Rights Protection Mechanisms and Abuse Mitigation Sample Clauses

Rights Protection Mechanisms and Abuse Mitigation. ­‐ Registry Operator commits to implementing and performing the following protections for the TLD:
AutoNDA by SimpleDocs
Rights Protection Mechanisms and Abuse Mitigation. Registry Operator commits to implementing and performing the following protections for the TLD: Periodic audits of WHOIS data that is provided by domain name registrants to insure accuracy of registrant information. These audits will help identify erroneous contact information and frequently prompt registrants to maintain accurate registration data in Registry Operator’s database. Remediation of inaccurate WHOIS data, including suspending a domain name, if warranted. Registry Operator will act to suspend services to any registrant who is non-responsive to the requests to update and provide accurate WHOIS information. The suspension of domain names that do not comply will discourage registrants from using Registry Operator services for improper activities. A Domain Protected Marks List (DPML) to insure greater trademark protection for trademark holders. The DPML will allow trademark registrants to block their trademarks from being registered by others at the second level. This blocking will occur across all of Registry Operator’s TLD extensions. Rigorous Terms of Use that prohibit illegal or abusive activity. Registry Operator will present clear and unambiguous terms and conditions and acceptable use policies, which will be enforced by operating a compliance team. Limitations on domain name proxy and privacy services. Registry Operator will allow domain name proxy or privacy services to be offered only by select registrars and resellers who have demonstrated a commitment to enforcing the accuracy of registrant data and their willingness to cooperate with members of law enforcement to identify users who are engaging in improper or illegal activity. Published policies and procedures that define abusive activity. Similar to the mandating of rigorous terms of use, Registry Operator will establish and enforce several policies (i.e. privacy, data security, acceptable use, copyright infringement, as well as others) to ensure that registrants use the TLD only for activities that comply with these policies. Proper resourcing to carry out all of these mechanisms above. Registry Operator has already committed tremendous resources to fund and implement all of these protection mechanisms and will continue to fund these mechanisms for as long as Registry Operator is the registry operator for any TLD. SPECIFICATION 12 COMMUNITY REGISTRATION POLICIES Registry Operator shall implement and comply with all community registration policies described below and/or attached to thi...

Related to Rights Protection Mechanisms and Abuse Mitigation

  • Rights Protection Mechanisms Registry Operator shall implement and adhere to the rights protection mechanisms (“RPMs”) specified in this Specification. In addition to such RPMs, Registry Operator may develop and implement additional RPMs that discourage or prevent registration of domain names that violate or abuse another party’s legal rights. Registry Operator will include all RPMs required by this Specification 7 and any additional RPMs developed and implemented by Registry Operator in the registry-­‐registrar agreement entered into by ICANN-­‐accredited registrars authorized to register names in the TLD. Registry Operator shall implement in accordance with requirements set forth therein each of the mandatory RPMs set forth in the Trademark Clearinghouse as of the date hereof, as posted at xxxx://xxx.xxxxx.xxx/en/resources/registries/tmch-­‐requirements (the “Trademark Clearinghouse Requirements”), which may be revised in immaterial respects by ICANN from time to time. Registry Operator shall not mandate that any owner of applicable intellectual property rights use any other trademark information aggregation, notification, or validation service in addition to or instead of the ICANN-­‐

  • Xxxxx Disaster Protection In accordance with the requirements of the Flood Disaster Protection Act of 1973 (42 U.S.C. 4001), the Subrecipient shall assure that for activities located in an area identified by the Federal Emergency Management Agency (FEMA) as having special flood hazards, flood insurance under the National Flood Insurance Program is obtained and maintained as a condition of financial assistance for acquisition or construction purposes (including rehabilitation).

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • Governance and Anticorruption 14. The Borrower, the Project Executing Agency, and the implementing agencies shall (a) comply with ADB’s Anticorruption Policy (1998, as amended to date) and acknowledge that ADB reserves the right to investigate directly, or through its agents, any alleged corrupt, fraudulent, collusive or coercive practice relating to the Project; and

  • PERSONAL DATA PROTECTION ACT 7.1. PAH is committed to protecting the privacy, confidentiality and security of all personal data to which it is entrusted. It has been our policy to ensure your personal information are protected. With the introduction of the Malaysian Personal Data Protection Act 2010 ("PDPA"), we are even committed to ensure the privacy and confidentiality and security of all personal data are protected in line with the PDPA. We process personal data which you have provided to us voluntarily through our website upon your registration and this includes personal data such as your name, address, NRIC and contact details. In this regards, you have expressly consent to our processing of your personal data. If you give us personal data or information about another person, you must first confirm that he/she has appointed you to act for him/her, to consent to the processing of his/her personal data and to receive on his/her behalf any data protection notices. We may request your assistance to procure the consent of such persons whose personal data is provided by you to us and you agree to do so. You shall indemnify us in the event we suffer loss and damage as a result of your failure to comply with the same. We will only retain your personal data for as long as necessary for the fulfilment of the specified purposes or as legislated

Time is Money Join Law Insider Premium to draft better contracts faster.