UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ITU-T - SERIES Q SUPP 73

Guidelines for permissive versus restrictive system implementations to address counterfeit, stolen and illegal mobile devices

active, Most Current
Organization: ITU-T
Publication Date: 1 March 2021
Status: active
Page Count: 22
scope:

This Supplement provides guidelines for permissive versus restrictive system deployments that should be considered when deciding what approach to employ in order to address the issues of counterfeit, illegal and stolen mobile devices.

Document History

SERIES Q SUPP 73
March 1, 2021
Guidelines for permissive versus restrictive system implementations to address counterfeit, stolen and illegal mobile devices
This Supplement provides guidelines for permissive versus restrictive system deployments that should be considered when deciding what approach to employ in order to address the issues of counterfeit,...

References

Advertisement