 공유 고려대Jay Yoon
 
CCL 종합
CCL 종합CCL 종합
CCL 종합Jay Yoon
 
Ccl and database
Ccl and databaseCcl and database
Ccl and databaseJay Yoon
 
공공데이터의개방과 개인정보보호
공공데이터의개방과 개인정보보호공공데이터의개방과 개인정보보호
공공데이터의개방과 개인정보보호Jay Yoon
 
공공데이터의 개방과 과제
공공데이터의 개방과 과제공공데이터의 개방과 과제
공공데이터의 개방과 과제
Jay Yoon
 
CCL and Database in Korea
CCL and Database in KoreaCCL and Database in Korea
CCL and Database in Korea
Jay Yoon
 
IPR and Commns
IPR and CommnsIPR and Commns
IPR and Commns
Jay Yoon
 
Government 2.0
Government 2.0Government 2.0
Government 2.0
Jay Yoon
 
What Cc Korea Do
What Cc Korea DoWhat Cc Korea Do
What Cc Korea DoJay Yoon
 
CC In Korea
CC In KoreaCC In Korea
CC In KoreaJay Yoon
 

More from Jay Yoon (13)

공공데이터 분쟁조정사례
공공데이터 분쟁조정사례공공데이터 분쟁조정사례
공공데이터 분쟁조정사례
 
지적재산권법의 기원
지적재산권법의 기원지적재산권법의 기원
지적재산권법의 기원
 
모바일오픈마켓
모바일오픈마켓모바일오픈마켓
모바일오픈마켓
 
디지털시대의 공유 고려대
디지털시대의 공유 고려대디지털시대의 공유 고려대
디지털시대의 공유 고려대
 
CCL 종합
CCL 종합CCL 종합
CCL 종합
 
Ccl and database
Ccl and databaseCcl and database
Ccl and database
 
공공데이터의개방과 개인정보보호
공공데이터의개방과 개인정보보호공공데이터의개방과 개인정보보호
공공데이터의개방과 개인정보보호
 
공공데이터의 개방과 과제
공공데이터의 개방과 과제공공데이터의 개방과 과제
공공데이터의 개방과 과제
 
CCL and Database in Korea
CCL and Database in KoreaCCL and Database in Korea
CCL and Database in Korea
 
IPR and Commns
IPR and CommnsIPR and Commns
IPR and Commns
 
Government 2.0
Government 2.0Government 2.0
Government 2.0
 
What Cc Korea Do
What Cc Korea DoWhat Cc Korea Do
What Cc Korea Do
 
CC In Korea
CC In KoreaCC In Korea
CC In Korea
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Wcit 12

  • 1. WCIT-12 by Jongsoo(Jay) Yoon iwillbe99@gmail.com twitter @iwillbe99 www.jayyoon.com http://www.flickr.com/photos/60648084@N00/2462966749/ http://creativecommons.org/licenses/by-nc-sa/2.0/deed.ko
  • 2. ITU(International Telecommunication Union) ! •An agency of the UN •193 Member States •around 700 Sector Members and Associates ! ITU Sectors ! •Radiocommunication (ITR-U) •Standardization (ITR-T) •Development (ITU-D) ! The Plenipotentiary Conference ! •the top policy-making body of the ITU. •Held every four years, next one will be held in Busan in 2014 !
  • 3. ITRs(International Telecommunication Regulations) ! •ITRs : a binding international treaty developed in 1988 (ITU-T Recommendations : non-mandatory status until they are adopted in national laws) •can be amended through WCIT (World Conference on International Telecommunications) ! ! WCIT -12 ! •in December 3~14, 2012, in Dubai •amending ITRs for the first time since 1988
  • 4. Signatories of the Final Acts: 89 have signed, 55 have not
  • 5. ITRs ! •Preamble •Article 1 Purpose and scope of the Regulations •Article 2 Definitions •Article 3 International network •Article 4 International telecommunication services •Article 5 Safety of life and priority of telecommunications •Article 5A Security and robustness of networks •Article 5B Unsolicited bulk electronic communications •Article 6 Charging and accounting •Article 7 Suspension of services •Article 8 Dissemination of information •Article 8A Energy efficiency/e-waste •Article 8B Accessibility •Article 9 Special arrangements •Article 10 Final provisions
  • 6. Preamble ! Member States affirm their commitment to implement these Regulations in a manner that respects and upholds their human rights obligations. ! These Regulations recognize the right of access of Member States to international telecommunication services. ! ! Article 1 ! 1.1 a) .... These Regulations do not address the contentrelated aspects of telecommunications. ! !
  • 7. ARTICLE 5A Security and robustness of networks Member States shall individually and collectively endeavour to ensure the security and robustness of international telecommunication networks in order to achieve effective use thereof and avoidance of technical harm thereto, as well as the harmonious development of international telecommunication services offered to the public. ! ARTICLE 5B Unsolicited bulk electronic communications ! 41C Member States should endeavour to take necessary measures to prevent the propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services. Member States are encouraged to cooperate in that sense.
  • 8. RESOLUTION PLEN/3 (DUBAI, 2012) ! To foster an enabling environment for the greater growth of the Internet The World Conference on International Telecommunications (Dubai, 2012), ! recognizing a) the outcome documents of the Geneva (2003) and Tunis (2005) phases of the World Summit on the Information Society (WSIS); b) that the Internet is a central element of the infrastructure of the information society, which has evolved from a research and academic facility into a global facility available to the public; c) the importance of broadband capacity to facilitate the delivery of a broader range of services and applications, promote investment and provide Internet access at affordable prices to both existing and new users; d) the valuable contribution of all stakeholder groups in their respective roles, as recognized in § 35 of the Tunis Agenda for the Information Society, to the evolution, functioning and development of the Internet; e) that, as stated in the WSIS outcomes, all governments should have an equal role and responsibility for international Internet governance and for ensuring the stability, security and continuity of the existing Internet and its future development and of the future internet, and that the need for development of public policy by governments in consultation with all stakeholders is also recognized; f) Resolutions 101, 102 and 133 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference,
  • 9. resolves to invite Member States ! 1 to elaborate on their respective positions on international Internet-related technical, development and public-policy issues within the mandate of ITU at various ITU forums including, inter alia, the World Telecommunication/ICT Policy Forum, the Broadband Commission for Digital Development and ITU study groups; 2 to engage with all their stakeholders in this regard, ! instructs the Secretary-General ! 1 to continue to take the necessary steps for ITU to play an active and constructive role in the development of broadband and the multistakeholder model of the Internet as expressed in § 35 of the Tunis Agenda; 2 to support the participation of Member States and all other stakeholders, as applicable, in the activities of ITU in this regard.
  • 10. Copyright by Jay Yoon(www.jayyoon.kr) Except
  • 15.  on
  • 20.  a
  • 26.  2.0