Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

CATEGORY A: Criminal Law enforcement/national or public security


Use Case Categorization 

TopicOverarching purpose: Criminal Use case: 13719

Overarching Purpose: Criminal Law enforcement/national or public security - TM

Use Case: TM

Group 1: Criminal

Link

Law enforcement/national or public security

LEA 1, LEA 2, IP 2, IP 3

LEA 1 - Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a non-local data controller.

Use Case - GAC LEA1-

29-8 Redline.docx

EPDP Access to Non-Public Data .pdf

EPDP Access to Non-Public Data - Overall + Responsibilities.pdf

Overarching Purpose: Criminal Law enforcement/national or public security

Use case: LEA 2 - Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a local data controller.
Use Case - GAC LEA2 - 7 July 29 August 2019.docx

Overarching Purpose: Criminal Law enforcement/national or public security - Copyright

Use Case: IP 2 - Investigation of criminal activity against a victim in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal trademark)
Use Case - IPC-CopyrightTM-Criminal.docx
IP 3 - Investigation of criminal activity in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal copyright)Use Case - IPC-Copyright-Criminal.docx

...


Group 2: Non-LE investigations

...

and civil claimsBC1/2, BC 3, BC 5, SSAC 3, ALAC 2, IP 1, IP 4
SSAC 3 - Investigation of criminal activity where domain names are used.  Typical specific example: phishing attack.SSAC Crime-Abuse Investigation Use Case - 11 July 2019.docx
BC 3 - Identify

...

Use case topicLink

Overarching Purpose: Digital Crime investigation by non-LEA

Use case: Initial investigation of criminal activity against a victim and/or secondary victim where domain names are used in the commission of the crime (part 1 of 2)

BC-1 & BC-2 Digital Crime Investigation Use Case.docx

Overarching Purpose: Investigate, detect, prevent, and bring civil claims for Abusive Domain names

Use case: Identify Use Case:
owner of abusive domains and other related domains involved in civil legal claims related to phishing, malware, botnets, and other fraudulent activitiesBC-3 Use Case - Investigate Abusive Domain.docx

Overarching Purpose: Obtain domain name holder details for legal claims

IP 1 - Trademark owners requesting data in the establishment, exercise or defense of legal claims for trademark infringement

Use Case - trademark infringement use case - updated 28 June 2019.docx

Use Case - trademark infringement use case - redline - updated 28 June 2019.docx

BC1/2 Initial investigation of criminal activity against a victim and/or secondary victim where domain names are used in the commission of the crime BC-1 & BC-2 Digital Crime Investigation Use Case.docx
BC 5 - 
The establishment, exercise or defense of a legal claim involving a registrant of a domain nameBC-5 Use Case - Obtain domain name holder details for legal action.docx

Overarching Purpose:  Site Integrity and Business Integrity Confirmation

Use Case: Search Engines, Messaging Services & Social Media Platforms seeking to confirm the authenticity of businesses advertising or Posting News on its Platform

BC- 9 Use Case - Site and Business Integrity Confirmation (2).docx
IP 4 - Copyright owners requesting data in the establishment, exercise or defense of legal claims for copyright infringementUse Case - IPC-Copyright-Civil.docx
ALAC 2 - Consumer protection organizationsConsumer_Protection_Use_Case_ALAC - Consumer Protection Organizations.docx


Group 3: Need for redacted data for a third party to contact registrantBC 7, SSAC 1
SSAC 1 -

Overarching PurposeEnabling timely resolution of domain-based security events and attacks

Use Case:
 When a network is undergoing an attack involving a domain name, and the operator(s) of that network need to contact the domain owner to remediate the security issue (DDOS, Botnet, etc.)Use Case - SSAC Operational Security.docx

Overarching PurposeThe processing of personal data to the extent strictly necessary and proportionate for the purposes of ensuring network and information security, i.e. the ability of a network or an information system to resist, at a given level of confidence, accidental events or unlawful or malicious actions that compromise the availability, authenticity, integrity and confidentiality of stored or transmitted personal data, and the security of the related services offered by, or accessible via, those networks and systems, by public authorities, by computer emergency response teams (CERTs), computer security incident response teams (CSIRTs), by providers of electronic communications networks and services and by providers of security technologies and services.

BC 7 - Contacting the Registrant to resolve a Technical or Operational Issue with a Domain NameBC-7 Use Case - Technical Issue Resolution.docx


Group 4: Consumer protection, abuse prevention, digital service provider (DSP) and network securitySSAC 2, BC 9, ALAC 1
SSAC 2 -
Use Case:

Overarching PurposePreventing Fraud - Consumer Protection

Use Case:
 Determine “Reputation” of domain name and/or elements associated with domain name registrations.Use Case - SSAC Reputation Service.docx

Overarching PurposeCrime and abuse investigation by non-law enforcement parties

Use CaseInvestigation of criminal activity where domain names are used.  Typical specific example: phishing attack. 

SSAC Crime-Abuse Investigation Use Case - 11 July 2019.docx
ALAC 1 - Online buyers identifying and validating the source of goods or services/ Internet users validating the legitimacy of an email or a website to protect themselvesConsumer_Protection_Use_Case_ALAC - Online buyers.docx

Overarching Purpose: Fraud Prevention – Consumer Protection

Use CaseConsumer protection organizations

Consumer_Protection_Use_Case_ALAC - Consumer Protection Organizations.docx

CATEGORY C: Intellectual Property

BC 9 - Search Engines, Messaging Services & Social Media Platforms seeking to confirm the authenticity of businesses advertising or Posting News on its PlatformBC- 9 Use Case - Site and Business Integrity Confirmation (2).docx


Use Case TopicLink

Overarching purpose: 

Use case: Trademark owners requesting data in the establishment, exercise or defense of legal claims for trademark infringement

Use Case - trademark infringement use case - updated 28 June 2019.docx

Use Case - trademark infringement use case - redline - updated 28 June 2019.docx

Overarching purpose

Use Case: Copyright owners requesting data in the establishment, exercise or defense of legal claims for copyright infringement

Use Case - IPC-Copyright-Civil.docxOverarching Purpose:
Group 5: Registered Name Holder consent or contractBC 4, BC 6, BC 8, IP 5

IP 5 - 

Providers requesting access required to facilitate due process in the UDRP and URS

Use case:Use Case TopicLink

Overarching Purpose: Business investigation for Domain Portfolio Purchases

Use case: :

Use Case - IPC-UDRP-URS-Due-Process - FINAL updated - 15 August 2019.docx

Category D: Commercial 

BC 6 - M&A name portfolio due diligence or purchase of domain name from bankrupt entity or other sellerBC-6 Use Case - M&A and domain purchase.docx

Overarching Purpose:  Issuance of Digital Certificates linked with a Specific Domain

BC 4 - Maintaining the domain name registration by the Registered Name HolderBC4 Use Case - Domain Name Maintenance.docx
BC 8 - Help
Use case: Help
a certification authority determine and validate the identity of the entity associated with a domain name that will be bound to an SSL/TLS certificateBC-8 Use Case - Certification Authority.docx

Category E: Domain name maintenance

LEGEND

 

Use Case TopicLink

Overarching Purpose:  Resolution of Technical or Operational Issue with a Domain Name

Use Case:

LEA 1

Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a non-local data controller.

LEA 2

Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a local data controller.

SSAC 1

When a network is undergoing an attack involving a domain name, and the operator(s) of that network need to contact the domain owner to remediate the security issue (DDOS, Botnet, etc.)

SSAC 2

Determine “Reputation” of domain name and/or elements associated with domain name registrations.

SSAC 3

Investigation of criminal activity where domain names are used.  Typical specific example: phishing attack.

IP 1

Trademark owners requesting data in the establishment, exercise or defense of legal claims for trademark infringement

IP 2

Investigation of criminal activity against a victim in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal trademark)

IP 3

Investigation of criminal activity in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal copyright)

IP 4

Copyright owners requesting data in the establishment, exercise or defense of legal claims for copyright infringement

IP 5

Providers requesting access required to facilitate due process in the UDRP and URS

BC1/2

Initial investigation of criminal activity against a victim and/or secondary victim where domain names are used in the commission of the crime 

BC 3

Identify owner of abusive domains and other related domains involved in civil legal claims related to phishing, malware, botnets, and other fraudulent activities

BC 4

Maintaining the domain name registration by the Registered Name Holder

BC 5

The establishment, exercise or defense of a legal claim involving a registrant of a domain name

BC 6

M&A name portfolio due diligence or purchase of domain name from bankrupt entity or other seller

BC 7

Contacting the Registrant to resolve a Technical or Operational Issue with a Domain Name

BC

-7 Use Case - Technical Issue Resolution.docx

Overarching Purpose: Domain name maintenance

Use case: Maintaining the domain name registration by the Registered Name Holder

BC4 Use Case - Domain Name Maintenance.docx

8

Help a certification authority determine and validate the identity of the entity associated with a domain name that will be bound to an SSL/TLS certificate

BC 9

Search Engines, Messaging Services & Social Media Platforms seeking to confirm the authenticity of businesses advertising or Posting News on its Platform

ALAC 1

Online buyers identifying and validating the source of goods or services/ Internet users validating the legitimacy of an email or a website to protect themselves

ALAC 2

Consumer protection organizations