Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Group 1: Criminal Law enforcement/national or public security

LEA 1, LEA 2, IP 2, IP 3

LEA 1 - Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a non-local data controller.

Use Case - GAC LEA1-1371929-8 Redline.docx

EPDP Access to Non-Public Data .pdf

EPDP Access to Non-Public Data - Overall + Responsibilities.pdf

LEA 2 - Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a local data controller.Use Case - GAC LEA2 - 7 July 29 August 2019.docx
IP 2 - Investigation of criminal activity against a victim in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal trademark)Use Case - IPC-TM-Criminal.docx
IP 3 - Investigation of criminal activity in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal copyright)Use Case - IPC-Copyright-Criminal.docx

...

Group 5: Registered Name Holder consent or contractBC 4, BC 6, BC 8, IP 5

IP 5 - Providers requesting access required to facilitate due process in the UDRP and URS

Use Case - IPC-UDRP-URS-Due-Process - FINAL [1]updated - 15 August 2019.docx
BC 6 - M&A name portfolio due diligence or purchase of domain name from bankrupt entity or other sellerBC-6 Use Case - M&A and domain purchase.docx
BC 4 - Maintaining the domain name registration by the Registered Name HolderBC4 Use Case - Domain Name Maintenance.docx
BC 8 - Help a certification authority determine and validate the identity of the entity associated with a domain name that will be bound to an SSL/TLS certificateBC-8 Use Case - Certification Authority.docx

...