1 / 26

ITU-T Study Group 11 activities to combat counterfeit ICT equipment

Combating Counterfeit and Substandard ICT Devices (Geneva, Switzerland, 17-18 November 2014). ITU-T Study Group 11 activities to combat counterfeit ICT equipment. Isaac BOATENG (SG11 vice-chair and Q8/11 Rapporteur) & Keith MAINWARING (editor of TR-Counterfeiting). Outline.

jonathond
Download Presentation

ITU-T Study Group 11 activities to combat counterfeit ICT equipment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Combating Counterfeit and Substandard ICT Devices (Geneva, Switzerland, 17-18 November 2014) ITU-T Study Group 11 activities to combat counterfeit ICT equipment Isaac BOATENG (SG11 vice-chair and Q8/11 Rapporteur) & Keith MAINWARING (editor of TR-Counterfeiting)

  2. Outline • Question 8 of Study Group 11 (Q8/11) • Achievements • Current participating Countries/Entities • Revised text for Q8/11 • Work in progress • What next? • Technical Report on Counterfeit and Substandard ICT Equipment • Overview

  3. Combating Counterfeit and Substandard ICT Devices (Geneva, Switzerland, 17-18 November 2014) Question 8 of Study Group 11 (Q8/11) Isaac Boateng National Communications Authority, Ghana, Vice-Chair, ITU-T SG11 & Rapporteur Q8/11

  4. Q8/11 achievements • Contributions and participations in Q8 meetings continue to increase and Q8/11 now attracts one of the largest participations and contributions in SG11 meetings • Q8 July 2014 meeting was attended for the first time by WTO, WCO, WIPO, MMF to discuss a global challenge on Counterfeiting • SG11 consented ​Supplement 64 to ITU-T Q series Recommendations (Y.phys-arch) “Physical Realization of Next Generation Networks” in July 2014 • SG11 agreed to revise the Terms of Reference of Q8/11 to include addressing Counterfeiting issues (07-2014)

  5. Current participating Countries/Entities

  6. Q8/11 Revised Text (1/4) REVISED TITLE: Guidelines for Implementations of Signalling and Protocols and for Addressing Counterfeit ICT devices

  7. Revised Motivation (2/4) • Protocols in packet-based networks are evolving. • Ongoing studies and results achieved by various international standardization bodies have led to the emergence of different solutions to address convergence and interoperability. • The ITU Member States, particularly those in developing countries have expressed the needs for assistance in understanding network and service deployment strategies and scenarios. • Several forums and conferences have also called for ITU assistance in addressing the growing problem of counterfeit telcommunication/ICT products and devices, which is adversely affecting all stakeholders in the ICT field (vendors, governments, operators and consumers). • Cooperation among ITU-T study groups, between ITU-T and ITU-D as well as with external bodies outside the ITU (in particular with SDOs), will be required to gather complete information in this regard.

  8. Revised Study Items (3/4) Study items to be considered include, but are not limited to: • What activity is needed in the ITU‑T Sector to prepare common guidelines by the ITU‑T and ITU‑D Sectors, containing different aspects related to technical matters, in particular to address Counterfeit ICT devices? • What should be taken into account to assure adequate security in the deployment of packet-based networks? • What functional architecture and entities are required to support services and/or applications of public interest such as emergency call handling, lawful interception, number portability, etc.?

  9. Revised Tasks (4/4) • Identify network interconnection scenarios; • Coordinate ITU-T Sector inputs to produce guidelines in cooperation with the ITU-D Sector, that would include any technical aspects as prepared by the relevant study groups: • Develop guidelines to address the problem of counterfeiting of ICT devices; • Identification of protocols consistent with the existing and new service requirements of administrations/operators, for migration from circuit switched networks to packet based networks in the evolution towards NGN/SUN; • Degree of interoperability for services between networks employing different protocols; • Generic guidelines covering aspects of network testing and monitoring; • Prepare the technical guidelines on the signalling requirements and protocol aspects of packet-based networks to support PSTN/ISDN services and their evolution to NGN/SUN.

  10. Work in progress in Q8/11 Keith will present the details of the draft TR-Counterfeiting

  11. What next? • 19-21 November 2014 • Progress and improve draft TR Counterfeit • Plan to approve the Technical Report on Counterfeit • 22-29 April 2015 • Expecting contributions to begin new work item(s) and eventually develop Recommendations

  12. Combating Counterfeit and Substandard ICT Devices (Geneva, Switzerland, 17-18 November 2014) Counterfeit and Substandard ICT EquipmentAn Overview of the ITU-T Technical Report Keith Mainwaring Ukrainian National Information Systems keith.mainwaring@ukrainesystems.com

  13. Technical Report Contents • Introduction: counterfeiting and substandard products– a growing problem • Definitions of counterfeiting and substandard equipment • The impacts of counterfeit and substandard ICT equipment and components • Intellectual Property Rights Conventions • IPR enforcement • Industry anti-counterfeiting forums • Measures to combat counterfeit and substandard equipment • Standards organisations • Guidelines for combating counterfeiting • Conclusions • ITU engagement • ANNEX A Systems for identifying counterfeit or contraband mobiles devices

  14. 3 The impacts of counterfeit and substandard ICT equipment and components • 3.1 Counterfeit and Substandard ICT Equipment Examples • 3.1.1 Mobile Phones • 3.1.2 Accessories and Components for ICT Products • 3.1.2 Two-way Radios • 3.1.3 Digital Cameras • 3.1.4 Personal Computers & Tablets • 3.1.5 Electronic Children’s Toys

  15. 5 IPR enforcement • 5.1 World Intellectual Property Organisation (WIPO) • 5.2 World Trade Organization – Council for TRIPS • 5.3 UN Office of Drugs and Crime (UNODC) • 5.4 World Customs Organisation (WCO) • 5.5 European Union • 5.6 G8 Heiligendamm Process • 5.7 Interpol • 5.8 United Nations Economic Commission for Europe (UNECE) • 5.9 National Initiatives (just a few examples) • 5.9.1 France • 5.9.2 UK Intellectual Property Office • 5.9.3 Kenya Anti-Counterfeit Agency • 5.9.4 US - China Joint Commission on Commerce and Trade

  16. 6 Industry anti-counterfeiting forums • 6.1 International Chamber of Commerce (ICC) • 6.2 International Anti-Counterfeiting Coalition (IACC) • 6.3 Mobile Manufacturers Forum (MMF) • 6.4 Association of Service and Computer Dealers International and North American Association of Telecommunications Dealers (AscdiNatd) • 6.5 Alliance for Gray Market and Counterfeit Abatement (AGMA) • 6.6 British Electrotechnical and Allied Manufacturers Association (BEAMA) Anti-counterfeit Working Group • 6.7 UKEA (United Kingdom Electronics Alliance) • 6.8 Anti-Counterfeiting Group (ACG) • 6.9 UNIFAB - Union des Fabricants  • 6.10 International Electronics Manufacturing Initiative (iNEMI)

  17. 7 Measures to combat counterfeit and substandard equipment (1) • 7.1 Introduction • 7.2 Abuse of Identifiers and Type Approval Logos • 7.3 International Mobile Equipment Identity (IMEI) • 7.4 Unique identifiers • GS1 Electronic Product Codes • ISO/IEC 15459 unique identifiers for supply chain tracking • ucode Ubiquitous ID Centre • Object Identifiers • CNRI’s Digital Object Architecture

  18. 7 Measures to combat counterfeit and substandard equipment (2) • 7.5 Automatic Identification and Data Capture (AIDC) • 7.5.1 Barcodes • 7.5.2 RFID • 7.6 Secure printing and hologram labels • 7.7 Supply chain management • ISO 28000 series • The World Customs Organisation (WCO) SAFE Framework of Standards • IEC TC 107 • SAE International

  19. 7 Measures to combat counterfeit and substandard equipment (3) • 7.8 Testing • IEC System of Conformity Assessment Schemes for Electrotechnical Equipment and Components • 7.9 Databases • 7.10 Market surveillance

  20. ANNEX A Systems for identifying counterfeit or contraband mobiles devices (1) • A.1 Examples of measures taken by national administrations and regulators • A.1.1 Azerbaijan • A.1.2 Colombia • A.1.3 Egypt • A.1.4 India • A.1.5 Indonesia • A.1.6 Kenya • A.1.7 Rwanda • A.1.8 Sri Lanka • A.1.9 Turkey • A.1.10 Uganda • A.1.11 Ukraine • A.1.12 United Arabs Emirates

  21. ANNEX A Systems for identifying counterfeit or contraband mobiles devices (2) • A.2 Examples of joint measures on regional level • A.2.1 Inter-American Telecommunication Commission (CITEL) • A.2.2 East African Community (EAC) • A.2.3 Association of the Communications and Telecommunications Regulators of the Community of Portuguese Speaking Countries (ARCTEL-CPLP)

  22. Many thanks! Keith Mainwaring (UNIS, Ukraine) keith.mainwaring@ukrainesystems.com Isaac Boateng (NCA, Ghana) isaac.boateng@nca.org.gh

  23. Additional Slides

  24. Q8/11 Number of meetings • F2F meetings • Will be 5 times in November • Feb. 2013, Nov. 2013, Feb. 2014, July 2014 * Nov. 2014 • Total of 38 sessions • E-meetings • 3 times in 2014 • 28th August, 30th September and 22nd October • Total of 9 sessions

  25. Q8/11 Contributions received

  26. Q8/11 Inc./out. Liaison Statements

More Related