You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 138 Next »

Members: 

  • Laureen Kapin (Subteam Chair)
  • Carlton Samuels
  • Carlos Raul Gutierrez
  • Gao Mosweu
  • Fabro Stiebel
  • Jamie Hedlund
  • Drew Bagley 
  • David Taylor
  • Calvin Browne 

Mandate: This sub team was created to explore two key areas of the CCT Review as outlined in section 9.3 of the Affirmation of Commitments: "...the extent to which the introduction or expansion of gTLDs has promoted ... consumer trust ... as well as effectiveness of ... safeguards put in place to mitigate issues involved in the introduction or expansion."

Mailing-List Archives: http://mm.icann.org/pipermail/cctreview-safeguards/


Refer to Safeguards & Trust - Calls for your call schedule and call archives


(warning) Safeguards &Trust - Action Items

DISCUSSION PAPER TOPICS - Papers available in Google drive

Use revised template - DOC

Refer to model issue paper - DOC-PDF

DNS Abuse

1. Is there more or less DNS abuse in the new gTLDs? Drew (lead), Fabro, Calvin

Impact of Safeguards & PICs

- Technical Category/DNS Abuse

2. Have the safeguards been fully implemented? Calvin (lead), Carlos, Laureen

3. Did the safeguards help to prevent DNS abuse? Drew (lead), Fabro, Calvin

4. Have new gTLD registry operators complied with the safeguards? Fabro (lead), Carlton, David

- Specification 11

5. How was Specification 11 implemented by new gTLD registry operators? Laureen (lead), Carlos, Calvin

6. Did the use of PICs help prevent DNS abuse? Drew (lead), Carlos, Gao, Fabro

- Rights Protection Mechanisms

7. Did use of Rights Protection Mechanisms mitigate the risks involved with the expansion of the gTLD program? David (lead), Jamie, Fabro

8. Have the new dispute resolution processes reduced trademark infringement? David (lead), Jamie, Carlos

Consumer End User Behavior

9. Are consumers aware of new gTLDs? Carlton (lead), Gao, Calvin

10. Do consumers trust new gTLDs? Laureen (lead), Gao, Carlos

Effectiveness of Procedures to Enforce Safeguards

11. Are the new procedures effective in enforcing safeguards? Carlton (lead), Jamie, Laureen

Documents

DocumentFile
BRAINSTORMING DOCUMENT

v1 (23 Feb)

DOC - PDF

v2/3 (3 March)DOC - PDF
v4 (4 March)DOC - PDF - G-doc

v5 (10 March)

Priority list

DOC- PDF - G-doc  

DOC - PDF - Priority list G-doc

v6 (31 March)DOC - PDF - G-doc 
v7 (28 April)DOC - PDF
v8 (7 June)DOC - PDF - G-doc
WORK PLAN
v1 (3 May)DOC - PDF
v2 (2 June)DOC
v3 (23 June)

DOC - PDF

(error) No longer applicable

SAFEGUARDS EFFECTIVENESS MANAGEMENT TABLE

v1 (27 May)

DOC - PDF
v2 (6 June)DOC - PDF

v3 (13 June)

DOC - PDF
v5 (21 June)DOC - PDF
SAFEGUARDS ANALYSIS CHART
v1G-doc
DISCUSSION PAPERS - TOPIC LIST

v1 (12 July)

v2 (20 July)

DOC - PDF

DOC - PDF - gDOC (input needed by 22 July!!!)

VOLUNTARY PICS
v1 (13 July)DOC - PDF (input needed by 14 July!!!)
OTHER
Regulated and sensitive strings delegated (29 April 2016)XLS - PDF


Reading List

Date AddedDocumentFilesResponsible Team MemberUseful Yes/No
31 March 2016

Secure Domain Foundation/Business case

for proactive anti-abuse

PDF

DB's analysis/presentation - PDF

DB 
31 March 2016

Knujon March 2016: Internet Limbo Report

Concerning Issues of Consumer Trust on the Internet

PDF

FS's analysis/presentation - PDF

FS 
31 March 2016

ICANN Draft Report New gTLD Program

Safeguards to Mitigate DNS Abuse

LINK

CG' analysis/presentation - PDF

CG 
31 March 2016Notice and takedowns in everyday practice - Online takedowns studyPDFDT & CB 
5 April 2016Consumer Awareness Summary

DOC - PDF

CS's analysis/presentation - PDF

JH & CS 
14 April 2016APWG Phishing Attack Trends Reports

LINK

GM's analysis/presentation - PDF

GM 
20 April 2016Compliance-related metricsLINKLK 
29 April 2016

The Curse of the URL Shorteners: How safe are they?

LINKFS 
29 April 2016What is Spyware?LINKGM 
29 April 2016

ICANN Registry Agreements

LINK

CAS 
29 April 2016

Search Engine Poisoning (SEP)

LINK

DT 
29 April 2016

Spoofing Attack: IP, DNS & ARP

LINK

DT 
29 April 2016

Amplified DDoS Attacks: The current biggest threat against the Internet

LINK

DB 
29 April 2016

DNS Pharming: Someone’s poisoned the water hole!

LINK

DB 
29 April 2016

APWG News Center

LINK

GM 
29 April 2016

About the DNS Seal Project

LINK

CB 
29 April 2016

fTLD Enhanced Security

LINK

DT 
29 April 2016

ICANN 54 GAC Communiqué

LINK

LK 
29 April 2016

ICANN53 Buenos Aires GAC Communiqué

LINK

LK 
17 May 2016ICANN GAC Safeguards advice from Beijing forward LK 
29 April 2016

Applicant Guidebook

LINK

ALL 
29 April 2016

CZDS-ZFA Passwords Reports

LINK

JH 
29 April 2016

WHOIS Accuracy Reporting System (ARS)

LINK

DB 
29 April 2016

WHOIS Primer

LINK

CB 
29 April 2016

Afilias Anti-Abuse Policy

LINK

CAS 
29 April 2016

.RICH Anti-Abuse Policy

LINK

                   

CAS 
29 April 2016

Contractual Compliance Dashboard for January 2016

LINK

LK 
29 April 2016

Frequently Asked Questions: Name Collision Occurrence Management Framework for Registries

LINK

DT 
29 April 2016

DNSSEC Deployment Report

LINK

JH 
29 April 2016

TLD DNSSEC Report

LINK

JH 
29 April 2016

Deployment Guide: DNSSEC for Internet Service Providers (ISPs)

LINK

JH 
29 April 2016

IETF- RFC List

LINK

DB 
29 April 2016

CloudFlare: How DNSSEC works

LINK

JH 
29 April 2016DNSSEC- What it is and why is it important?

LINK

JH 

29 April 2016

A Profitless Endeavor- Phishing as a Tragedy of the CommonsGM 
29 April 2016Best Practices to Address Online and Mobile ThreatsFS 
29 April 2016DNS Stability, Security, and ResiliencyDB 
29 April 2016From .academy to .zone- An Analysis of the New gTLD Land RushFS 
29 April 2016ICANN Global Consumer Research Report- April 2015CAS 
29 April 2016APWG- Global Phishing Survey: Trends and Domain Name Use in 1H2014GM 
29 April 2016High Security Zone Top-Level Domain Advocacy GroupDT 
29 April 2016ICANN Contractual Compliance Annual Report 2015LK 
29 April 2016APWG- Making Waves in the Phisher's Harbor: Exposing the dark side of subdomain registriesGM 
29 April 2016Measuring the Global Domain Name SystemJZ 
29 April 2016Measuring Perpetrators and Funders of TyposquattingDT 
29 April 2016Potential for Phishing in Sensitive-String Top-Level DomainsLK 
29 April 2016Program Implementation ReviewALL 
29 April 2016Redirecting DNS for Ads and ProfitFS 
29 April 2016Mitigating the Risk of DNS Namespace CollisionsDT 
29 April 2016Registration Abuse Policies Working Group Final ReportDB 
29 April 2016SAC 025: SSAC Advisory on Fast Flux Hosting and DNSDB 
29 April 2016SAC041- Recommendation to prohibit use of redirection and synthesized responses by new TLDsCAS 
29 April 2016SSAC Advisory on DDoS Attacks Leveraging DNS InfrastructureCB 
29 April 2016SSAC Advisory on Registrant Protection- Best Practices for Preserving Security and Stability in the Credential Management LifecycleCG 
29 April 2016SSAC Comment on Orphan Glue Records in the Draft Applicant Guidebook CB 
6 June 2016SAC041: Recommendation to prohibit use of redirection and synthesized responses by new TLDs LINKCAS - CG 
6 June 2016SAC 045 Invalid Top Level Domain Queries at the Root Level of the Domain Name SystemLINKCAS - CG 
6 June 2016SAC062 SSAC Advisory Concerning the Mitigation of Name Collision RiskLINKCAS - CG 
6 June 2016SAC066 SSAC Comment Concerning JAS Phase One Report on Mitigating the Risk of DNS Namespace CollisionsLINKCAS - CG 
6 June 2016SAC074 SSAC Advisory on Registrant Protection: Best Practices for Preserving Security and Stability in the Credential Management LifecycleLINKCAS - CG 
29 April 2016Symantec Intelligence Report- November 2015FS 
29 April 2016ISTR 20: Internet Security Threat Report

Error rendering macro 'viewpdf'

com.atlassian.confluence.macro.MacroExecutionException: com.atlassian.confluence.macro.MacroExecutionException: The viewfile macro is unable to locate the attachment "ISTR 20.pdf" on this page

 
CG 
29 April 2016Techniques to Break the Botnet AttackCG 
29 April 2016The NameSENTRY Abuse ReportCG 
29 April 2016WHOIS Accuracy Reporting System (ARS)CB 
9 May 2016Trust in the Internet Survey 2016, nccgroup and IDG Research ServicesPDFCG 
19 May 2016

Verizon 2016 Data Breach Investigations Report

LINK

LK 

 

 

 

  • No labels