You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 22 Current »

Comment Close
Date
Statement
Name 

Status

Assignee(s) and
RALO(s)

Call for
Comments
Call for
Comments
Close 
Vote
Announcement 
Vote OpenVote
Reminder
Vote CloseDate of SubmissionStaff Contact and EmailStatement Number
27.12.2013Study on Whois MisuseADOPTED
12Y, 0N, 0A 
23.12.201303.01.201406.01.201406.01.201409.01.201410.01.201411.01.2014

Mary Wong
policy-staff@icann.org

AL-ALAC-ST-0114-01-00-EN

For information about this PC, please click here

FINAL VERSION TO BE SUBMITTED IF RATIFIED

Please click here to download the PDF below.

Error rendering macro 'viewpdf'

com.atlassian.confluence.macro.MacroExecutionException: com.atlassian.confluence.macro.MacroExecutionException: The viewfile macro is unable to locate the attachment "AL-ALAC-ST-0114-01-00-EN.pdf" on this page

FINAL DRAFT VERSION TO BE VOTED UPON BY THE ALAC

The ALAC has studied the WHOIS Misuse Study commissioned by ICANN and executed by researchers from Carnegie Mellon University over the period.  We note the study has returned findings that align with individual experience of At-Large constituents plus the evidence of widespread occurrence has validated similar research undertaken by At-Large connected researchers.  The question for the ALAC has never been whether misuse was factual. Rather, it was whether the level of misuse warranted measures to reduce or eliminate and, what would be appropriate responses from policy or operational perspectives, in context.

The ALAC is aware that sectors in the ICANN community have weighed in on the results of this study, with one or other concerned questions on the methodology, size of dataset, geographic scope of study and/or the analysis of the data, all intended to undermine the findings.  Nothing we have seen to date would have shaken our confidence in this baseline fact; WHOIS misuse is factual and widespread, as the evidence from 44% of sampled registrants across the several domains attest.  Given the continued threat this poses to the security and confidence in the use of the Internet, the public interest demands measures to address and abate its impact.

The ALAC will support any useful measure to abate misuse, including but not limited to WHOIS data anti-harvesting techniques.  And even as the study identifies some gTLDs as more susceptible than others, we believe that adopting the best practices from every domain that have proven and useful anti-harvesting implementations of WHOIS data would be a useful beginning for a coordinated response from registries and registrars.    

FIRST DRAFT SUBMITTED

The ALAC has studied the WHOIS Misuse Study commissioned by ICANN and executed by researchers from Carnegie Mellon University over the period.  We note the study has returned findings that align with individual experience of At-Large constituents plus the evidence of widespread occurrence has validated similar research executed by At-Large connected researchers.  The question for the ALAC has never been whether misuse was factual. Rather, it was whether the level of misuse warranted measures to reduce or eliminate and, what would be appropriate responses from policy or operational perspectives, in context.

The ALAC is aware that sectors in the ICANN community have weighed in on the results of this study, with one or other concerned questions on the methodology, size of dataset, geographic scope of study and/or the analysis of the data, all intended to undermine the findings.  Nothing we have seen to date would have shaken our confidence in this baseline fact; WHOIS misuse is factual and widespread, as the evidence from 44% of sampled registrants across the several domains attest.  Given the continued threat this poses to the security and confidence in the use of the Internet, the public interest demands measures to address and abate its impact.

The ALAC will support any useful measure to abate misuse, including but not limited to WHOIS data anti-harvesting techniques.  And even as the study identifies some gTLDs as more susceptible than others, we believe that adopting the best practices from every domain that have proven and useful anti-harvesting implementations of WHOIS data would be a useful beginning for a coordinated response from registries and registrars.    


  • No labels