Rights Protection Mechanisms and Abuse Mitigation Sample Clauses

Rights Protection Mechanisms and Abuse Mitigation. ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-­‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.
AutoNDA by SimpleDocs
Rights Protection Mechanisms and Abuse Mitigation. ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-­‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections. ix. Supplement the periodic audit of Whois data by more extensively reviewing and verifying data accuracy, and work to remediate inaccuracies (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). x. Regularly monitor registered domain names for pharming, phishing, spam, botnets, copyright infringement, and other forms of abuse, and work to remediate any such activity. Registry Operator reserves the right to cancel registrations on the basis of abusive behavior, if necessary. xi. Require that registrars maintain a continually available point of contact capable of addressing problems involving abusive activity, and that registrars maintain the capability to remediate abuse or cancel a registration promptly, if necessary.
Rights Protection Mechanisms and Abuse Mitigation. ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. Periodic audits of WHOIS data that is provided by domain name registrants to insure accuracy of registrant information. These audits will help identify erroneous contact information and frequently prompt registrants to maintain accurate registration data in its database. ii. Remediation of inaccurate WHOIS data, including suspending a domain name, if warranted. Registry Operator will act to suspend services to any registrant who is nonresponsive to its requests to update and provide accurate WHOIS information. The suspension of domain names that do not comply will discourage registrants from using Registry Operator’s services for improper activities. iii. A Domain Protected Marks List (DPML) to insure greater trademark protection for trademark holders. The DPML will allow trademark registrants to block their trademarks from being registered by others at the second level. iv. Rigorous Terms of Use that prohibit illegal or abusive activity. Registry Operator will present clear and unambiguous terms and conditions and acceptable use policies that Registry Operator will enforce by operating a compliance team. v. Limitations on domain name proxy and privacy services. Registry Operator will allow domain name proxy or privacy services to be offered only by select registrars and resellers who have demonstrated a commitment to enforcing the accuracy of registrant data and their willingness to cooperate with members of law enforcement to identify users who are engaging in improper or illegal activity. vi. Published policies and procedures that define abusive activity. Similar to the mandating of rigorous terms of use, Registry Operator will establish and enforce several policies (i.e. privacy, data security, acceptable use, copyright infringement, as well as others) to ensure that registrants use the TLD only for activities that comply with these policies. vii. Registry Operator will be properly resourced to perform these protections.
Rights Protection Mechanisms and Abuse Mitigation. ­‐ Registry Operator commits to implementing and performing the following protections for the TLD:
Rights Protection Mechanisms and Abuse Mitigation. ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. Periodic audits of WHOIS data that is provided by domain name registrants to insure accuracy of registrant information. These audits will help identify erroneous contact information and frequently prompt registrants to maintain accurate registration data in its database. ii. Remediation of inaccurate WHOIS data, including suspending a domain name, if warranted. Registry Operator will act to suspend services to any registrant who is nonresponsive to its requests to update and provide accurate WHOIS information. The suspension of domain names that do not comply will discourage registrants from using Registry Operator’s services for improper activities. iii. A Domain Protected Marks List (DPML) to insure greater trademark protection for trademark holders. The DPML will allow trademark registrants to block their trademarks from being registered by others at the second level.

Related to Rights Protection Mechanisms and Abuse Mitigation

  • Rights Protection Mechanisms Registry Operator shall implement and adhere to the rights protection mechanisms (“RPMs”) specified in this Specification. In addition to such RPMs, Registry Operator may develop and implement additional RPMs that discourage or prevent registration of domain names that violate or abuse another party’s legal rights. Registry Operator will include all RPMs required by this Specification 7 and any additional RPMs developed and implemented by Registry Operator in the registry-­‐registrar agreement entered into by ICANN-­‐accredited registrars authorized to register names in the TLD. Registry Operator shall implement in accordance with requirements set forth therein each of the mandatory RPMs set forth in the Trademark Clearinghouse as of the date hereof, as posted at xxxx://xxx.xxxxx.xxx/en/resources/registries/tmch-­‐requirements (the “Trademark Clearinghouse Requirements”), which may be revised in immaterial respects by ICANN from time to time. Registry Operator shall not mandate that any owner of applicable intellectual property rights use any other trademark information aggregation, notification, or validation service in addition to or instead of the ICANN-­‐

  • Applicability of Data Privacy Protections In the event that Personal Information will be Processed by Supplier in connection with the performance under this Agreement (including any SOW), then and only then shall the provisions of this Section ‘Data Protection and Privacy’ be applicable. For the avoidance of doubt, the data security requirements contained in section ‘Information Security’ shall apply regardless of whether Personal Information is Processed under this Agreement or any SOW. All Personal Information obtained from or on behalf of DXC or in connection with performance pursuant to this Agreement shall be Processed and protected pursuant to this Section ‘Data Protection and Privacy’, the Section ‘Information Security’ and any other Sections of this Agreement that address Personal Information.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • PERSONAL DATA PROTECTION ACT 7.1. PAH is committed to protecting the privacy, confidentiality and security of all personal data to which it is entrusted. It has been our policy to ensure your personal information are protected. With the introduction of the Malaysian Personal Data Protection Act 2010 ("PDPA"), we are even committed to ensure the privacy and confidentiality and security of all personal data are protected in line with the PDPA. We process personal data which you have provided to us voluntarily through our website upon your registration and this includes personal data such as your name, address, NRIC and contact details. In this regards, you have expressly consent to our processing of your personal data. If you give us personal data or information about another person, you must first confirm that he/she has appointed you to act for him/her, to consent to the processing of his/her personal data and to receive on his/her behalf any data protection notices. We may request your assistance to procure the consent of such persons whose personal data is provided by you to us and you agree to do so. You shall indemnify us in the event we suffer loss and damage as a result of your failure to comply with the same. We will only retain your personal data for as long as necessary for the fulfilment of the specified purposes or as legislated 7.2. E-Bidders shall be responsible for the confidentiality and use of password and not to reveal the password to anyone at any time and under any circumstances whether intentionally or unintentionally. 7.3. E-Bidders agree to comply with all the security measures related to safety of the password or generally in respect of the use of the service. In the event that the password is compromised, the E-Bidders shall immediately notify PAH.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!