Browse Definitions :
Definition

International Telecommunication Union (ITU)

The International Telecommunication Union (ITU) is an agency of the United Nations (UN) whose purpose is to coordinate telecommunication operations and services throughout the world. Originally founded in 1865, as the International Telegraph Union, the ITU is the oldest existing international organization. ITU headquarters are in Geneva, Switzerland.

The ITU consists of three sectors:

  • Radiocommunication (ITU-R) -- ensures optimal, fair and rational use of the radio frequency (RF) spectrum
  • Telecommunication Standardization ( ITU-T ) -- formulates recommendations for standardizing telecommunication operations worldwide
  • Telecommunication Development (ITU-D) -- assists countries in developing and maintaining internal communication operations

The ITU sets and publishes regulations and standards relevant to electronic communication and broadcasting technologies of all kinds including radio, television, satellite , telephone and the Internet . The organization conducts working parties, study groups and meetings to address current and future issues and to resolve disputes. The ITU organizes and holds an exhibition and forum known as the Global TELECOM every four years.

Another important aspect of the ITU's mandate is helping emerging countries to establish and develop telecommunication systems of their own. Although the recommendations of the ITU are non-binding, most countries adhere to them in the interest of maintaining an effective international electronic communication environment.

This was last updated in June 2010

Continue Reading About International Telecommunication Union (ITU)

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

I am look at this on onlie
Cancel
Love your work to the world.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close