Table of Contents
1. Foreword ........................................................................................................................ 5
2. Executive Summary ....................................................................................................... 5
3. Introduction and Background ....................................................................................... 7
3.1 Categories of IP-infringing business models ................................................................. 7
3.2 Challenges in addressing IP-infringing uses of domain names .................................... 8
4. Scope and Approach ................................................................................................... 10
5. The Domain Name Life Cycle and the Respective Roles of Registries and
Registrars .................................................................................................................... 11
5.1 Registries and registrars ................................................................................................ 11
5.2 Domain name life cycle .................................................................................................. 14
5.2.1 The pre-registration phase ................................................................................................... 14
5.2.2 The registration phase ......................................................................................................... 15
5.2.3 The post-registration phase ................................................................................................. 15
6. Good Practices and their Potential for Extension ................................................... 17
6.1 Pre-registration ............................................................................................................... 17
6.1.1 Terms and conditions .......................................................................................................... 17
6.1.2 Specific requirements on domain privacy and proxy services ............................................. 19
6.1.3 Alert systems and rights protection mechanisms ................................................................ 20
6.2 Registration ..................................................................................................................... 22
6.2.1 ‘Know Your Customer’ (KYC) checks at domain registration .............................................. 22
6.2.2 Monitoring to detect abusive registrations ........................................................................... 24
6.3 Post-registration ............................................................................................................. 26
6.3.1 WHOIS verification after domain registration ...................................................................... 26
6.3.2 Notice and takedown (NTD) ................................................................................................ 28
6.3.3 Trusted notifier systems ....................................................................................................... 30
6.3.4 Tools to contact domain name holder or request WHOIS information disclosure ............... 31
6.4 Domain name suspension or termination ..................................................................... 33
6.4.1 Appropriate action ................................................................................................................ 33
6.4.2 Voluntary collaborations and sharing of intelligence ........................................................... 34
6.5 Communication campaigns and resources .................................................................. 35
7. Conclusion ................................................................................................................... 36
8. Glossary: Terms Used ................................................................................................. 37