The Internet Big Bang: Implications for Financial Services Brand Owners
|
|
- MargaretMargaret Robyn Short
- 6 years ago
- Views:
Transcription
1 The Internet Big Bang: Implications for Financial Services Brand Owners Tony Onorato, Alexis Hunter September 12, 2013
2 Who We Are & What We Do Tony Onorato and Alexis Hunter are long-time commercial litigators with extensive experience as gtld practitioners We advised clients representing nearly 10% of all gtld applications filed worldwide in 2012 Industry-leading clients in the financial services, insurance, software and media, entertainment, Internet, and fashion sectors, on all aspects of gtld policy development, technical aspects of registry operation, and business planning 2
3 Today s Learning Event I. Overview of ICANN & New gtld Program II. III. Program Implications for Financial Sector Companies Key Considerations as Financial Sector Brand Owners A. Brand Protection B. Enforcement C. Risk Mitigation 3
4 I. Overview of ICANN & New gtld Program 4
5 What is ICANN? ICANN is a global multi-stakeholder organization that collaborates with companies, individuals, and governments to oversee development and implementation of Internet policy and standards for technical operations Promotes competition and a secure, stable and interoperable Internet 5
6 Domain Name Hierarchy Top-Level Domain: label to the right-most of the dot Second-Level Domain: label to the left of the dot acquired through a registrar Third-Level-Domains: may be used to direct traffic to an even more specific location on the Internet; usually used to refer to a specific server in an organization 6
7 Domain Name Registration Actors Registry in charge of database of domains ending with a particular top-level domain Registrar sells rights to use particular second-level domains Registrant purchases right to use second-level domain for a designated period of time 7
8 Past Expansion & the Origins of the New gtld Program 23 gtlds in operation There are also 250 cctlds for geo locales (.jp,.co,.uk,.me,.us) In 2005, ICANN commenced policy formulation on large-scale top-level expansion 8
9 New gtld Program In a Nutshell 1,930 applications submitted; approx. 1,800 remain Application Fee = $185,000 per Virtually any gtld could be applied for: Generics:.INC,.ART,.BOOK,.WTF,.SEXY,.PIZZA Brands:.GOOGLE,.WALMART,.NETFLIX,.NBA Geographics:.NYC,.LONDON Communities:.ECO Internationalized Domain Names (IDNs) in non-latin scripts such as Arabic, Cyrillic, and Lao: 點看 (Chinese dot com ); بازار (Arabic bazaar ) 1,400 or so new gtlds could be delegated by
10 10
11 11
12 Financial Brand TLDs 12
13 II. Program Implications for Financial Sector Companies 13
14 The GAC Attacks: GAC Advice The GAC provides government advice to ICANN on issues of public policy In April, the GAC recommended one set of Safeguards for all new gtlds And one for market sectors which have clear and/or regulated entry requirements such as the financial sector, broadly including banks, lenders, investment houses, insurers, etc. 14
15 What Is the GAC Concerned About? Consumer Protection, Sensitive Strings, and Regulated Markets These strings are likely to invoke a level of implied trust from consumers, and carry higher levels of risk associated with consumer harm. 15
16 Safeguards Adopted for All TLDs 1. WHOIS Verification and Checks Registry operators punish 2. Mitigating Abusive Activities 3. Security Assessments and Reporting Actual risk of harm 4. Documentation of WHOIS Checks, Security Threats & Actions Taken 5. Making and Handling Complaints 6. Consequences Real and immediate 16
17 Non-exhaustive List of Financial TLDs Targeted for GAC Enhanced Safeguards.capital.financial.loans.trading.cash.financialaid.market.autoinsurance.broker.forex.markets.bank.brokers.fund.money.banque.claims.investments.pay.carinsurance.exchange.lease.retirement.credit.finance.loan.save.creditcard.mutuelle.netbank.reit.tax.creditunion.insurance.insure.ira.lifeinsurance.mortgage.mutualfunds.versicherung.vermogensberatung.vermogensberater Open / Restricted Open / Closed 17
18 Proposed Enhanced Safeguards If adopted by ICANN in their present form: ES1: Include in its acceptable use policies requirement that registrants comply with all applicable laws, including, e.g., those related to privacy, data collection, consumer protection (including in relation to misleading and deceptive conduct), fair lending, debt collection, and data and financial disclosures ES2: Require registrars, at the time of registration to notify registrants of ES1 Data breach lead to loss of domain? Operator responsible for its registrants? 18
19 Proposed Enhanced Safeguards ES3: Registry operators will require that registrants who collect and maintain sensitive health and financial data implement reasonable and appropriate security measures commensurate with the offering of those services, as defined by applicable law and recognized industry standards Reasonable and appropriate security measures? Recognized industry standards? ES4: Establish a working relationship with the relevant regulatory, or industry self-regulatory, bodies, including developing a strategy to mitigate as much as possible the risks of fraudulent, and other illegal activities Unresponsive regulatory bodies? Who determines for, e.g.,.broker? 19
20 ES5: Registrants must be required by the registry operators to notify to them a single point of contact which must be kept up to date, for the notification of complaints or reports of registration abuse, as well as the contact details of the relevant regulatory, or industry self regulatory, bodies in their main place of business Relevant bodies? Proposed Enhanced Safeguards Regulatory bodies receive complaints? 20
21 Proposed Enhanced Safeguards ES6: At the time of registration, the registry operator must verify and validate the registrants authorisations, charters, licenses and/or other related credentials for participation in that sector Change nature of open TLDs? ES7: In case of doubt with regard to the authenticity of licenses or credentials, Registry Operators should consult with relevant national supervisory authorities, or their equivalents Potentially discriminatory? 21
22 Proposed Enhanced Safeguards ES8: The registry operator must conduct periodic postregistration checks to ensure registrants validity and compliance with the above requirements in order to ensure they continue to conform to appropriate regulations and licensing requirements and generally conduct their activities in the interests of the consumers they serve Potentially discriminatory? 22
23 Status of the Enhanced Safeguards ICANN put on HOLD on the Financial Sector (and other) TLDs The NGPC met on Tuesday and decided... Hope for the best, plan for the worst... 23
24 Ramifications of the Safeguards So, what do the Safeguards mean for REGISTRIES? Tighter rules on security and Whois data checks Additional oversight, cost, and investigative responsibilities More hands on approach for registries to police their TLDs and enforce their acceptable use policies to ensure compliance with applicable laws Increased exposure? 24
25 Ramifications of the Safeguards And, if you want [yourfirm].fund or [yourfirm].investment or [yourfirm].insure, what do the Safeguards mean for REGISTRANTS? Greater record keeping and data disclosure obligations New or enhanced security measures to safeguard consumers information Additional oversight responsibilities Adherence to multijurisdictional laws Proactive protection of domain assets 25
26 III. Key Considerations as Financial Sector Brand Owners 26
27 The Internet Can Be a Dangerous Place 38% of fraud cases are due to and 12% are due to websites in other words, the Internet is used to enable HALF of all fraud each year (FTC Consumer Sentinel Network 2012 Report) The increase in domains will provide a wealth of options for miscreants Over half of the new TLD applications are generics Minimum controls Maximum competition 27
28 Abusive domains increased by 25% from Dec May 2013 Even though the rate at which they are being removed is increasing, it cannot keep up with the rate of abuse The Internet Can Be a Dangerous Place NameSentry Report 2013, Architelos Inc. 28
29 Key Considerations For Brand Owners As brand owners, you need to consider how you will respond to the coming mass expansion Trademark Clearinghouse now Strategize offensive/defensive registration Prepare to combat and budget for enforcement Registration fees TMCH fees Policing and remediating domain name abuse Security risk mitigation, especially in open TLDs 29
30 The Trademark Clearinghouse Repository of verified rights information a database for verified trademarks (1 ) Sunrise and (2) Claims Service Pre-public access Notification of attempts to register domains matching your marks Not intended to block domain name registrations Does not alert to registrations incorporating confusingly similar marks (3) TM+50: claims notices for up to 50 labels 30
31 Proactive Brand Protection Assess global trademark portfolio to determine potential marks to be submitted to the TMCH Organize potential submissions into priority tiers: Importance in the marketplace Geographic reach Likelihood of infringement Potential impact of infringement Longevity of mark (i.e., marks that may be phased out in the near future or that are due to be divested may be a lower priority) 31
32 Proactive Brand Protection Assess potential registries for participation in Sunrises and Landrush Determine potential TLDs for registration: Industry relevance Geographic terms IDNs Future product offerings Likelihood of and impact of infringement in particular TLDs Audit existing domain portfolio clean out the attic 32
33 Post- Launch Uniform Domain Dispute Resolution Procedure ( UDRP ) Uniform Rapid Suspension System ( URS ) Post- Delegation Dispute Resolution Procedure ( PDDRP ) Enforcement Independent administrative proceeding to resolve disputes over alleged abusive domain name registrations / alternative to court for pursuing cases of cybersquatting Intended to provide rapid relief to trademark holders for the most clear-cut cases of infringement For trademark holders to address any largescale infringement concerns directly at the registry level where the registry profits from bad faith registrations / failure to live up to contractual promises to ICANN/safeguards 33
34 Enforcement There is nothing (yet) to stop the endless permutations of *[yourfirm]*.tld that could be registered and used for malicious purposes Enforcing against this abuse is a MUST for brand and reputation protection, especially in sensitive sectors Failure to be vigilant could harm your customers, attract regulatory scrutiny, and mean a failure to comply with your domain s Terms of Use Budget for UDRP/URS proceedings Budget for abuse monitoring, including in IDNs 34
35 Internet-Based Threats to Financial Sector Entities Altering DNS information is a common objective of a registration account compromise Unauthorized access to domain registration from compromised account identities and authentication credentials Unsecure from registrars, ICANN, TMCH, vendors, registries, etc. Is web access to a registration account necessary to you? 35
36 Protect account credentials Domain name registrations are an asset and should be included in business processes such as asset management and risk management programs Maintain documentation to prove registration Domain Name points of contact considerations Monitor for Whois and DNS change activity Monitor domain code status Monitor FS-ISAC Risk Mitigation 36
37 Risk Mitigation Monitor open TLDs contact the registries and pursue complaints including using the PDDRPs Look for registrars that aggressively monitor and respond to registrar impersonation attacks Make sure there is an abuse point of contact and know when they are available Customer communication prepare your customers to understand that if a communication does not come from certain domains, it s NOT FROM YOU Compliance with Safeguards and applicable, multi-jurisdictional laws audit 37
38 How to Contact Us Tony Onorato (212) Alexis Hunter (212) Follow me for gtld Internet, New gtld & Domain Name Services Thank you for joining us. 38
Intellectual Property Constituency (IPC)
Contractual Compliance Intellectual Property Constituency (IPC) Tuesday, 14 October 2014 Agenda Registrar Related Update since ICANN 50 Registry Related Update since ICANN 50 Audit Programs Update Questions
More informationContractual Compliance. Text. IPC Meeting. Tuesday, 24 June 2014 #ICANN50
Contractual Compliance IPC Meeting Tuesday, 24 June 2014 Contractual Compliance Update Since ICANN 49 Ongoing efforts and alignment on 2013 RAA and the new Registry Agreement Launched a quality process
More informationPURPOSE STATEMENT FOR THE COLLECTION AND PROCESSING OF WHOIS DATA
PURPOSE STATEMENT FOR THE COLLECTION AND PROCESSING OF WHOIS DATA The GDPR requires that the collection and processing of personal data be for specified, explicit and legitimate purposes. (Article 5(1)(b).
More informationGDPR. The new landscape for enforcing and acquiring domains. You ve built your business and your brand. Now how do you secure and protect it?
General Data Protection Regulation The new landscape for enforcing and acquiring domains. You ve built your business and your brand. Now how do you secure and protect it? GDPR CONTENTS GDPR 01 Introduction
More informationDRAFT: gtld Registration Dataflow Matrix and Information
DRAFT: gtld Registration Dataflow Matrix and Information Summary of Input Received From Contracted Parties and Interested Stakeholders. Version 2 6 November 2017 ICANN DRAFT: gtld Registration Dataflow
More informationRights Protection Mechanisms: User Feedback Session
15 October 2014 Rights Protection Mechanisms: User Feedback Session Agenda Introduction (10) Panel & Interactive Discussion (50) o Trademark Clearinghouse o Sunrise Period o Trademark Claims Service o
More informationTrademark Clearinghouse. Rights Protection Mechanism Requirements (Revised 6 Aug 2013)
Trademark Clearinghouse Rights Protection Mechanism Requirements (Revised 6 Aug 2013) The purpose of the Trademark Clearinghouse is to facilitate the Sunrise Services and Claims Services (each as defined
More informationgtld Applicant Guidebook (v ) Module 5
gtld Applicant Guidebook (v. 2012-06-04) Module 5 4 June 2012 This module describes the final steps required of an applicant for completion of the process, including execution of a registry agreement with
More informationICANN Contractual Compliance. ALAC Mee(ng. Sunday, 23 March 2014 #ICANN49
ICANN Contractual Compliance ALAC Mee(ng Sunday, 23 March 2014 1 Agenda! Compliance General Update! Clarification of ALAC statement! Q&A session! Contractual Compliance Update! Ø Global presence in Singapore"
More informationICANN Contractual Compliance. IPC Mee(ng. Tuesday, 25 March 2014 #ICANN49
ICANN Contractual Compliance IPC Mee(ng Tuesday, 25 March 2014 1 Agenda! Compliance General Update! Q&A session! Contractual Compliance Update! Ø Global presence in Singapore and Turkey" Ø Completed 2013
More informationDraft Applicant Guidebook, v3
Draft Applicant Guidebook, v3 Module 5 Please note that this is a discussion draft only. Potential applicants should not rely on any of the proposed details of the new gtld program as the program remains
More informationContractual Compliance Update ICANN 52 February 2015
Contractual Compliance Update ICANN 52 February 2015 Agenda Update Since ICANN 51 Lessons Learned Summary Questions and Answers 3 General Update since ICANN 51 Year-three Audit Program launched in October
More informationDraft Applicant Guidebook, v4
Draft Applicant Guidebook, v4 Module 5 Please note that this is a discussion draft only. Potential applicants should not rely on any of the proposed details of the new gtld program as the program remains
More information1. Anti-Piracy Services. 2. Brand Protection (SAAS) 3. Brand Protection Services. Data Protection and Permitted Purpose. Services
MarkMonitor Services Our operating information for all MarkMonitor products and services is outlined below. References in this document to MarkMonitor means the Clarivate entity identified in the order
More informationTopic LE /GAC position Registrar Position Agreement in Principle 1. Privacy and Proxy services
Topic LE /GAC position Registrar Position Agreement in Principle 1. Privacy and Proxy services 2. Prohibition of Certain Illegal, Criminal or Malicious Conduct In the event ICANN establishes an accreditation
More informationWhois Study Table Updated 18 February 2009
Whois Study Table Updated 18 February 2009 This table is based on the chart included in the WHOIS Hypothesis Report of 26 August 2008, amended to show related or overlapping studies clustered into letter
More informationAttachment 3..Brand TLD Designation Application
Attachment 3.Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program
More informationRegistration Policy for. 大众汽车
Registration Policy for. 大众汽车 1. Definitions Anti-Abuse Policy Affiliate Applicant Application Brands Community Domain Name Privacy-Service Proxy Service Registrant Policy defining abusive domain name
More informationOnlineNIC PRIVACY Policy
OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.
More informationICANN GDPR Proposed Models Redaction Proposal EXECUTIVE SUMMARY:
EXECUTIVE SUMMARY: The ICANN Redaction Model is proposed as an interim solution while ICANN Org and the community develop a long-term replacement to WHOIS. If adopted, registries and registrars do not
More informationcctlds, gtlds, and IDNs
cctlds, gtlds, and IDNs May 27, 2014 Fahd Batayneh Coordinator, Stakeholder Engagement, Middle East ICANN Topics of Discussion + Top Level Domains (TLDs) + cctlds + gtlds + IDNs + New gtlds + Registry/Registrar/Registrant
More informationSummary of Expert Working Group on gtld Directory Services June 2014 Final Report
Summary of Expert Working Group on gtld Directory Services June 2014 Final Report 1) Overview/Purpose ICANN formed an Expert Working Group (EWG) on gtld Directory Services to discuss how to replace the
More informationAttachment 3..Brand TLD Designation Application
Attachment 3.Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program
More informationICANN Contractual Compliance Proforma DNS Infrastructure Abuse November 2018 Registry Audit Request For Information (RFI)*
ICANN Contractual Compliance Proforma DNS Infrastructure Abuse November 2018 Registry Audit Request For Information (RFI)* INSTRUCTIONS: If you have any questions, please email ICANN at complianceaudit@icann.org.
More informationThis descriptive document is intended as the basis for creation of a functional specification for 2
Introduction & Overview This document provides a framework for the rapid implementation of a certification and access 1 model for non-public Whois data for legitimate and lawful purposes.this model specifically
More informationLaunching IDN & IDN TLDs: A gtld Registry Perspective. APNIC, Beijing
Launching IDN & IDN TLDs: A gtld Registry Perspective APNIC, Beijing 2009.08.24 Overview General Considerations IDN 2LDs (e.g. 中文.asia) IDN TLD (e.g. 中文. 亞洲 ) ICANN Considerations General Considerations
More informationThe registration of Domain Names will be centralized and managed through all DOT accredited Registrars selected by the Registry.
DOT TLD REGISTRATION POLICY 1. ELIGIBILITY DOT is a closed, restricted Top Level Domain ( TLD ). Only DISH DBS Corporation and its Affiliates are eligible to register a Domain Name under the DOT TLD. If
More informationDNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific
DNS Abuse Handling FIRST TC Noumea New Caledonia Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific 10 September 2018 1 The Domain Name System (DNS) The root
More information1. Muscat & Co Mortgage Solutions Ltd - Privacy Notice
1. This Muscat & Co Mortgage Solutions Ltd privacy notice provides information on how we and any of our subsidiaries, and any 3 rd party providers collect, use, secure, transfer and share your information.
More informationGeneral Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) & WHOIS at ICANN Savenaca Vocea APNIC 46, Noumea 11 September 2018 About the General Data Protection Regulation (GDPR) The European Union s (EU s) GDPR aims to
More informationACCEPTABLE USE POLICY
Abu Dhabi Systems Information Center ACCEPTABLE USE POLICY AUH-IDN-POL-002 - Acceptable Use Policy - 1.0 04/07/2018 عام / Public This document is provided pursuant to the disclaimer provided on the last
More informationRegistry Outreach. Contractual Compliance ICANN February 2015
Registry Outreach Contractual Compliance ICANN 52 12 February 2015 Agenda Update Since ICANN 51 Registry Agreement Lessons Learned Summary & Guidelines Process Guidelines & Clarifications Policy Efforts
More informationHogan Lovells Comments on the 3 ICANN Models for WHOIS Compliance with GDPR published on 12 January 2018
Introduction Comments on the 3 ICANN Models for WHOIS Compliance with GDPR published on 12 January 2018 These comments are in response to the request from ICANN for comments on the three interim GDPR models
More informationContractual ICANN. An Overview for Newcomers 11 March 2012
Contractual Compliance @ ICANN An Overview for Newcomers 11 March 2012 2 Agenda q What is contractual compliance? q How we ensure and enforce registry and registrar compliance q Why it matters? ICANN Organization
More informationYes. [No Response] General Questions
General Questions Q1. Do you agree that the proposals to refine the WHOIS opt-out eligibility and to provide a framework for registrar privacy services meets the policy objectives set out in the consultation
More informationREGISTRY POLICY STATEMENT ACCEPTABLE USE POLICY AND TERMS OF SERVICE
REGISTRY POLICY STATEMENT ACCEPTABLE USE POLICY AND TERMS OF SERVICE Rev: November 24, 2014 DEFINITIONS "Registered Name" means a domain name within the domain of the Uniregistry TLDs with which Uniregistry
More informationBIOEVENTS PRIVACY POLICY
BIOEVENTS PRIVACY POLICY At Bioevents, your privacy is important. Below you will find our privacy policy, which covers all personally identifiable data shared through Bioevents websites. Our privacy policy
More informationPPR TOKENS SALE PRIVACY POLICY. Last updated:
PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationThe Healthy Domain Initiative (HDI)
The Healthy Domain Initiative (HDI) The Healthy Domain Initiative (HDI) brings together diverse members of the domain ecosystem that are focused on building, extending and maintaining trust and security
More informationBUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:
BUZCOIN TOKENS SALE PRIVACY POLICY Last updated: 20.10.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationWhen this policy mentions WanderJaunt, we, us, or our, it refers to the WanderJaunt, Inc.
WanderJaunt Privacy Policy Last Updated: June 20, 2018 Thank you for using WanderJaunt! This Privacy Policy describes how we collect, use, process, and disclose your information, including personal information,
More informationExplanation of Data Element Data Element Potentially Legitimate purposes for Collection/Retention
Data Element Data Element Potentially Legitimate purposes for Collection/Retention 1.1.1. First and last name or full legal name of Registrant 1.1.2. First and last name or, in the event Registrant is
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationUSER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.
These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection
More informationInternet Corporation for Assigned Names & Numbers Contractual Compliance Update
Contractual Compliance Update for July 2013 1 Internet Corporation for Assigned Names & Numbers Contractual Compliance Update October 20 http://www.icann.org/en/resources/compliance Table of Contents 1
More informationSearchable WHOIS Terms of Use
Searchable WHOIS Terms of Use 1. Grant 1.1. You may use the Searchable WHOIS subject to these terms and conditions, including the Searchable WHOIS Acceptable Use Policy set out in Schedule 3. 2. Limits
More information.LATROBE TLD REGISTRATION POLICY
Mailing address La Trobe University Victoria 3086 Australia T + 61 3 9479 1111 latrobe.edu.au MELBOURNE CAMPUSES Bundoora Collins Street CBD Franklin Street CBD.LATROBE TLD REGISTRATION POLICY REGIONAL
More informationen.pdf
Draft Framework for a Possible Unified Access Model for Continued Access to Full WHOIS Data For Discussion 20 August 2018 Prepared by: ICANN organization A. Introduction...2 B. Brief Summary of the Framework
More informationPolicy for the Registration of.versicherung Domain Names
Jakob Haringer Str. 8/V 5020 Salzburg Austria T +43 662 46 69 731 F 29 service@nic.versicherung www.nic.versicherung Policy for the Registration of.versicherung Domain Names (subsequently called the "registry")
More informationPriv ac y Policy. Last upda ted:
Priv ac y Policy Last upda ted: 05.2014 This Privacy Policy describes the policies and procedures of ZET / Adrian Zingg / ZetApps and any subsidiaries and affiliated entities (together, Company, we or
More informationThe IDN Variant TLD Program: Updated Program Plan 23 August 2012
The IDN Variant TLD Program: Updated Program Plan 23 August 2012 Table of Contents Project Background... 2 The IDN Variant TLD Program... 2 Revised Program Plan, Projects and Timeline:... 3 Communication
More informationNew York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines
New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities
More informationProposal for a model to address the General Data Protection Regulation (GDPR)
Proposal for a model to address the General Data Protection Regulation (GDPR) Introduction Please find the Executive Summary of the data model in Part A of this document. Part B responds to the requirements
More informationNew gtld Start Up Plan
New gtld Start Up Plan Launch Dates, Launch Programs and Launch Policies TMCH Sunrise Dispute Resolution Policy (SDRP) Anti- Abuse Policy Privacy Policy Whois Access Policy Page 1 of 33 LAUNCH DATES, LAUNCH
More informationLaw Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version
Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations
More informationAdvisory Statement: Temporary Specification for gtld Registration Data
Advisory Statement: Temporary Specification for gtld Registration Data Adopted on 17 May 2018 by ICANN Board Resolutions 2018.05.17.01 2018.05.17.09 On 17 May 2018, the ICANN Board of Directors (ICANN
More informationICANN48 BUENOS AIRES. November 20th
ICANN48 BUENOS AIRES November 20th 2013 www.trademark-clearinghouse.com 1 What is the Trademark Clearinghouse? ICANN Deloitte I B M TM holders TM agents DN registrars TLD registries The Clearinghouse user
More informationISSUE CHART FOR THE GNSO RAA REMAINING ISSUES PDP ON PRIVACY/PROXY SERVICES
ISSUE CHART FOR THE GNSO RAA REMAINING ISSUES PDP ON PRIVACY/PROXY SERVICES Issue Explanation/Prior Recommendation 1 Practices & Procedures 1.1 Standard Service Practices These should be clearly published,
More informationRegistry Internet Safety Group (RISG)
Registry Internet Safety Group (RISG) Re: Potential for Malicious Conduct and new TLD Process RISG s mission is to facilitate data exchange and promulgate best practices to address Internet identity theft,
More informationGAC PRINCIPLES REGARDING gtld WHOIS SERVICES. Presented by the Governmental Advisory Committee March 28, 2007
GAC PRINCIPLES REGARDING gtld WHOIS SERVICES Presented by the Governmental Advisory Committee March 28, 2007 1.1 The purpose of this document is to identify a set of general public policy issues and to
More informationSummary. January 31, Jo Lim. Chief Operations and Policy Officer. Dear Jo,
January 31, 2014 Jo Lim Chief Operations and Policy Officer Dear Jo, Thanks for the opportunity to make a submission to the auda Whois Issues Paper 2013. The views expressed in this submission are held
More informationLegal notice and Privacy policy
Legal notice and Privacy policy We appreciate your interest in us. Below you will find information of legal relevance when visiting this website. In addition, you will find our Privacy Policy, which explains
More informationNDIS Quality and Safeguards Commission. Incident Management System Guidance
NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the
More informationCERT Symposium: Cyber Security Incident Management for Health Information Exchanges
Pennsylvania ehealth Partnership Authority Pennsylvania s Journey for Health Information Exchange CERT Symposium: Cyber Security Incident Management for Health Information Exchanges June 26, 2013 Pittsburgh,
More informationMASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY
Effective Date: 12 September 2017 MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY Mastercard respects your privacy. This Privacy Policy describes how we process personal data, the types of personal
More informationToken Sale Privacy Policy
Token Sale Privacy Policy PRIVACY POLICY LAST UPDATED ON: [11 SEP 2018] A. OVERVIEW You must read the entirety of this Privacy Policy carefully before making any decision to purchase Tokens. You must also
More informationContracting and Onboarding!
Contracting and Onboarding! 20 November 2013! ICANN Global Domains Division! Agenda! + Contracting - Statistics - Eligibility - Process - Exhibit A - Code of Conduct + Registry Onboarding - Overview -
More informationProgress Report Negotiations on the Registrar Accreditation Agreement Status as of 1 March 2012
Progress Report Negotiations on the Registrar Accreditation NOTE: For the entirety of this Summary document, the are provided to give broader understanding of the status of the discussions. The section
More informationThe information we collect
Phone: (02) 8035 8000 Web: www.carnextdoor.com.au Email: info@carnextdoor.com.au Address: Level 3, 55 Pyrmont Bridge Rd, Pyrmont, NSW, 2009 CAR NEXT DOOR PRIVACY POLICY AND CREDIT REPORTING POLICY Last
More informationInternet Corporation for Assigned Names & Numbers Contractual Compliance Update
Contractual Compliance Update for July 2013 1 Internet Corporation for Assigned Names & Numbers Contractual Compliance Update September 20 http://www.icann.org/en/resources/compliance Table of Contents
More informationCHAPTER 13 ELECTRONIC COMMERCE
CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
More informationICANN Report Presented by: Paul Verhoef Vice President Policy Development Support ARIN XIII, Vancouver April 2004
ICANN Report Presented by: Paul Verhoef Vice President Policy Development ARIN XIII, Vancouver 19-21 April 2004 ICANN report Achievements Consultation with community Feedback from community Consequent
More informationStarflow Token Sale Privacy Policy
Starflow Token Sale Privacy Policy Last Updated: 23 March 2018 Please read this Privacy Policy carefully. By registering your interest to participate in the sale of STAR tokens (the Token Sale ) through
More informationThe HIPAA Omnibus Rule
The HIPAA Omnibus Rule What You Should Know and Do as Enforcement Begins Rebecca Fayed, Associate General Counsel and Privacy Officer Eric Banks, Information Security Officer 3 Biographies Rebecca C. Fayed
More informationDomain Name Hijacking. Security and Stability Advisory Committee Luxembourg 12 July 2005
Domain Name Hijacking Security and Stability Advisory Committee Luxembourg 12 July 2005 1 Speakers Steve Crocker, Chair Bruce Tonkin, CTO MelbourneIT Rodney Joffe, Chairman & CTO, UltraDNS Ram Mohan, CTO
More informationFast Flux Hosting Final Report. GNSO Council Meeting 13 August 2009
Fast Flux Hosting Final Report GNSO Council Meeting 13 August 2009 1 January 2008: SAC 025 Fast Flux Hosting and DNS Characterizes Fast Flux (FF) as an evasion technique that enables cybercriminals to
More informationDOMAINS PROTECTED MARKS LIST (DPML) PRIMER
DOMAINS PROTECTED MARKS LIST (DPML) PRIMER The launch of the new generic Top Level Domains (gtlds) has ushered in a new era of naming conventions. This creates new opportunities for marketing and branding
More informationProposed Interim Model for GDPR Compliance-- Summary Description
Proposed Interim Model for GDPR Compliance-- Summary Description (The Calzone Model, 28 February 2018) Prepared by: ICANN Org I. Introduction The Proposed Interim Model balances competing elements of models
More informationCyber Insurance: What is your bank doing to manage risk? presented by
Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an
More informationRegistrar Stakeholder Mee2ng Tuesday, 25 March 2014
ICANN Contractual Compliance Registrar Stakeholder Mee2ng Tuesday, 25 March 2014 1 Agenda! + General Update + 2013 RAA Discussion and Clarification + Question Answer Session 2 Contractual Compliance Update!
More informationMOBILE.NET PRIVACY POLICY
MOBILE.NET PRIVACY POLICY As the operator of the Mobile.net website (https://mobile.net.ltd/) (Website), ADX Labs, LLC. (Company, we or us) is committed to protecting and respecting your privacy. The data
More informationJuly 13, Via to RE: International Internet Policy Priorities [Docket No ]
July 13, 2018 Honorable David J. Redl Assistant Secretary for Communications and Information and Administrator, National Telecommunications and Information Administration U.S. Department of Commerce Washington,
More informationma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018
ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:
More informationIntroduction. Prepared by: ICANN Org Published on: 12 January 2018
Proposed Interim Models for Compliance with ICANN Agreements and Policies in Relation to the European Union s General Data Protection Regulation For Discussion Prepared by: ICANN Org Published on: 12 January
More informationPRIVACY POLICY Last Updated May, 2018
PRIVACY POLICY Last Updated May, 2018 PRIVACY POLICY OVERVIEW This Privacy Policy establishes rules to govern the collection, use and disclosure of personal information collected by Banff & Lake Louise
More informationNYDFS Cybersecurity Regulations
SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy
More informationXerox Channels Group Counterfeit Toner Cartridges Q&A April 12, 2004
Xerox Channels Group Counterfeit Toner Cartridges Q&A April 12, 2004 I. Case Specifics II. Customer Questions III. Industry Trends IV. Combating Counterfeiting Case Specifics Q: Has anyone been arrested
More informationNebraskaLink Acceptable Use Policy
NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink
More informationStartup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):
Privacy Policy Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ): visit any websites or mobile sites offered by Startup
More informationPrivacy and Proxy Service Provider Accreditation. ICANN58 Working Meeting 11 March 2017
Privacy and Proxy Service Provider Accreditation ICANN58 Working Meeting 11 March 2017 Agenda 13:45-15:00 15:00-15:15 15:15-16:45 Timeline Check; Policy Document Update; Third- Party Requests Break PSWG
More informationWHOIS High-Level Technical Brief
WHOIS High-Level Technical Brief Background When the predecessor to the Internet (the ARPANet) was first being developed, it was quickly determined that there needed to be a contact list of the researchers
More informationdotberlin GmbH & Co. KG
Policy for the Registration of.berlin Domain Names dotberlin GmbH & Co. KG (subsequently called the "registry") is the registration office for domain names under the generic top level domain (gtld).berlin.
More informationSummary of Public Suggestions on Further Studies of WHOIS including the GAC recommendations of 16 April Updated 10 May 2008
Summary of Public Suggestions on Further Studies of WHOIS including the GAC recommendations of 16 April Updated 10 May 2008 Study submissions have been divided into eight recommended areas, as follows:
More informationDomain Name Hijacking A Preliminary Report. Security and Stability Advisory Committee Mar del Plata April 5, 2005
Domain Name Hijacking A Preliminary Report Security and Stability Advisory Committee Mar del Plata April 5, 2005 1 Headlines Panix.com was hijacked on 15 Jan 2005 action returned it after 48 hours Gaining
More informationContents. Policies, Rules and Requirements for the.basketball Domain. Date: 16 June 2017 Version: 1.0
Date: 16 June 2017 Version: 1.0 Contents 1. Registration Policies 2. Anti-Abuse and Acceptable Use Policy 3. Reserved Names and Premium Names Policy 4. Qualified Launch Program 5. Community Priority Period
More informationInternet Corporation for Assigned Names and Numbers ( ICANN )
Internet Corporation for Assigned Names and Numbers ( ICANN ) A Model for a High Security Zone Verification Program Draft Version 1.0 ICANN Internet Corporation for Assigned Names and Numbers Security
More informationRegulation P & GLBA Training
Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed
More informationRegistration Abuse Policies Final Report. Greg Aaron, RAPWG Chair Sunday, 20 June 2010
Registration Abuse Policies Final Report Greg Aaron, RAPWG Chair Sunday, 20 June 2010 Background RAP Pre-PDP Working Group launched in March 2009. Charter: Scope and definition of registration abuse: define
More informationProtecting High Value Domains
Protecting High Value Domains SSAC Public Meeting ICANN Cairo 2008 1 What is a high value domain? Working definition: high value domain (HVD) One or a set of names which define an organization's online
More informationCybersecurity Considerations for GDPR
Cybersecurity Considerations for GDPR What is the GDPR? The General Data Protection Regulation (GDPR) is a brand new legislation containing updated requirements for how personal data of European Union
More information