|
Work item:
|
Q.Sup.RCV-DVC
|
|
Subject/title:
|
Supplement on Procedures for recovering stolen devices
|
|
Status:
|
Under study
|
|
Approval process:
|
Agreement
|
|
Type of work item:
|
Recommendation
|
|
Version:
|
New
|
|
Equivalent number:
|
-
|
|
Timing:
|
2027-Q1 (Medium priority)
|
|
Liaison:
|
SG17, ITU-D Q4/2
|
|
Supporting members:
|
Brazil, C-DOT India, Ghana, Uganda
|
|
Summary:
|
This supplement describes procedures that aims the recovery of mobile devices reported stolen, using telecommunications networks resources and through collaboration between Mobile Network Operators (MNOs), Public and Safety authorities and financial institutions.
Recommendation ITU-T Q.5054 describes a Reference unified platform framework (RUPF) in section 8, in which it’s stated that:
The ubiquitous access of RUPF to consumers will enable them to check whether the mobile telecommunication/ICT device (which may be new, second-hand or refurbished) that they are buying is counterfeit or stolen. If it is stolen or counterfeit, consumers will be protected from buying counterfeit, tampered or stolen devices and will also be able to report to LEAs that could take action to track and recover such devices. This will act as a strong deterrent against thieves and counterfeiters.
Also, Recommendation ITU-T Q.5055 (ex Q.CEIR) describes that a central equipment identity register (CEIR) can be used for tracking stolen devices:
The lost or stolen mobile device is reported by the MNO if its usage is attempted and the corresponding traceability details may be presented to the local/regional/State police for recovery
Therefore, this supplement is to provide detailed information about developing a procedure that can successfully recover a reported stolen mobile phone.
|
|
Comment:
|
-
|
|
Reference(s):
|
|
|
Historic references:
|
|
Contact(s):
|
|
| ITU-T A.5 justification(s): |
|
|
|
|
First registration in the WP:
2025-12-01 17:10:29
|
|
Last update:
2025-12-02 13:18:35
|