My Cart
Toll Free
888.398.4703
International
++1.760.736.3700

Application Preview

Application number: 1-1309-81322 for Asia Spa and Wellness Promotion Council Limited

Generated on 11 06 2012


Applicant Information


1. Full legal name

Asia Spa and Wellness Promotion Council Limited

2. Address of the principal place of business

Unit 709A, Level 6, Kelana Park View Tower, Jalan SS6⁄2
Petaling Jaya 47301
MY

3. Phone number

+603 78808692

4. Fax number

+603 78808695

5. If applicable, website or URL

www.aswpc.org

Primary Contact


6(a). Name

Mr. Edmon Chung

6(b). Title

Director Representative

6(c). Address


6(d). Phone Number

+852 3520 2635

6(e). Fax Number


6(f). Email Address

info@tld.asia

Secondary Contact


7(a). Name

Ms. Rebecca Chan

7(b). Title

Company Secretary

7(c). Address


7(d). Phone Number

+852 3520 2635

7(e). Fax Number


7(f). Email Address

rebecca@dot.asia

Proof of Legal Establishment


8(a). Legal form of the Applicant

Body Corporate

8(b). State the specific national or other jursidiction that defines the type of entity identified in 8(a).

Hong Kong SAR

8(c). Attach evidence of the applicant's establishment.

Not Available

9(a). If applying company is publicly traded, provide the exchange and symbol.


9(b). If the applying entity is a subsidiary, provide the parent company.


9(c). If the applying entity is a joint venture, list all joint venture partners.


Applicant Background


11(a). Name(s) and position(s) of all directors

Ng Yan MengChairman
Ooi Keim FungDirector
Tay Seng TongDirector

11(b). Name(s) and position(s) of all officers and partners

Ng Yan MengChairman

11(c). Name(s) and position(s) of all shareholders holding at least 15% of shares

Ng Yan MengChairman

11(d). For an applying entity that does not have directors, officers, partners, or shareholders: Name(s) and position(s) of all individuals having legal or executive responsibility


Applied-for gTLD string


13. Provide the applied-for gTLD string. If an IDN, provide the U-label.

spa

14(a). If an IDN, provide the A-label (beginning with "xn--").


14(b). If an IDN, provide the meaning or restatement of the string in English, that is, a description of the literal meaning of the string in the opinion of the applicant.


14(c). If an IDN, provide the language of the label (in English).


14(c). If an IDN, provide the language of the label (as referenced by ISO-639-1).


14(d). If an IDN, provide the script of the label (in English).


14(d). If an IDN, provide the script of the label (as referenced by ISO 15924).


14(e). If an IDN, list all code points contained in the U-label according to Unicode form.


15(a). If an IDN, Attach IDN Tables for the proposed registry.

Not Available

15(b). Describe the process used for development of the IDN tables submitted, including consultations and sources used.


15(c). List any variant strings to the applied-for gTLD string according to the relevant IDN tables.


16. Describe the applicant's efforts to ensure that there are no known operational or rendering problems concerning the applied-for gTLD string. If such issues are known, describe steps that will be taken to mitigate these issues in software and other applications.

A number of operational and rendering issues may arise with the delegation, and subsequent operation and use of a new TLD. Some of these issues may be experienced just by the users of one or two particular TLDs, due to the nature or composition of the string itself; whereas other issues (such as software support) may be experienced across all new TLDs.
Evaluation of the potential operational and rendering issues for this TLD was delegated to ARI. ARI is experienced with:
– The operational issues of operating TLDs
– TLDs that offer registrations at the third level (eg .com.au, .net.au) and below
– The rendering and operational issues surrounding the introduction of IDNs
ARI has executed a suite of tests to evaluate any issues arising from the use of the TLD string. ARI configured a test environment that consisted of DNS software, web server software, and an email server configured for sample domains in this TLD. Where possible, ARI attempted to test many equivalent applications, however the number of and different versions of applications means that testing was limited to the most common environments.
The tests executed by ARI indicate that this TLD is subject to the same issues already experienced by TLDs in the root, which are neither new nor unique. A summary of these common issues is provided below.
- Some applications make assumptions about known valid TLDs and fail to recognize new TLDs
- Some Non-IDN aware applications require the user to provide input in A-labels
- Some IDN aware applications present the user with the domain name using A-labels instead of U-labels
- Some IDN aware applications fail to render IRIs in a manner consistent with user expectations.
To mitigate these issues, ARI will work with us to ensure that maintainers of applications are made aware of the delegation and operation of this TLD. When relevant, we will refer the maintainers to the verification code produced by ICANN in the area for Universal Acceptance of All Top Level Domains such that operational issues can be mitigated for other TLDs.
ARI and us will work with maintainers of applications to provide subject matter knowledge where required, and provide directions to the tools provided by third parties such as the International Components for Unicode project and other groups, that can assist the application maintainer in adding the required support. User education may be required enabling users to configure their applications for correct functioning of this TLD. An informational section on the TLD website will be considered to address questions raised by the Internet community.
The steps ARI will take to mitigate these issues are more than adequate. Thus, we do not believe this TLD raises stability concerns and there is no reason that it should be denied on an operational and rendering issues bases.

17. (OPTIONAL) Provide a representation of the label according to the International Phonetic Alphabet (http://www.langsci.ucl.ac.uk/ipa/).


Mission/Purpose


18(a). Describe the mission/purpose of your proposed gTLD.

.spa is dedicated to the spa and wellness community.

According to a recent PricewaterhouseCoopers survey focused on the spa industry, 95% have dedicated business websites, 81% advertise and connect to consumers through social media, and over 50% are listed in online directories and monitor reviews. What this means is that the community is eager to reach out to and communicate with its customers online. Developing a strong online presence is therefore becoming increasingly important for operators in the spa community.

Today, none of the TLDs offer the type of health conscious, relaxation and wellness branding that is extremely important for successful spas. Domain names are already more than just a command line used for navigation and resource location on the Internet. Having a TLD that expresses the spirit and branding for spas would be very meaningful to the community. The .spa TLD would be the most appropriate TLD for this purpose.

Another emerging trend as identified in SpaFinder’s 2012 report for top 10 spa trends is online wellness games. While online games are not traditionally associated with personal wellness and health, SpaFinder reports that medical experts agree that online wellness games “could actually be the key to changing the world’s health, given the unique power that its core mechanisms (especially social dynamics) have on sustaining wellness goals.”

Building on these developing trends, the vision of the Registry is that through the development of the .spa TLD, it is possible to promote the advancement of the spirit and mind-body vitality philosophies of the spa community, to advocate the wholesome health and wellness consciousness of people around the world.

The mission and purposes of the .spa TLD are:

1. To operate the .spa TLD as a world-class domain registry dedicated to promoting the spa and wellness community;

2. To support the spa and wellness community, it’s industry operators, professionals and practitioners, in their efforts to develop and extend their presence online;

3. To foster collaboration within the community, which in turn supports the advocacy of the sustainable holistic mind, body and spiritual wellness of the society;

4. To encourage excellence and professionalism in the spa and wellness community by leveraging the .spa TLD to further the interaction between the industry and consumers; and,

5. To deliver a secure and stable TLD registry with a high sense of integrity with policies that protect against abusive registrations and the infringement of rights of others.

In addition, to its mission and vision, as a new gTLD, the Registry believes in its responsibility as a responsible industry participant to advance competition, enhance consumer trust and promote consumer choice with the development of the TLD:

A. Advance Constructive Competition

The .spa TLD is focused on developing a namespace that can be complementary to the spa community. The TLD is not intended to be a generic alternative to existing gTLDs. The .spa TLD advances constructive competition among TLDs by offering a niche TLD with the appropriate stylistic identity over other TLDs, for the spa community.

The adoption of the .spa TLD also promotes constructive competition among spas which could exemplify their awareness in the development of technologies supporting wellness. Furthermore, the Registry believes that the utilization of a .spa domain can provide spas with a better online brand that matches with the style and touch as a relaxed and comfortable environment that matches their offline identity.

B. Enhance Consumer Trust

Based on expert studies, Internet users have more trust for domain names that exactly matches what they are looking for. Providing a namespace for spas would allow spa operators to develop a more trusting online brand which they can advertise to their customers with. The value of the TLD name in itself is therefore a core part of the value and of building consumer trust.

Furthermore, appropriate Abuse Prevention & Mitigation (APM) as well as Rights Protection Mechanisms (RPM) is also important to ensuring a trusted domain space. Further details of APM and RPM above and beyond the basic ICANN requirements is discussed in responses to Q28 & 29

C. Promote Consumer Choice

According to a research by PricewaterhouseCoopers, there are a total of around 40,000 spas around the world (not including the hundreds and thousands of massage establishments and foot spas in Mainland China). According to the same research, in 2010, spas received 150 million client visits in the US, an increase from 143 million the year before. The revenue from the spa industry has reached US$12.8 billion in 2010 in the US, up from US$12.3 in 2009. The spas in the Asia Pacific region generate around US$2 billion a year and this figure is expected to increase significantly in the coming years.

The .spa TLD believes in creating value for the spa community and consumers in general which is not necessarily measured by the volume of domain names registered under the .spa TLD but the branding value it offers to the spa community. A consumer of spa products and services is looking for an environment that nurtures their mind and body in relaxed environment. None of the existing TLDs evoke that sense of peaceful calm for consumers.

The .spa TLD has the possibility to address those needs and provide consumers with a choice to enter a domain that harmonizes with the emotional wellbeing they are seeking in a spa.

18(b). How proposed gTLD will benefit registrants, Internet users, and others

As the world becomes more health conscious, the spa community is seeing rapid growth for its products and services. The global spa industry has grown to a multi-billionaire dollar industry. Spa facilities and services are a given in luxury hotels around the world and spa-centric travel have become increasingly popular. An increased consumer interest and focus on personal health and wellbeing have generated a surge in online searches for information regarding spa services and products so having an online presence is vital. More consumers are now looking for spa packages at home or when traveling abroad, and many are seeking information about spas online.

According to the Online Gaming Association (http:⁄⁄www.onlinegaming association.com⁄statistics) the online gaming market is worth more than $15 billion in 2011. A growing sector per the 2012 report by SpaFinder, is online wellness games. “Wellness gaming is projected to generate $2 billion in revenues by 2015⁄6 and the challenge for the spa and wellness industries will be to create truly engaging games (whether online or off) that creatively connect their clients to the spa’s programming, experts and special community, whether they use⁄customize third- party gaming platforms or unleash their own.”

These are both trends to support the importance of the .spa TLD as a dedicated namespace for the spa community, and its benefits to Internet users.

1) Goals of the TLD

The .spa TLD aspires to be the domain of choice for the global spa community. For the spa industry much of the novelty and value will be in the name itself. It is well understood that words evoke feelings and emotions. This technique and knowledge is popularized in advertising and branding. Looking at the existing TLDs, it is hard to imagine any of them being able to evoke the types of feeling necessary for a successful spa. The area of specialty for the Registry is in the spa community and to provide a namespace based on a name that evokes feelings of relaxation, traquillity,rejuvenation that are complementary to spas around the world.

With the full support of ARI as the registry back-end services provider, the TLD aims to operate at world class service levels delivering registry services to its registrars, registrants as well as general internet users a high capacity and high availability platform.

The Registry, through the support from its Registry Front-End Services Provider, Namesphere, which is a spin-off of the DotAsia Organisation, sets a noble goal in building itself as a reputable initiative that is economically viable, sensitive to the cultural aspects of the community it serves, and one which participates in the global community as a responsible netizen, upholding a high level of integrity and respecting the rights of others.

2) Differentiation and Innovation

The Registry believes that a name makes a difference. An important point of differentiation of the .spa TLD is the TLD itself, what the word “spa” means to most people and the types of emotions evoked by the word “spa” (especially as compared with the other existing TLDs).

As a gTLD, the Registry believes in providing a secure and stable platform from which innovations can be built by registrants. The Registry will focus its efforts on innovations that improve the security, stability and user experience of Internet users by providing high availability and seamless advancement of technologies. The Registry will be supportive of the innovations from the spa community, for example, in the developing interest in online wellness games.

3) Improving User Experience

The user experience is enhanced by the use of the .spa TLD itself. As explained above, names and words evoke meaning and emotions. The spa experience begins with the moment the user enters the .spa domain name through the keyboard.

As a TLD targeted for the spa and wellness industry, providing a complementary user experience is at the core vision of the Registry. Besides the name value itself, the Registry is dedicated to maintaining a secure and stable infrastructure both in terms of the technical resolution of .spa domain names as well as the prevention against abusive registrations.

4) Registration Policies Supporting the Goals to Drive User Benefits

Special Sunrise provisions will be developed (in addition to the standard Sunrise and TMCH processes as required by Specification 7 of the new gTLD Registry Agreement) to provide priority registration opportunity for licensed spa and wellness centers around the world. This ensures that existing spas have the best opportunity to utilize their brand name on a .spa domain.

Upon Go Live of the registry, the TLD will be an open registry accepting registrations from individuals and organizations around the world who identify with the spirit of the spa community. To uphold its reputation as a socially responsible TLD, beyond the basic ICANN requirements, the Registry is committed to put in place a comprehensive Sunrise and Startup process (Q29) as well as effective Abuse Prevention (Q28) and Rights Protection Mechanisms (Q29) to strengthen the orderly and stable introduction of the TLD. Furthermore, special considerations are being made for the reservation of relevant geographical and other related names. Further explanation in #18c, #20e, #22 and #29.

5) Privacy and Confidentiality Protection

Measures to protect the privacy and any confidential information of registrants will be consistent with other existing broad generic gTLDs. This ensures a sense of coherence from users and registrants and reinforce the goals of making IDN not an alternative but a given.

To address registrant privacy, the Registry is administered with compliance to a Privacy Policy which requires that identifying information received by the Registry Operator in connection with registrations will not be disclosed to third parties, except as required to combat any abusive registrations and comply with our contractual obligations to ICANN and investigations conducted by law enforcement agencies.

The .spa TLD will be based out of Hong Kong and will be governed by the Privacy Ordinance, while the registry systems will be mainly based in Australia, governed by the Privacy Act 1988 (Cth), both of which sets down specific terms and conditions for collecting, storing and using the personal information of others. A Privacy Policy has been developed which is compliant with relevant legislation and ensures that a high level of privacy and information security surrounds all collected data.

6) Alignment of Mission of the Asia Spa & Wellness Promotion Council

As the applicant of the .spa TLD, the Asia Spa & Wellness Promotion Council (ASWPC) is itself very much involved in the positive development of the spa and wellness community. As such, the organization is also dedicated to promoting the benefits of end-users at large as well as the broader promotion of maintaining socially responsible operations.

ASWPC is the regional coordinating body for the promotion of spa and wellness centres. We assist national and regional organisations in promoting spa and wellness centres both inter- and intra-regionally to an audience of wellness tourists, health practitioners and other stakeholders.

As a promotion council, ASWPC aims to bring together the top spa and wellness centres of today and tomorrow to uphold the growth and professionalism of the spa and wellness industry through the positive power of collective and co-operative marketing.

ASWPC is closely connected to the spa and wellness centres’ networks. We work hand in hand with our partners to provide educational, marketing, branding and networking opportunities to stakeholders of the spa and wellness industry. The connections are made possible through the ASWPC network that will benefit individuals and communities around the world while fostering an environment for personal and professional development among the participants.

ASWPC embraces a multi-stakeholder approach in its work by connecting stakeholders from different spectrums:
- Governments: tourism, trade promotions, health and SME development agencies
- Industry Associations: spa and wellness associations, export and SME associations, health and tourism associations, hotel and travel associations
- Spas & Wellness Centers: spas and wellness centers, investors, owners, operators and managers
- Practitioners: spa and wellness enthusiasts, therapists and practitioners
- Media: spa, wellness, tourism, hospitality, business and lifestyle media -- broadcast, print and digital
- Thought Leaders: industry thought leaders, subject experts and academicians

The core objectives of ASWPC are delivered through a series of programs that address the three key pillars of the organization:
1. Capacity Building
2. Sustaining Awareness: Collective and Co-operative Marketing
3. Creating Value: Industry Standards and Feedback Mechanism

In upholding the credos of ASWPC:
- Uphold the professionalism of the spa and wellness industry
- Promote sustainability and respect for the environment
- Treat all practitioners and stakeholders equitably

ASWPC members pledge to:
- Promote and encourage the highest level of ethics within the spa and wellness industry while maintaining the highest standards of professional conduct;
- Strive for excellence in all aspects of the spa and wellness industry by performing consistently at or above acceptable industry standards;
- Protect the public against fraud and unfair practices, and promote all practices that bring credit and respect to the industry;
- Provide truthful and accurate information;
- Treat all stakeholders fairly regardless of race, religion, gender, disability, age, or national origin;
- Accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment;
- Seek, accept, and offer honest criticism to acknowledge and correct the errors, and to credit properly the contributions of others;
- Accept responsibility in helping one another. Avoid negative competition and real⁄perceived conflicts of interest;
- Adhere to all national and local laws & regulations; and not engage in unlawful activity in any country.

7) Spa & Wellness Community Organisations

The ASWPC is not alone in the spa and wellness community. The community is well organized and have many associations whose activities and principles also have users at large in mind.

The following are some of these organisations:

Asia Spa & Wellness Promotion Council, Asia (http:⁄⁄www.aswpc.org⁄)
Asia Pacific Spa & Wellness Coalition, Asia (http:⁄⁄www.apswc.org⁄)
Spa Association of Africa (SAA), Africa (http:⁄⁄www.spaassociationofafrica.com⁄)
Argentina Spa Association, Argentina (http:⁄⁄www.asociacionspa.org)
Australasian Spa Association (ASPA), Australia (http:⁄⁄www.aspaassociation.com.au)
Bali Spa and Wellness Association (BSWA), Bali (http:⁄⁄www.balispawellness-association.org⁄)
European Spa Association, Belgium (http:⁄⁄www.espa-ehv.com⁄)
Brazilian Spas Association (ABC-Spas), Brazil (http:⁄⁄www.abcspas.com.br)
Bulgarian Union for Balneology and Spa Tourism (BUBSPA), Bulgaria (http:⁄⁄www.bubspa.org⁄)
Leading Spas of Canada, Canada (http:⁄⁄www.leadingspasofcanada.com⁄web⁄)
Ontarioʹs Finest Spas, Canada (http:⁄⁄www.ontariosfinestspas.com⁄)
Premier Spas of Ontario, Canada (http:⁄⁄www.ontariospremierspas.com⁄)
Spas Relais Santé, Canada (http:⁄⁄www.spasrelaissante.com)
China National Spa Association, China (http:⁄⁄www.chinaspaassociation.com⁄)
Cyprus Spa Association, Cyprus (http:⁄⁄www.cyprusspaassociation.com⁄)
Association of the Spa Places of the Czech Republic, Czech Republic (http:⁄⁄www.spas.cz⁄osdruzenien.htm)
Estonian Spa Association, Estonia (http:⁄⁄www.estonianspas.com⁄en)
European Spas Association (ESPA), Europe (http:⁄⁄www.espa-ehv.com)
French Spa Association (SPA-A), France (http:⁄⁄www.spa-a.com⁄)
International Spa & Wellness Association (ISWA), Germany (http:⁄⁄www.iswa.de⁄)
German Spas Association, Germany (http:⁄⁄www.deutscher-heilbaederverband.de⁄)
International SPA & Wellness Association (ISWA), Germany (http:⁄⁄www.iswa.de)
Hellenic Association of Municipalities and Communities with Curative Springs and Spas, Greece (http:⁄⁄www.thermalsprings.gr)
Day Spa Association, Asian Chapter, Hong Kong
Hungarian Spa Tourism Association, Hungary
Hungarian Baths Association, Hungary (http:⁄⁄www.furdoszovetseg.hu⁄en⁄)
The Iceland Spa Association, Iceland (http:⁄⁄www.visiteuropeanspas.com⁄iceland⁄)
Indian Spa & Wellness Association (ISWA), India (http:⁄⁄www.iswa.in⁄)
Spa and Wellness Association of India (SWAI), India (http:⁄⁄www.spaandwellnessassociation.com⁄)
Spa Association of India, India (http:⁄⁄spaassociationofindia.in⁄)
Leading Leisure in Ireland - Spa and Wellness Skillnet, Ireland (http:⁄⁄ilam.ie⁄)
Japan Spa Association, Japan (http:⁄⁄www.j-spa.jp⁄)
Nippon Spa Association (NPO), Japan (http:⁄⁄www.n-spa.org⁄)
International Spa Association, Korea
Nacionalin kurort asociacija (Lithuanian Health Resorts Association), Lithuania
Association of Malaysian Spas (AMSPA), Malaysia (http:⁄⁄www.amspa.org.my⁄)
Spa & Wellness Association of Malaysia, Malaysia (http:⁄⁄www.mawspa.org⁄)
Mongolian Spa Sauna Association, Mongolia
Spa & Wellness Association of Nepal, Nepal
Spa and Wellness Association of Cebu (SWAC), Philippines (http:⁄⁄www.ngkhai.net⁄cebu⁄?tag=spa-and-wellness-association-of-cebu-swac)
Spa Association of the Philippines, Philippines (http:⁄⁄www.spaassociation.com.ph⁄)
Association of Polish Spa Communities, Poland (http:⁄⁄www.sgurp.pl⁄index1.htm)
Portuguese Spas Association, Portugal (http:⁄⁄www.termasdeportugal.pt)
Organizatia Patronala a Turismului Balnear din Romania (OPTBR ⁄ Romanian Spa Organization), Romania (http:⁄⁄www.romanian-spas.ro⁄)
National Guild of Spa Experts, Russia (http:⁄⁄eng.russiaspas.ru⁄en⁄guild.phtml)
Spa and Wellness International Council (SWIC), Russia (http:⁄⁄www.wellness-t.lact.ru⁄)
Serbian Spas and Resorts Association, Serbia (http:⁄⁄www.udruzenjebanja.co.rs⁄index.htm)
Spa & Wellness Association Singapore, Singapore (http:⁄⁄www.spaandwellness.org⁄)
Spa Association, Singapore, Singapore (http:⁄⁄www.spaassociation.org.sg⁄members.htm)
Asociácia slovenských kúpeov (Association of Slovakian Spas and Minerals Springs), Slovakia (http:⁄⁄www.balneotherma.sk⁄)
Slovenian Spa Association, Slovenia (http:⁄⁄en.slovenia-terme.si⁄)
South Africa Spa Association, South Africa (http:⁄⁄www.saspaassociation.co.za⁄)
Asociacion Nacional de Balnearios (ANBAL⁄Spanish National Spa Association), Spain (http:⁄⁄www.balnearios.org)
Gran Canaria Spa and Wellness Association, Spain (http:⁄⁄www.grancanariawellness.com)
Sweden SpaHotel Association, Sweden (http:⁄⁄www.svenskaspahotell.se)
L’Association des Espaces Thermaux Suisses (Swiss Thermal Spas Association), Switzerland
Taiwan Spa Association, Taiwan (http:⁄⁄www.tspa.tw⁄index-a00.html)
Samui Spa Association, Thailand (http:⁄⁄www.samuispaassociation.com)
Thai Lanna Spa Association, Thailand (http:⁄⁄www.lannaspa.net)
Phuket Spa Association, Thailand (http:⁄⁄www.spaphuket.org)
Thai Spa Association (TSA), Thailand (http:⁄⁄www.thaispaassociation.com⁄)
Turkish Spa Association, Turkey (http:⁄⁄www.spa-turkey.com⁄eng⁄default.asp)
Ukrainian SPA Association, Ukraine (http:⁄⁄www.spaua.org)
Middle East Spa Business Group, United Arab Emirates (http:⁄⁄r5.ek.aero⁄mespa⁄)
British International Spa Association (BISA), United Kingdom (http:⁄⁄www.spaassociation.org.uk⁄⁄)
Global Hydrothermal Spa Standards Association, United Kingdom
Spa Business Association, United Kingdom (http:⁄⁄www.spabusinessassociation.co.uk⁄)
Dallas Spa Association, United States
Day Spa Association, United States (http:⁄⁄www.dayspaassociation.com⁄)
Destination Spa Group, United States (http:⁄⁄www.destinationspavacations.com)
Green Spa Network, United States (http:⁄⁄greenspanetwork.org)
Hawaii Spa Association, United States (http:⁄⁄www.hi-spa.com)
Hydrothermal Spa Forum, United States (http:⁄⁄www.hydrothermal-spa-forum.com⁄)
International Medical Spa Association, United States (http:⁄⁄www.medicalspaassociation.org⁄)
International SPA Association (ISPA), United States (http:⁄⁄www.experienceispa.com⁄)
Las Vegas Spa Association, United States (http:⁄⁄www.lvspas.com⁄)
New England Spa Association, United States (http:⁄⁄www.newenglandspaassociation.com)
New Mexico Spa Association, United States
San Diego Spa Association, United States (http:⁄⁄www.sdspaassociation.org)
Sedona Spa Association, United States (http:⁄⁄www.sedonaspaassociation.com⁄)
Southern California Spa Directors Association, United States (http:⁄⁄www.thespaconnect.com⁄)
The Spa Association (SPAA), United States (http:⁄⁄www.thespaassociation.com⁄)
Washington Spa Alliance (WSPA), United States (http:⁄⁄www.washingtonspaalliance.com⁄)

18(c). Describe operating rules to eliminate or minimize social costs or financial resource costs, various types of consumer vulnerabilities.

The Registry is committed to introducing the .spa TLD in an orderly manner to minimize the social costs and maximize the social value of the TLD. Following the successful launch of the .ASIA TLD, and leveraging the experience and knowledge from the DotAsia (through Namesphere), the Registry is committed to developing and implementing a comprehensive startup process that would include, besides Sunrise and Landrush processes, a Multi-Category Pioneer Domains Program.

The Pioneer Domains Program will be designed to curb abusive registrations, whereby reducing social costs, as well as to promote the adoption of the TLD, to maximize the social value of the TLD. An important goal of the program is to allow for the introduction of showcase domains under the TLD in a well structured manner, while ensuring that the protection of the rights of others are maintained. The implementation of showcase domains support the development of positive foundation of usage of the TLD. More detailed explanation of the overall startup process is included in #29.

In response to the question specifically:

1. Mechanisms for Resolving Multiple Applications to a Domain

A comprehensive Sunrise and Landrush program will be put in place at the launch of the TLD. As an important stakeholder of the Registry, DotAsia (through Namesphere) will be lending its experience and knowledge in the development of an appropriate Sunrise and Landrush program that includes mechanisms for resolving multiple applications to a domain when the TLD is first launched. More detailed explanation of the approach is included in #29. In short, during the Sunrise and Landrush processes, a first come first served model will not be used as previous launches has demonstrated that such mechanism creates undue tension, chaos and frustration in the process. Applications for domains will be received within a designated time period and all applications received within such period will be considered to be received at the same time. All applicants will be verified first for their eligibility against the Sunrise and Landrush policies respectively. If there is only one successfully verified application for a particular domain, then it will be allocated directly. If there is more than one successfully verified application an auction will be held to resolve the contention.

During regular operations of the registry (upon GoLive and after Sunrise and Landrush), domain registrations will be accepted on a first-come-first-served basis. In cases of contention, the Registry will not prohibit the use of secondary market mechanisms for interested registrants to resolve the contention. Registrant transfers will be administered by accredited registrars without intervention by the Registry. In the cases of contention against abusive registrations, the Registry will adhere to the UDRP and URS procedures.

When a domain name registration is deleted and after completing the lifecycle according to ICANN requirements, the domain name will be re-released to the available pool and registrations will be accepted on a first-come-first-served basis. If activities to snatch names from this “dropzone” become contentious, the Registry is prepared to work closely with the community to provide better mechanisms to resolve contentions where appropriate.

2. Cost Benefits for Registrants

The Registry intends to implement periodic cost reduction programs to encourage the adoption of the TLD by registrants. Such cost reduction programs can also be targeted towards key segments of the market in relation to the mission and vision of the Registry explained above. Based on the experience of DotAsia (through Namesphere), rebate programs that essentially lower the costs for registrants are one of the most effective ways to drive the adoption of a new TLD.

Introductory programs will be important to drive awareness and interest in the TLD as well. These should include not only broad price discounts but also targeted programs. Based on DotAsia’s past experience, targeted programs, such as Home Market Growth programs are effective in raising the awareness for targeted segments. Such programs can also come in the form of special price reduction promos or rebate type programs.

Besides price reduction programs, other cost benefits can also be introduced to registrants. For example, DotAsia also pioneered the offering of free gift redemption programs to spark interest from registrants as well as to drive the cost benefits for adoption of the TLD.

3. Contractual Commitments to Registrants

The Registry will abide by the ICANN Registry Agreement requirements as well as ICANN Consensus Policies, including offering domain registrations for periods of one to ten years at the discretion of the registrar upon GoLive (when normal first-come-first-served registrations begin). During Sunrise and Landrush the Registry will request multi-year initial registrations. The Registry does not plan to implement contractual commitments to registrars regarding the magnitude of price escalation, but is committed to providing a stable environment for registrations, including a stable pricing for registrars.

Besides implementing policies and rules, the Registry believes that prudent operations as an economically viable and socially responsible TLD operator in itself is an important mitigation of increased social costs as a new gTLD is being introduced. The Registry will leverage the knowledge and expertise from its technology provider and DotAsia to ensure that a substantial portion of the costs for operating the registry is managed in variable costs leveraging the economies of scale from already established operations and focus on delivering value to registrants and consumers with the introduction of the .spa TLD and its mission and features.

4. Other Operating Rules Which Eliminate Or Minimise Social Costs

Abusive registrations will be prevented through having in place and enforcing a robust anti-abuse policy; this policy is described in detail in the response to Question 28. ARI, as provider of back-end registry services, has robust preventative and responsive mechanisms to address DDOS attacks, spamming, phishing, data theft, and similar nefarious activity. In addition to compliance with Trademark Clearing House (TMCH) requirements, policy will include processes to address issues involving trademark, copyright and intellectual property.

Furthermore, understanding that the string “spa” may be used in other contexts, special provisions will be put in place to ensure that such exploitations will not adversely compromise the integrity of the TLD. Further discussions about these provisions are included in #20e, #22 and #29.

5. Mandatory Guideline for Registrants

In alignment with the community-based purpose of the .spa TLD, all .spa domain registrations must abide by a set of mandatory guidelines. The following are 3 broad based principles that the provisions within the guidelines will follow (detailed development of the Mandatory Guidelines will be completed by the .SPA Registry Community-Advisory-Council -- SPARC, and further discussed in 20b below):

A. Revitalizing Vigour: allegiance to the community purpose of .spa (as articulated in section #20c below).

B. Positive Energy: promote a positive and socially responsible attitude with strong tolerance to diversity, balanced with vigilance against abusive behaviours.

C. Curative Spirit: support a highly ethical and professional approach in its guard against fraudulent and deceptive activities, beyond adherence to laws and regulations, especially in the equitable and non-discriminatory treatment of people, and the considerations for the environment.

Details of the mandatory guidelines and the implementation of the above principles will be developed and published before the acceptance of registrations in the .spa TLD. All registrants must adhere to these guidelines and the violation of which will constitute grounds for suspension and⁄or cancellation of the domain registration (further discussion in #20e below). The mandatory guidelines apply to content and other uses of the domain, including the name itself where applicable.

The mandatory guidelines will also include clear enforceable parameters of what constitutes violation of the principles. For example:

- Illegal activities
Illegal activities contradict with the community purpose of “.spa”. Suspected illegal activities will be investigated following the abuse prevention and mitigation (APM) processes (#28), including being referred to appropriate law enforcement agencies. Suspected activities not otherwise handled by the APM will be referred to the SPARC as potential deceptive behaviour.

- Promoting violence
The promotion of violence is against the community purpose of the .spa TLD. For illustrative purposes, the following would be considered in violation of the community purpose of the .spa TLD:
i) A substantiated complaint to a domain that is supported by at least one Associate (i.e. a spa and wellness community association) and not objected to by any other Associate and not responded to by the registrant; or
ii) A substantiated complaint to a domain that is supported by at least one Associate and not objected to by any Associate and responded by the registrant explaining that no action can be taken by the registrant to mitigate the issue (e.g. that the domain⁄host has been hijacked or that it is operating a sub-domain or sub-site of the registrant).

- Deceptive behaviour
Deceptive behaviours counter the positive spirit of the .spa TLD. A similar type of process as described for “promoting violence” will be used to consider whether or not a violation of the community purpose is established and what action should be taken.

- Copyright infringement
Copyright infringement will be considered contradictory to the highly ethical and professional approach of the .spa TLD, and therefore considered in violation of the community purpose. For illustrative purposes, the following general framework can be put in place to establish if a domain is in violation:
i) Substantiated claims from bona fide copyright holders that are not responded to by the registrant; or
ii) Substantiated claims from bona fide copyright holders that have been responded by the registrant explaining that no action can be taken by the registrant to mitigate the issue.

- Excessive speculation
Excessive speculation of domain names is considered abusive behaviour in the .spa TLD. For illustrative purposes, the following would be considered excessive speculation:
i) Registering a .spa domain name solely for the purposes of selling, trading or leasing the domain name for compensation; or
ii) Unsolicited offering of registered .spa domains for the purposes of selling, trading or leasing the domain name for compensation;

6. Warning and Suspension Process

All registered .spa domain names must abide by the mandatory guidelines to ensure that .spa domain names are consistent with the community based purpose of the .spa TLD. These guidelines regulate the name selection, #20e B), as well as content and use, #20e C), of .spa domain names.

To manage the warning and suspension process, a simple webform will be established on the Registry website to receive substantiated complaints. A simple web-based system will be maintained by the Registry for this process, and each Associate (member of the SPARC, further discussion in #20b below) will receive a login to view the complaints received.

Any one from the public may lodge a complaint (Community Compliance Complaint) by utilizing the web or email form.

- Substantiated Complaint
A Substantiated Complaint is a Community Compliance Complaint filed that includes a clear description as to why the complainant believes that a .spa domain is in violation of the community purpose requirements according to the mandatory guidelines. A substantiated complaint should include at a minimum:
-- a valid email address of the complainant (will not be disclosed)
-- the .spa domain in question
-- specify which guideline the complainant believes the .spa domain is in violation of
-- explanation of why the complainant believes the .spa domain violated the mandatory guidelines
-- evidence of such violation (e.g. screen capture of the website)

- Supported Complaint
A Substantiated Complaint that have received an affirmative confirmation of support from An Associate (i.e. a member of the SPARC, who would be a representative of a participating spa and wellness association -- further discussion in #20b below) is regarded as a Supported Complaint.

The following describes the framework of the warning and suspension process:

i) Upon the receipt of a Community Compliance Complaint, the Registry will conduct a preliminary review to see whether the minimum requirement as a Substantiated Complaint has been reached. If not, the complainant will be notified of the incompleteness and asked to resubmit (and the case will be closed).

ii) Upon the identification of a Substantiated Complaint, the Registry will determine if the complaint concerns are of an abusive nature relevant for the Abuse Prevention & Mitigation (APM) mechanisms (e.g. illegal activities, etc., further discussions in #28) or not. If so, the complaint will be referred to the APM process. Otherwise, the Substantiated Complaint will enter this warning and suspension process. The Registry will first notify the SPARC. Any Associate (i.e. member of the SPARC) may respond to provide an affirmative confirmation of support to the Community Compliance Complaint.

iii) Upon the receipt of such affirmative confirmation, i.e. the establishment of a substantiated and supported complaint against a domain, the Registry will issue a warning letter to the registrant (and⁄or the sponsoring registrar where appropriate) of the domain, and will provide a 15 calendar day window for the registrant to respond with a description of how the issue would be rectified and remedied.

iv) If a response containing a remedy is received within the 15 days, the domain will be considered cleared until further complaints are received.

v) If no response is received, upon the lapsing of the 15 days, another warning letter along with a notice that the domain will be suspended if the notice is not responded to in 15 calendar days will be sent to the registrant (and⁄or the sponsoring registrar where appropriate). At the same time, the SPARC will also be notified.

vi) If a response containing a remedy is received within the 15 days, the domain will be considered cleared until further complaints are received.

vii) If no response is received upon the lapsing of the 15 days, the domain will be suspended.

viii) Upon or before the suspension of a domain a registrant may appeal the suspension by responding with a clear description of how the issue would be rectified and remedied. Upon the receipt of such appeal, the domain will be considered cleared until further complaints are received.

ix) If at any point in time an objection against the suspension of the domain is received from an Associate, such objection will be considered a substantiated appeal. The domain will be considered cleared until further complaints are received.

ix) Upon the occurrence of ii), iv), vi) or ix) above, the complainant will be notified. If the complainant is unsatisfied with the remedy, the complainant may further advance the complaint through an Administrative Proceeding (explained in c. below).

It is important to note that failure to respond by a registrant will be considered a violation and the domain will be suspended accordingly. Furthermore, a response from a registrant indicating that it is unable to rectify or remedy the issue will also be considered a violation and result in the domain being suspended. These conservative steps are taken to ensure the integrity of the .spa namespace, and to establish that should a registrant be unable to advance the community purpose requirements to its users, such inability would not be considered defence and the domain will still be suspended.

If the domain expires while it is in suspension, the domain registration will not auto-renew, but will enter into redemption grace period and be deleted upon the conclusion of the pending delete period.


Community-based Designation


19. Is the application for a community-based TLD?

Yes

20(a). Provide the name and full description of the community that the applicant is committing to serve.

The spa community primarily includes:
- Spa operators, professionals and practitioners
- Spa associations and their members around the world
- Spa products and services manufacturers and distributors
There are about 40,000 spas around the world. There are regional spa associations in Asia, Africa and Europe, a few international spa associations mainly established in the US, and many local and national spa associations around the world. These associations are usually member organizations of which spa operators are members. While sometimes the word “spa” is loosely used for massage parlours and wellness centers, spa associations often have a more robust definition based on licensed spas and centers (where such licensing is required) that must consist of a key element of water treatment, professionally qualified practitioners and proper facilities.
The secondary community generally also includes holistic and personal wellness centers and organizations. While these secondary community organizations do not relate directly to the operation of spas, they nevertheless often overlap with and participate in the spa community and may share certain benefits for the utilization of the .spa domain. Together, the industry is generally called the “spa and wellness” community. In this document, we will use both “spa and wellness community” and “spa community” interchangeably.
The spa community is clearly delineated from the general Internet community at large; is pre-existing, demonstrated by the multitude of international, regional, national and local organizations and associations; and, is a community of considerable size and longevity.
1. Community
There is a strong cohesion among the spa and wellness community beyond a mere commonality of interest. Beyond business interests, the advocacy of the spirit of the spa approach of a therapeutic and holistic mind and body relaxation and revitalization is an important shared philosophy among the spa community. It is also this shared philosophy to life and society that bonds the spa community.
Many of the operators and members of the spa community are passionate about not just its products and services but about the lifestyle.
2. Delineation
The spa community is clearly delineated. The membership of the spa community include licensed spa operators, professional practitioners, spa associations and their members, as well as manufacturer and distributors of spa products and services.
3. Pre-Existing
The spa community has been active for a very long time. The operation of spas date back to medieval times and the use of the word “spa” as a term to refer to any health resort located near natural springs can be dated back at least to 1596 or as early as the 1300s. National and local spa legislatures and associations have been leading the way in the organization of the community since the 18th century. In the recent decades, regional and international organizations have been established.
4. Organized
The spa community is very much organized and has a multitude of international, regional, national and local associations and organizations, all of which carries the word “spa” as an important distinctive element in its name.
The many organizations of the spa and wellness community has been included in #18b 7) Spa & Wellness Community Organisations above.
Many of the organizations are very active and convene events and conferences for its members as well as among different organizations jointly. The following are some of these conferences:
Global Spa & Wellness Summit (http:⁄⁄www.globalspaandwellnesssummit.org)
ISPA Conference & Expo (http:⁄⁄www.experienceispa.com⁄events⁄annual-conference⁄)
Asia Spa & Wellness Festival
Pool & Spa & Bath China
5. Extension
There are about 40,000 spas around the world and many international, regional, national and local spa associations. The membership of the spa community is geographically diverse. With the increasingly health conscious trends around the world, there is a strong growth and revival of the spa as a holistic approach to mind, body and spirit wellness. The community therefore sees no foreseeable end to the continuing development of spas.
6. Size
While there are only 40,000 spas around the world, based on the US industry statistics from the International Spa Association, there are around 19,900 spas in the US, employing 338,600 people, serving about 150 million spa visits, and generating US$12.8 billion of revenue per year. In the Asia Pacific, about 3,500 spas employ around 50,000 people generating over US$2 billion of revenue per year.
These statistics do not include the rapidly growing market in Mainland China. With a culture and tradition of holistic health and massage, there are numerous day spas and up to hundreds of thousands of massage parlours offering services. While reliable statistics are hard to find, according to an expert estimate, there are 40 brand-name spas in China operating more than 75 outlets, with one third in Beijing and another third in Shanghai, and overall 70% in hotels. The room for growth in China, especially with the proliferation of foot spas, will be tremendous.
7. Longevity
According to historians, the word spa has been a generic description of what it means in the present day since at least 1596. The practice of harnessing the curative powers of mineral waters hearkens back to prehistoric times and have continued to be popular around the world, especially in Europe and Japan. With the growing trend towards holistic wellness of the body and mind, the spa approach has experienced a revival in the US, while Mainland China has been readily integrating spas into its cultural traditions of therapeutic massage. The continued popularity in certain cultures and its strong growth in major markets demonstrate that the spa community is of a lasting and non-transient nature.

20(b). Explain the applicant's relationship to the community identified in 20(a).

The Asia Spa and Wellness Promotion Council (ASWPC) as the Applicant for the .spa TLD is deeply involved in the spa and wellness community. Connected with over 400 licensed spas across Asia and over 2000 spa professionals participating in and attending its events, the ASWPC is committed to supporting a vibrant, self-sustaining spa and wellness industry.
Please refer to #18b 6) Alignment of Mission of the Asia Spa & Wellness Promotion Council, and the .spa TLD for more detailed description of the ASWPC (http:⁄⁄www.aswpc.org⁄).
For the .spa TLD initiative nevertheless, ASWPC intends to operate the registry as an open global platform for spas around the world (not just for Asia). As such, upon the successful approval of the .spa TLD by ICANN, ASWPC will formalize a dedicated .Spa Registry Community Advisory Council to support the governance and policy development for the global .spa TLD.
.SPA Registry Community-Advisory-Council (SPARC)
While ASWPC is itself a spa community organization with the participation of over 400 spa operators around Asia and has taken the initiative to lead the effort for the creation and establishment of the .spa TLD for the community, ASWPC believes that the governance of the .spa TLD must not be managed by ASWPC alone and must be opened to include other spa community organisations around the world.
In order to ensure that the .spa TLD is accountable to the community, the .SPA Registry Community-Advisory-Council (SPARC) will be convened to oversee the governance of the Registry. The SPARC will be especially tasked to ensure that policies developed and implemented by the .spa registry would fully take the spa community into consideration.
1. Constitution & Structure of SPARC
Upon the successful approval of the .spa TLD, ASWPC will formalize the creation of the SPARC by inviting all community organizations to become Associates of the .spa TLD. Each Associate will nominate one individual as a representative to the SPARC.
International, regional, national and local spa and wellness associations (such as those listed in 20a 4 above) are eligible to become an Associate of the .spa TLD. To be eligible to become an Associate, an organization must:
i. Be properly registered (or otherwise established) in the jurisdiction for which they serve;
ii. Be generally a membership based organization constituted of members of the spa and wellness community (i.e. spa operators, spa products and services providers, spa associations, etc.);
iii. Show its dedication towards the positive development of the spa community; and,
iv. Demonstrate or be willing to declare that its principles, mandate or objectives are not contrary to the principles of the .spa TLD to:
- Uphold the professionalism of the spa and wellness industry
- Promote the sustainability and respect for the social, physical and natural environment
- Treat practitioners and stakeholders equitably
The requirements of becoming an Associate are intentionally flexible to encourage more community members to participate, especially in the beginning. The .spa Registry understands that the interest from the community may only be generated as the TLD is actually put into operation and people can see .spa domain names being used. Therefore, membership to the SPARC will remain open with an inclusive approach to allow community organizations to join the initiative at their pace without being disadvantaged.
It is intended that as the membership to the SPARC increases, sub-committees, panels and working groups will be established to support the development of policies, processes and measures for the .spa TLD. Specific operational processes and principles of the SPARC will be developed by the SPARC itself, with an initial framework to be put in place within the first 6-months upon the approval of the TLD by ICANN. The initial framework will include principles and processes for policy development processes as well as decision making procedures of the SPARC.
2. Policy Development Processes
While the SPARC will be tasked to develop the policy development framework, the following basic principles should be observed:
i. all registry policies above and beyond the standard ICANN registry requirements and specifications as well as ICANN consensus policies must be formally adopted by the SPARC
ii. the SPARC shall operate on a consensus and rough consensus basis
iii. in the cases where an issue is to be resolved by a vote of the SPARC, decisions shall be determined by a simple majority of votes casted forming a quorum
Specifically on policy development processes, the following elements should be included as a minimum:
i. A mechanism for public consultation. Such as, a public comment period (with draft policies publicly posted), should be included and notices for such posting issued to Associates and community organizations.
ii. Mechanisms to ensure accountability to the community should be included in the processes. Such as, having at least an annual open meeting of the SPARC at an industry event to encourage the participation from and also report back to the community.
iii. Compliant with ICANN requirements, specifications and consensus policies. All policies developed must be compliant with contractual requirements and the development processes should invite and⁄or be open to the participation from knowledgeable expertise from the ICANN community.
iv. Due considerations to rights protection mechanisms, anti-abuse policies and the overarching concern for maintaining the security and stability of the Internet.
3. Community Engagement
The Registry understands that, as the observation of the development of ICANN itself demonstrates, policy development processes must include outreach and community engagement to continuously improve community participation and remain accountable to the community it serves.
The Registry will proactively reach out to the community and SPARC is also an important vehicle for that. With the support and experience from DotAsia (through Namesphere) and learning from DotAsia’s successful community engagement programs, the Registry is committed to and is confident that it will be able to maintain an open governance structure that could attract growing participation.
From the experience of the development of the ICANN community through the years, as well as from the DotAsia community development, we observe that many participants will only join gradually after the .spa TLD is fully established and has become a reality. As such, we understand the importance of continued dedication to outreach to and engage with the community. The SPARC is important both as a council for the community to participate in, as well as a committee that can help spread the news to the community at large.
Relationship and Appropriateness of the Selected TLD string with the Community
The TLD string “spa” is an exact match of the name for which the community is identified and well-known as. The phrase “spa and wellness” is a common phrase for the community as a whole, for the purposes of the .spa TLD, the Registry will focus more on the spa community. More importantly, the string “spa” is most appropriate to be used in the context of a TLD and encapsulates the key distinguishing aspect of the community and its members in the operation, support and promotion of spa products and services with a shared vision of the spa approach and lifestyle which places importance on the holistic wellbeing of the mind, body and spirit.
The word “spa” has no other significant meaning beyond identifying the spa community. The Registry is aware of other uses of the string “spa”, nevertheless, they represent a minority over the use of the word “spa” as a generic description of its present day meaning referring to the curative use of water treatment to revitalize the body, mind and spirit at a resort or near localities with mineral springs.

20(c). Provide a description of the community-based purpose of the applied-for gTLD.

As a community-based TLD, the .spa TLD will concern itself especially with supporting the development of the spa and wellness community. The Registry believes that, beyond providing a domain of choice for the community aligned with the spirit and way of life of spas, the .spa TLD itself can be a beacon and cause in driving the awareness of holistic health and wellness that spas and the spa and wellness community strives towards. In turn, this is a philosophy that the community believes in and advocates to humanity at large.
Distilling and advancing from the mission of the Registry (as expressed in 18a), the community purposes of the .spa TLD are:
A. To support the spa and wellness community, especially to extend the spa experience on the Internet;
B. To advocate a spa mentality towards sustainable holistic body, mind and spiritual wellness; and,
C. To transcend the spa philosophy in promoting the natural curative revitalisation of the society and the environment.
The Registry also believes that it is important for the .spa TLD to be a community-based TLD in order to best serve the spa and wellness community. While, given the high percentage of spas already having a website, the spa and wellness community may already be quite connected; their awareness and participation on Internet governance is very limited. As a community-based TLD dedicated to the community, the Registry also aims to bring the participation from the spa and wellness community to the international Internet governance discussions, including those at ICANN. This in turn contributes to the further broadening and advocacy of the multi-stakeholder model for Internet governance which the Registry believes would be beneficial to the Internet community at large.
Furthermore, the purpose of the .spa community-based TLD is consistent and aligned with the credos and purpose and the 3 pillars of the Asia Spa and Wellness Promotion Council (ASWPC):
1. Capacity Building
To deliver world-class, industry-leading educational programs that address current, pressing issues and fundamental learning milestones of spa and wellness professionals at all levels of the learning curve,
2. Sustaining Awareness: Collective and Co-operative Marketing
To promote better understanding of the spa and wellness market; create, build and sustain relationships with major stakeholders and enable continued awareness for spas and wellness centers through collaborative promotional efforts, and
3. Creating Value: Industry Standards and Feedback Mechanism
To enable industry suppliers to reach decision makers across the region whilst recognising outstanding achievements within the industry in promoting excellence and unlocking the value of the industry.
and the credos of the Asia Spa and Wellness Promotion Council (ASWPC):
- To uphold the professionalism of the spa and wellness industry
- To promote sustainability and respect for the environment
- To treat all practitioners and stakeholders equitably
Of course, the Registry understands that the .spa domain is just a TLD registry, and its contribution may be limited in scope. Nevertheless, the Registry truly believes in the value and power of a name and what it stands for, and believe that, however much it may be able to achieve, as a community-TLD it can make a difference for the spa community and inspire the betterment of the society at large.
In response to the specific notes in the Applicant Guidebook:
A. Intended registrants in the TLD
Intended registrants are primarily members of the spa and wellness community. Consistent with the purpose of the .spa TLD to promote the mind, body and spiritual wellness of the society at large, the .spa TLD also welcomes individuals and organisations who aspire to this vision and philosophy to utilize and expand the reach of the .spa TLD to health conscious people around the world.
Priority is provided to members of the community through the Sunrise and startup processes (see #20e and #29) to build a positive foundation of usage for the .spa TLD. Special consideration is also provided to incidental implicated communities for which the string “spa” may be used in another context (see also #20e and #29).
Upon Go Live of the .spa TLD, the registry will accept registrations on a first-come-first-served basis. Given well defined meaning of the word “spa” and its tight relationship with the spa and wellness community, the Registry believes that registrants will mainly come from the intended community. Nevertheless, the Registry believes in the spirit of the Internet in being an open platform supporting innovation and therefore will take an approach that allows for an open adoption of the .spa TLD with strong measures to mitigate against abuse (rather than to restrict usage).
B. Intended end-users of the TLD
Primary end-users are registrants and their immediate users (e.g. staff ⁄ team of the registrant organization). Primary users are expected to be mainly from the spa and wellness community, including spa operators, professional practitioners, spa associations and spa products and services manufacturers and distributors. The .spa TLD intends to provide primary users a domain of choice that aligns well with their businesses and philosophies towards wellness. Primary users also include staff of .spa domain registrants, such as technical, legal and marketing departments of registrants. The .spa TLD provides a domain that is consistent with the line of business and approach to wellness that could permeate through the organisation as it is being used in emails, correspondences, internal and external communications.
Secondary end-users are Internet users at large. Secondary users are Internet users seeking information about spa and wellness. The .spa domain begins the spa experience for users around the world at the very moment they enter the domain through their keyboard to navigate to their destination. The Registry believes that words evoke emotional response and that the .spa domain provides an enhanced user experience by its name alone above other existing gTLDs.
C. Related activities the applicant has carried out or intends to carry out in service of this purpose
As explained in #20b above, Asia Spa & Wellness Promotion Council (ASWPC) is the regional coordinating body for the promotion of spa and wellness centres. It assist national and regional organisations in promoting spa and wellness centres both inter- and intra-regionally to an audience of wellness tourists, health practitioners and other stakeholders.
ASWPC is deeply involved in the spa and wellness community. Connected with over 400 licensed spas across Asia and over 2000 spa professionals participating in and attending its events, the ASWPC is committed to supporting a vibrant, self-sustaining spa and wellness industry.
Furthermore, for the .spa TLD initiative specifically, ASWPC intends to operate the registry as an open global platform for spas around the world (not just for Asia), and will formalize a dedicated .Spa Registry Community Advisory Council to support the governance, policy development, community engagement and outreach for the global .spa TLD.
D. Explanation of how the purpose is of a lasting nature
The core purposes of the .spa TLD to:
- promote the development of the spa and wellness community; and
- advocate the spa approach: the sustainable holistic mind, body and spiritual wellness, to the society at large
are both meaningful and of a lasting nature. Spas have been used as a curative water treatment since prehistoric times and have been popular around the world throughout history. With the growing global consciousness for health and wellness, along with the revival and boom of the spa lifestyle, the Registry believes that its purpose is of a lasting nature.

20(d). Explain the relationship between the applied-for gTLD string and the community identified in 20(a).

Following from #20b “Relationship and Appropriateness of the Selected TLD string with the Community”, the selected TLD string “spa” perfectly matches with the name as well as the philosophy of the spa and wellness community.
1. Name
“Spa” is the name for which the community is commonly known by others. Almost all the associations in the community uses the word “spa” as a distinctive element in its name. The activity or its facilities are sometimes known as “bath” or “springs” (more common in the past), but in the present day, the predominant trend is to use the name “spa”.
The community often identifies itself as the “spa and wellness” community. The Registry has studied the different possibilities for representing the community with a TLD string, including for example, .spa, .well, .wellness, .saw, etc. None of the alternatives come close to the choice of “.spa” as a short, representative and meaningful representation of a key distinctive spirit and cohesion describing the community.
2. Identify
The applied for string: “spa” closely describes the community and the community members. Almost all the associations in the community uses the word “spa” as a distinctive element in its name. Many members of the community, i.e. spa operators and providers include or integrate the word “spa” in its own company name, and almost all of them include the word “spa” in the description of their business.
Based on research conducted by the Registry, we are aware that the string “spa” is also used in three other contexts:
- the municipality of Spa in Belgium
- the short form of ʺSocietà Per Azioniʺ means “stock corporation” in Italy and is often denoted in the short form: ʺS.p.A.ʺ
- the short form of ʺSpondyloarthropathyʺ, a medical term for any joint disease of the vertebral column
While the municipality of Spa in Belgium was likely the inspiration of the use of the term “spa” in its present day meaning as a generic description, the .spa TLD is not intended to serve the town of Spa in Belgium. The registry is also aware of the use of the term “S.p.A.” to mean ʺSocietà Per Azioniʺ (i.e. stock corporation) in Italy, as well as a short form of the medical term “Spondyloarthropathy”. Neither of which is associated with the use of the term “spa” in its most accepted meaning and the meaning for which the .spa TLD intends. Furthermore their usage is significantly less prevalent than the use of the term “spa” in its present day generic descriptive meaning. As such, the registry does not believe that the use of the term over-reaches substantially beyond the community.
Further explanation is provided in 4. Uniqueness below and further policies to mitigate its use for other possible designations are further discussed in #20e, #22 and #29.
3. Nexus
Most people inside and outside the spa community refer to spas and the spa community with the word “spa” as a distinctive descriptor. The location for which a member of the community operates is called a spa; a member of the community is often called simply a spa or in a more industrial descriptor a spa operator; and, products and services of members of the community are described as spa products and spa services. All of which utilizes the word “spa” as a distinctive element.
The word “spa” is the noun that the typical community member would naturally be called in the context. The term “spa” is not excessively broad and relates to the primary community of about 40,000 spas around the world, along with the community organizations, whose members are generally these operational spas.
4. Uniqueness
According to historians, the word spa has been a generic description since at least 1596 or perhaps as early as in the 1300s. The global public in general would refer to the word “spa” in its meaning as offered by the Dictionary.com:
1. a mineral spring, or a locality in which such springs exist.
2. a luxurious resort or resort hotel.
3. health spa.
4. a hot tub or similar warm-water hydromassage facility, usually for more than one person.
5. New England . soda fountain.
And Wikipedia (http:⁄⁄en.wikipedia.org⁄wiki⁄Spa):
“The term spa is associated with water treatment which is also known as balneotherapy. Spa towns or spa resorts (including hot springs resorts) typically offer various health treatments.”
Understanding that the string “spa” is being used in other contexts, the Registry has done further research to assert that the word is predominantly used in a general point of view with the meaning as associated with the spa community.
In order to establish that the term “spa” is used on the Internet predominantly with the meaning for which is associated with spas as in places offering water treatment and holistic body, mind and spirit revitalization sessions, the following basic search exercise was conducted at the Google search engine:
Searching the keyword: “spa” minus “-belgium” in Google returned about 4,020,000,000 results;
Searching the keyword: “spa” minus “-italy” in Google returned about 3,880,000,000 results;
Searching the keywords: “spa” and “health” in Google returned about 537,000,000 results;
Searching the keywords: “spa” and “Belgium” in Google returned about 108,000,000 results;
Searching the keywords: “spa” and specifying “Italian” as the language in Google returned about 263,000,000 results;
Searching the keywords: “spa” and “Spondyloarthropathy” in Google returned about 168,000 results
Searching the keywords: “spa” and “soda fountain” in Google returned about 2,340,000 results
Based on the results, it can be seen that by taking away either “belgium” or “italy” as part of the search term, the total number of results returned (about 4 Billion) is significantly over the number if they were included as part of the search (about 100 Million). On further analysis of the results, for those even including the terms “belgium” or “italy” the results are predominantly related to spas as understood in general and as a designator identifying the community. Given that the town of Spa is relatively small with a total population of only around 10,000, and that the origins of the use of the word “spa” in its present day meaning relates to the town’s own spas, the Registry believes that it should not take away from the fact the only significant meaning of the term “spa” is the one for which the Registry intends to promote.
The use of “S.p.A.” as a short form for the Italian form of stock corporation: ʺSocietà Per Azioniʺ is also relatively much less prevalent than the word as intended for the spa community. Furthermore, a more proper and popular way of denoting the form of corporation is “S.p.A.” with the periods included. While this is an important usage of the string “SpA”, the Registry believes that it should not take away from the significant meaning of the word “spa” in its intended use for the spa community as a TLD. Furthermore, additional preventive measures can be put in place to mitigate against any concerns for abusive utilization of the TLD in this manner.
The use of “SpA” as a short form for the medical term “Spondyloarthropathy” is not popular among the general public (with only 168,000 results returned). As this is a very specialized use of the term for the medical profession, the Registry does not believe that it represents a significant over-reach.
Finally, the use of “spa” for soda fountains can be understood as an adaptation, from its popular meaning as intended by the Registry, i.e. the element of a water spring. Therefore again, the Registry believes that this meaning does not form a substantive usage of the word and therefore should not be considered a significant over-reach beyond the community.
In summary, none of the other uses of the string “spa” carries another significant meaning in the common language used in the community and in the global general public as a whole.

20(e). Provide a description of the applicant's intended registration policies in support of the community-based purpose of the applied-for gTLD.

Special Sunrise and startup policies will be developed to provide priority registration opportunities for community members. Furthermore, the feasibility of additional dispute resolution processes in addition to (and not in replacement of) the basic UDRP and URS processes, that takes into consideration the nature of the TLD in relation to the community it serves will be studied, further explanation is included in #29. Upon normal registry operations after GoLive, the registry intends to maintain an open platform allowing individuals and companies from around the world meeting basic eligibility requirements as required by ICANN to register and utilize the TLD on a first-come-first-served basis.
A) Eligibility: Who is eligible to register a second-level name in the gTLD, and how will eligibility be determined.
During Sunrise, special considerations will be provided to allow the spa community to register names corresponding to their existing operations and brands. This will be introduced in addition to and consistent with the standard Sunrise, Trademark Clearing House and Trademark claims requirements according to the Applicant Guidebook and Specification 7 of the New gTLD Registry Agreement.
More specifically, to be eligible for Sunrise as a community member, the registrant must be able to provide information⁄data demonstrating that they have:
1. A valid operating license, where applicable;
2. A spa, beauty or wellness certification, where applicable;
3. A valid business registration;
4. A membership with any spa or wellness industry association;
5. A declaration that the domain will be used for the promotion of spas and wellness related products or services.
For community organizations, such as spa associations, to be eligible, the registrant must be able to provide information⁄data substantiating that they have:
1. A valid entity registration, or equivalent;
2. Proof that the organization accepts members from the spa and wellness community; and,
3. A declaration that the domain will be used for the promotion of the spa and wellness community.
Upon Go Live, the Registry will accept registrations on a first-come-first-served basis. Reserved names and other abuse prevention and rights protection mechanisms will continue to be in full force. Further discussions are included in #22, #28 and #29.
Furthermore, before the acceptance of registrations to the .spa registry, the SPARC (.SPA Registry Community-Advisory-Council as described in 20b above) will develop a set of mandatory guidelines that must be adopted by all .spa registrants. Violation of such guidelines will be grounds for cancellation or suspension of the domain. Further discussion on the guidelines are included in C) below, enforcement mechanisms are discussed in D) below.
B) Name Selection
During Sunrise, registrants must select names corresponding to their trademark, trade name, company name, or otherwise names with demonstrable usage (especially in relation to the spa community).
Upon Landrush and Go Live, registrants may select names of their choice. However, all registrants must accept the mandatory guidelines (as described in C) below), including the selected domain name. This ensures that name selection rules are consistent with the community-based purpose of the .spa TLD.
C) Content and Use
One of the first tasks for the SPARC upon its formalization (after the approval from ICANN of the .spa TLD) is the development of a set of mandatory guidelines for .spa registrants. Some of the broad based principles have been included in #18c 5. Mandatory Guideline for Registrants.
Details of the mandatory guidelines and the implementation of the above principles will be developed and published before the acceptance of registrations in the .spa TLD. All registrants must adhere to these guidelines and the violation of which will constitute grounds for suspension and⁄or cancellation of the domain registration. The mandatory guidelines apply to content and other uses of the domain, including the name itself where applicable.
The mandatory guidelines will also include clear enforceable parameters of what constitutes violation of the principles. Examples have also been included in #18c 5. Mandatory Guideline for Registrants.
These mandatory guidelines (including the principles and the enforcement parameters) adhere to the purpose and mission of the .spa TLD (and are aligned with the credos of ASWPC and the philosophies of the spa and wellness community) and will help to ensure that content and use of .spa domain names are consistent with the community-based purpose of the Registry. Details of the mandatory guidelines and enforcement parameters will be completed by the SPARC before registrations to the .spa TLD will be accepted. Enforcement mechanisms are further discussed in D) below.
Furthermore, a multi-category Pioneer Domains Program will be put in place to encourage a positive foundation of usage of the .spa TLD. This will not only help set the course and positioning of the TLD but also send a clear message to the broader community at large about the intended purpose of the TLD. Further discussion about the program is included in #29.
D) Enforcement
Besides the standard UDRP, URS, TMCH and other ICANN and contractual requirements, additional enforcement mechanisms will be put in place to ensure that the integrity and implementation of the community policies of the .spa namespace. These include:
- Sunrise Eligibility
- Community Purpose
- Coincidental Considerations (further discussed under #22)
Provisions for the mandatory submission to all of these processes will be included in the Registry-Registrar Agreement (RRA), and in turn required in the registration agreement with the registrant to ensure their enforceability.
1. Sunrise Eligibility
As mentioned in A) above (and further explained in #29), a special phase will be included in the Sunrise process (in addition to and consistent with the standard required Sunrise, TMCH and TM claims services) to allow community members to register their corresponding .spa domain name.
a. Sunrise Verification Process
To ensure the integrity of the process and enforcement, all Sunrise applications will be verified against the requirements (as suggested in A) above, and further detailed in the full Sunrise policies). Registrants that cannot substantiate their claims will be rejected. The verification process will also include a reconsideration and amendment process which serves as an appeal mechanism (further details in #29).
b. Sunrise Challenge Process
All Community Sunrise applications will also be locked for a 60 day period upon it being successfully verified and registered. The Whois information along with the documentary proof provided will be publicly searchable (via the registry website). At which time, anyone can utilize the Sunrise Challenge Process to challenge the eligibility of a Sunrise application. The Sunrise Challenge Process is itself an appeal mechanism (further discussion in #29).
2. Community Purpose
There are 3 levels of enforcement to ensure that registrations under the .spa TLD adhere to the community based purpose:
a. Abuse Prevention & Mitigation
Illegal activities and activities that threaten the security and stability of the Internet or the registry will be responded to utilizing the abuse prevention & mitigation (APM) processes as described in #28. All illegal and abusive activities would be considered to be against the community purpose of .spa. Illegal activities will be referred to appropriate law enforcement agencies.
b. Warning and Suspension Process
All registered .spa domain names must abide by the mandatory guidelines to ensure that .spa domain names are consistent with the community based purpose of the .spa TLD. These guidelines regulate the name selection, B), as well as content and use, C), of .spa domain names.
Description of the Warning and Suspension Process has been included in #18c 6. Warning and Suspension Process above.
This Warning and Suspension process provides an effective, efficient and definite measure for due process and takedown procedures to be taken against violators of the mandatory guidelines, which ensures that the community purpose of the .spa TLD is maintained.
c. Mandatory Administrative Proceeding
In cases where the above warning and suspension process is unable to resolve a dispute or an alleged violation of the mandatory guidelines, a complainant may initiate an administrative proceeding against a registered .spa domain. All .spa registrations will be subject to this mandatory administrative proceeding, which will be included in the RRA as well as the registrant agreement for .spa registrations.
The process will be very similar to the RDRP (Restriction Dispute Resolution Procedure) that has been successfully put in place for the .biz TLD: http:⁄⁄www.icann.org⁄en⁄help⁄dndr⁄rdrp
The remedies available to a successful complainant pursuant to any proceeding before an Administrative Panel shall be limited to requiring the cancellation of the disputed domain name or the transfer of the disputed domain name registration to the complainant.

20(f). Attach any written endorsements from institutions/groups representative of the community identified in 20(a).

Not Available

Geographic Names


21(a). Is the application for a geographic name?

No

Protection of Geographic Names


22. Describe proposed measures for protection of geographic names at the second and other levels in the applied-for gTLD.

The Registry is committed to following the GAC advice and Specification 5 of the New gTLD Agreement in the protection of geographic names for registrations under the TLD.

More specifically, the Registry commits to:

a) Adopt, before the new gTLD is introduced, appropriate procedures for blocking, at no cost and upon demand of governments, public authorities or IGOs, names with national or geographic significance at the second level of the TLD.

b) Ensure procedures to allow governments, public authorities or IGOs to challenge abuses of names with national or geographic significance at the second level of the TLD

Building on the experience from .INFO and .ASIA in their handling of country and government related names, the Registry will develop and establish policies for:

1) obtaining and maintaining a list of names with national or geographic significance to be reserved (at no cost to governments) upon the demand of governments, public authorities or IGOs;

2) the process for registrants to apply for and for the Registry to obtain consent from the respective government, public authorities or IGOs in the releasing of such reserved geographic names; and

The procedures may be similar to the management of governmental reserved names for .ASIA (Section 3.4 of http:⁄⁄dot.asia⁄policies⁄DotAsia-Reserved-Names--COMPLETE-2007-08-10.pdf -- also attached for reference). In summary:

I) The Registry will adhere to the New gTLD Registry Agreement Specification 5 requirements regarding 2. Two-Character Labels as well as 5. Country and Territory Names;

II) Before the launch of the TLD, the Registry will also proactively reach out to governments around the world, especially through GAC members (and ccTLD managers where appropriate), to solicit from them their demand for reserving any names with national or geographic significance at the second level of the TLD;

III) The Registry will develop mechanisms and maintain a list of governmental reference contacts, especially through correspondence with GAC members and ccTLD managers where appropriate. The corresponding reference contact(s) will be contacted in case a registration request is received for a governmental reserved name. If the consent from the governmental contact is received, the registration request will be approved. The domain will nevertheless remain in the reserved names list so that in case the registration lapses, the domain will not be released into the available pool, but will require the same approval process to be registered.

IV) The Registry will maintain an ongoing process for adding and updating governmental reserved names as they are demanded by governments, public authorities or IGOs.

In accordance with Specification 5 of the New gTLD Registry Agreement, the registry operator must initially reserve all geographic names at the second level, and at all other levels within the TLD at which the registry operator provides for registrations.
ARI supports this requirement by using the following internationally recognised lists to develop a comprehensive master list of all geographic names that are initially reserved:

– The 2-letter alpha-2 code of all country and territory names contained on the ISO 3166-1 list, including all reserved and unassigned codes [http:⁄⁄www.iso.org⁄iso⁄support⁄country_codes⁄iso_3166_code_lists⁄iso-3166-1_decoding_table.htm].

– The short form (in English) of all country and territory names contained on the ISO 3166-1 list, including the European Union, which is exceptionally reserved on the ISO 3166-1 List, and its scope extended in August 1999 to any application needing to represent the name European Union [http:⁄⁄www.iso.org⁄iso⁄support⁄country_codes⁄iso_3166_code_lists⁄iso-3166-1_decoding_table.htm#EU].

– The United Nations Group of Experts on Geographical Names, Technical Reference Manual for the Standardisation of Geographical Names, Part III Names of Countries of the World. This lists the names of 193 independent States generally recognised by the international community in the language or languages used in an official capacity within each country and is current as of August 2006 [http:⁄⁄unstats.un.org⁄unsd⁄geoinfo⁄ungegn%20tech%20ref%20manual_M87_combined.pdf].

– The list of UN member states in six official UN languages prepared by the Working Group on Country Names of the United Nations Conference on the standardisation of Geographical Names [http:⁄⁄unstats.un.org⁄unsd⁄geoinfo⁄UNGEGN⁄docs⁄9th-uncsgn-docs⁄econf⁄9th_UNCSGN_e-conf-98-89-add1.pdf].

Names on this reserved list in ARI’s registry system are prevented from registration.

The following applies to all Domain Names contained within the registry’s reserved list:
– Attempts to register listed Domain Names will be rejected.
– WhoIs queries for listed Domain Names will receive responses indicating their reserved status.
– Reserved geographic names will not appear in the TLD zone file.
– DNS queries for reserved domain names will result in an NXDOMAIN response.

Furthermore, the Registry will actively participate in the development of appropriate process and policies for governments, public authorities or IGOs to challenge abuses of names with national or geographic significance. As an important stakeholder in the Registry, DotAsia Organisation (through Namesphere) will be supporting the efforts as well. DotAsia has been a pioneer of protective measures for new gTLDs, especially in its handling of governmental reserved names and its engagement with different stakeholders to develop rapid suspension policies, which provided part of the genesis of what is now standardized for new gTLDs as the URS (Uniform Rapid Suspension) process. Similar administrative processes may be explored and developed for supporting challenge processes for abuses of names with national or geographic significance.

Special Coincidental Considerations

In addition to the GAC advice and Specification 5, and following from the discussions in #20d and #20e D) Enforcement: based on the research as described in #20d, we recognize that there is coincidental usage of the string “spa” in other contexts beyond its predominant meaning. For completeness in mitigating against abusive usage of the .spa TLD based on such coincidental usage, the Registry will put in place 3 key measures to address potential concerns.

a. Reserved Names List

In addition to ICANN and geographical reserved names lists, upon the approval from ICANN for the .spa TLD, the Registry will proactively reach out to the Town of Spa in Belgium (http:⁄⁄www.spa-info.be⁄) as well as the Italian Chambers of Commerce (http:⁄⁄www.infocamere.it⁄) who is responsible for “Società Per Azioni” (i.e. S.p.A.) registrations, to study whether additional reserved names would be appropriate at the .spa TLD.

This will serve to ensure that the introduction of the .spa TLD will not inadvertently negatively impact the coincidental communities where the string “spa” may carry a meaning. Where appropriate additional reserved names will be included, for which activation will require special conditions to be met.

The activation process can follow a similar mechanism described above for the activation of governmental reserved names:

i) For names corresponding to the Town of Spa, the same mechanism can be used, where the consent from the corresponding government is to be sought before accepting the registration;

ii) For names related to registered “Società Per Azioni” (i.e. S.p.A.), the Registry will verify whether the registrant for the name corresponds with the Italian Chambers of Commerce (http:⁄⁄www.infocamere.it⁄) database. If the information agrees, the registration is accepted.

b. Special Sunrise Considerations

Similarly, the appropriateness of additional Sunrise considerations specifically for entities from the town of Spa in Belgium and registered “Società Per Azioni” (i.e. S.p.A.) would be explored. Such considerations will, if found appropriate, will be incorporated into the Sunrise process (see further details in #29). In the study, the Registry will also work closely with the selected Trademark Clearing House (TMCH) to see if such verification and registration processes can be procured through a similar process.

If such Sunrise phase is included, a similar addition, as the consent process described above in a. Reserved Names List, to the verification process could be implemented.

c. Claims & Notification Mechanism

Finally, a claims and notification mechanism, similar to the standard trademarks claims service as described in the Applicant Guidebook, will also be considered and discussed with the town of Spa and with the Italian Chambers of Commerce. The possibility of a two way notification process may also be explored (i.e. both for when a “.spa” domain is registered which may conflict with a registered “S.p.A.” registration as well as vice versa for a newly registered “S.p.A.” that may conflict with a registered .spa domain).

The Registry will also work closely with the selected Trademark Clearing House (TMCH) to see if such processes can be procured through a similar process as the standard trademark claims service.



Registry Services


23. Provide name and full description of all the Registry Services to be provided.

ARI Registry Services (ARI) and DotAsia Organisation (through Namesphere) are respectively the Registry Back-End and Registry Front-End services provider for the TLD. This response describes the registry services for our TLD, as jointly provided by ARI and Namesphere.

1 INTRODUCTION

ARI’s Managed TLD Registry Service is a complete offering, providing all of the required registry services. What follows is a description of each of those services. Namesphere on the other hand provides a comprehensive registry front-end service in the development of appropriate policies, administrative procedures and the liaising of registrars, ICANN policy and compliance, and the enforcement of a socially responsible approach of the registry in its delivery of services.

2 REGISTRY SERVICES
The following sections describe the registry services provided. Each of these services has, where required, been designed to take into account the requirements of consensus policies as documented here:
[http:⁄⁄www.icann.org⁄en⁄resources⁄Registrars⁄consensus-policies]
At the time of delegation into the root this TLD will not be offering any unique Registry services, other than the fact that it will be offering IDN registrations in accordance with the CDNC IDN Variant policies.

2.1 Receipt of Data from Registrars

The day-to-day functions of the registry, as perceived by Internet users, involves the receipt of data from Registrars and making the necessary changes to the SRS database. Functionality such as the creation, renewal and deletion of domains by Registrars, on behalf of registrants, is provided by two separate systems:
– An open protocol-based provisioning system commonly used by Registrars with automated domain management functionality within their own systems.
– A dedicated website providing the same functionality for user interaction.
Registrants (or prospective registrants) who wish to manage their existing domains or credentials, register new domains or delete their domains will have their requests carried out by Registrars using one of the two systems described below.
ARI operates Extensible Provisioning Protocol (EPP) server software and distributes applicable toolkits to facilitate the receipt of data from Registrars in a common format. EPP offers a common protocol for Registrars to interact with SRS data and is favoured for automating such interaction in the Registrar’s systems. In addition to the EPP server, Registrars have the ability to use a web-based management interface (SRS Web Interface), which provides functions equivalent to the EPP server functionality.

2.1.1 EPP

The EPP software allows Registrars to communicate with the SRS using a standard protocol. The EPP server software is compliant with all appropriate RFCs and will be updated to comply with any relevant new RFCs or other new standards, as and when they are finalised. All standard EPP operations on SRS objects are supported.
Specifically, the EPP service complies with the following standards:
– RFC 5730 Extensible Provisioning Protocol (EPP).
– RFC 5731 Extensible Provisioning Protocol (EPP) Domain Name Mapping.
– RFC 5732 Extensible Provisioning Protocol (EPP) Host Mapping.
– RFC 5733 Extensible Provisioning Protocol (EPP) Contact Mapping.
– RFC 5734 Extensible Provisioning Protocol (EPP) Transport over TCP.
– RFC 5910 Domain Name System (DNS) Security Extensions for the Extensible Provisioning Protocol (EPP).
– RFC 3915 Domain Registry Grace Period Mapping for the Extensible Provisioning Protocol (EPP).
– Extensions to ARI’s EPP service comply with RFC 3735 Guidelines for Extending the Extensible Provisioning Protocol (EPP).

2.1.1.1 Security for EPP Service

To avoid abuse and to mitigate potential fraudulent operations, the EPP server software uses a number of security mechanisms that restrict the source of incoming connections and prescribe the authentication and authorisation of the client. Connections are further managed by command rate limiting and are restricted to only a certain number for each Registrar, to help reduce unwanted fraudulent and other activities. Additionally, secure communication to the EPP interface is required, lowering the likelihood of the authentication mechanisms being compromised.
The EPP server has restrictions on the operations it is permitted to make to the data within the registry database. Except as allowed by the EPP protocol, the EPP server cannot update the credentials used by Registrars for access to the SRS. These credentials include those used by Registrars to login to ARI’s SRS Web Interface and the EPP service.
Secure communication to the EPP server is achieved via the encryption of EPP sessions. The registry system and associated toolkits support AES 128 and 256 via TLS.
The Production and Operational Testing and Evaluation (OTE) EPP service is protected behind a secure firewall that only accepts connections from registered IP addresses. Registrars are required to supply host IP addresses that they intend to use to access the EPP service.
Certificates are used for encrypted communications with the registry. Registrars require a valid public⁄private key pair signed by the ARI CA to verify authenticity. These certificates are used to establish a TLS secure session between client and server.
EPP contains credential elements in its specification which are used as an additional layer of authentication. In accordance with the EPP specification, the server does not allow client sessions to carry out any operations until credentials are verified.
The EPP server software combines the authentication and authorisation elements described above to ensure the various credentials supplied are associated with the same identity. This verification requires that:
– The username must match the common name in the digital certificate.
– The certificate must be presented from a source IP listed against the Registrar whose common name appears in the certificate.
– The username and password must match the user name and password listed against the Registrar’s account with that source IP address.
To manage normal operations and prevent an accidental or intentional Denial of Service, the EPP server can be configured to rate limit activities by individual Registrars.

2.1.1.2 Stability Considerations

The measures that restrict Registrars to a limit of connections and operations for security purposes also serve to keep the SRS and the EPP server within an acceptable performance and resource utilisation band. Therefore, scaling the service is an almost linear calculation based on well-defined parameters.
The EPP server offers consistent information between Registrars and the SRS Web Interface. The relevant pieces of this information are replicated to the DNS within seconds of alteration, thus ensuring that a strong consistency between the SRS and DNS is maintained at all times.

2.1.2 SRS Web Interface

The registry SRS Web Interface offers Registrars an alternative SRS interaction mechanism to the EPP server. Available over HTTPS, this interface can be used to carry out all operations which would otherwise occur via EPP, as well as many others. Registrars can use the SRS Web Interface, the EPP server interface or both – with no loss of consistency within the SRS.

2.1.2.1 Security and Consistency Considerations for SRS Web Interface

The SRS Web Interface contains measures to prevent abuse and to mitigate fraudulent operations. By restricting access, providing user level authentication and authorisation, and protecting the communications channel, the application limits both the opportunity and scope of security compromise.
Registrars are able to create individual users that are associated with their Registrar account. By allocating the specific operations each user can access, Registrars have full control over how their individual staff members interact with the SRS. Users can be audited to identify which operations were conducted and to which objects those operations were applied.
A secure connection is required before credentials are exchanged and once authenticated. On login, any existing user sessions are invalidated and a new session is generated, thereby mitigating session-fixation attacks and reducing possibilities that sessions could be compromised.

2.1.3 Securing and Maintaining Consistency of Registry-Registrar Interaction Systems

ARI ensures all systems through which Registrars interact with the SRS remain consistent with each other and apply the same security rules. Additionally, ARI also ensures that operations on SRS objects are restricted to the appropriate entity. For example:
– In order to initiate a transfer a Registrar must provide the associated domain password (authinfo) which will only be known by the registrant and the current sponsoring Registrar.
– Only sponsoring Registrars are permitted to update registry objects.
All operations conducted by Registrars on SRS objects are auditable and are identifiable to the specific Registrar’s user account, IP address and the time of the operation.

2.2 Disseminate Status Information of TLD Zone Servers to Registrars

The status of TLD zone servers and their ability to reflect changes in the SRS is of great importance to Registrars and Internet users alike. ARI will ensure that any change from normal operations is communicated to the relevant stakeholders as soon as is appropriate. Such communication might be prior to the status change, during the status change and⁄or after the status change (and subsequent reversion to normal) – as appropriate to the party being informed and the circumstance of the status change.
Normal operations are those when:
– DNS servers respond within SLAs for DNS resolution.
– Changes in the SRS are reflected in the zone file according to the DNS update time SLA.
The SLAs are those from Specification 10 of the Registry Agreement.
A deviation from normal operations, whether it is registry wide or restricted to a single DNS node, will result in the appropriate status communication being sent.

2.2.1 Communication Policy

ARI maintains close communication with Registrars regarding the performance and consistency of the TLD zone servers.
A contact database containing relevant contact information for each Registrar is maintained. In many cases, this includes multiple forms of contact, including email, phone and physical mailing address. Additionally, up-to-date status information of the TLD zone servers is provided within the SRS Web Interface.
Communication using the Registrar contact information discussed above will occur prior to any maintenance that has the potential to effect the access to, consistency of, or reliability of the TLD zone servers. If such maintenance is required within a short time frame, immediate communication occurs using the above contact information. In either case, the nature of the maintenance and how it affects the consistency or accessibility of the TLD zone servers, and the estimated time for full restoration, are included within the communication.
That being said, the TLD zone server infrastructure has been designed in such a way that we expect no down time. Only individual sites will potentially require downtime for maintenance; however the DNS service itself will continue to operate with 100% availability.

2.2.2 Security and Stability Considerations

ARI restricts zone server status communication to Registrars, thereby limiting the scope for malicious abuse of any maintenance window. Additionally, ARI ensures Registrars have effective operational procedures to deal with any status change of the TLD nameservers and will seek to align its communication policy to those procedures.

2.3 Zone File Access Provider Integration

Individuals or organisations that wish to have a copy of the full zone file can do so using the Zone Data Access service. This process is still evolving; however the basic requirements are unlikely to change. All registries will publish the zone file in a common format accessible via secure FTP at an agreed URL.

ARI will fully comply with the processes and procedures dictated by the Centralised Zone Data Access Provider (CZDA Provider or what it evolves into) for adding and removing Zone File access consumers from its authentication systems. This includes:

– Zone file format and location.
– Availability of the zone file access host via FTP.
– Logging of requests to the service (including the IP address, time, user and activity log).
– Access frequency.

2.4 Zone File Update

To ensure changes within the SRS are reflected in the zone file rapidly and securely, ARI updates the zone file on the TLD zone servers using software compliant with RFC 2136 (Dynamic Updates in the Domain Name System (DNS UPDATE)) and RFC 2845 (Secret Key Transaction Authentication for DNS (TSIG)).
This updating process follows a staged but rapid propagation of zone update information from the SRS, outwards to the TLD zone servers – which are visible to the Internet. As changes to the SRS data occur, those changes are updated to isolated systems which act as the authoritative primary server for the zone, but remain inaccessible to systems outside ARI’s network. The primary servers notify the designated secondary servers, which service queries for the TLD zone from the public. Upon notification, the secondary servers transfer the incremental changes to the zone and publicly present those changes.
The protocols for dynamic update are robust and mature, as is their implementation in DNS software. The protocols’ mechanisms for ensuring consistency within and between updates are fully implemented in ARI’s TLD zone update procedures. These mechanisms ensure updates are quickly propagated while the data remains consistent within each incremental update, regardless of the speed or order of individual update transactions. ARI has used this method for updating zone files in all its TLDs including the .au ccTLD, pioneering this method during its inception in 2002. Mechanisms separate to RFC 2136-compliant transfer processes exist; to check and ensure domain information is consistent with the SRS on each TLD zone server within 10 minutes of a change.

2.5 Operation of Zone Servers

ARI maintains TLD zone servers which act as the authoritative servers to which the TLD is delegated.

2.5.1 Security and Operational Considerations of Zone Server Operations

The potential risks associated with operating TLD zone servers are recognised by ARI such that we will perform the steps required to protect the integrity and consistency of the information they provide, as well as to protect the availability and accessibility of those servers to hosts on the Internet. The TLD zone servers comply with all relevant RFCs for DNS and DNSSEC, as well as BCPs for the operation and hosting of DNS servers. The TLD zone servers will be updated to support any relevant new enhancements or improvements adopted by the IETF.
The DNS servers are geographically dispersed across multiple secure data centres in strategic locations around the world. By combining multi-homed servers and geographic diversity, ARI’s zone servers remain impervious to site level, supplier level or geographic level operational disruption.
The TLD zone servers are protected from accessibility loss by malicious intent or misadventure, via the provision of significant over-capacity of resources and access paths. Multiple independent network paths are provided to each TLD zone server and the query servicing capacity of the network exceeds the extremely conservatively anticipated peak load requirements by at least 10 times, to prevent loss of service should query loads significantly increase.
As well as the authentication, authorisation and consistency checks carried out by the Registrar access systems and DNS update mechanisms, ARI reduces the scope for alteration of DNS data by following strict DNS operational practices:
– TLD zone servers are not shared with other services.
– The primary authoritative TLD zone server is inaccessible outside ARI’s network.
– TLD zone servers only serve authoritative information.
– The TLD zone is signed with DNSSEC and a DNSSEC Practice⁄Policy Statement published.

2.6 Dissemination of Contact or Other Information

Registries are required to provide a mechanism to identify the relevant contact information for a domain. The traditional method of delivering this is via the WhoIs service, a plain text protocol commonly accessible on TCP port 43. ARI also provides the same functionality to users via a web-based WhoIs service. Functionality remains the same with the web-based service, which only requires a user to have an Internet browser.
Using the WhoIs service, in either of its forms, allows a user to query for domain-related information. Users can query for domain details, contact details, nameserver details or Registrar details.
A WhoIs service, which complies with RFC 3912, is provided to disseminate contact and other information related to a domain within the TLD zone.

2.6.1 Security and Stability Considerations

ARI ensures the service is available and accurate for Internet users, while limiting the opportunity for its malicious use. Many reputation and anti-abuse services rely on the availability and accuracy of the WhoIs service, however the potential for abuse of the WhoIs service exists.
Therefore, certain restrictions are made to the access of WhoIs services, the nature of which depend on the delivery method – either web-based or the traditional text-based port 43 service. In all cases, there has been careful consideration given to the benefits of WhoIs to the Internet community, as well as the potential harm to registrants – as individuals and a group – with regard to WhoIs access restrictions.
The WhoIs service presents data from the registry database in real time. However this access is restricted to reading the appropriate data only. The WhoIs service does not have the ability to alter data or to access data not related to the WhoIs service. The access limitations placed on the WhoIs services prevent any deliberate or incidental denial of service that might impact other registry services.
Restrictions placed on accessing WhoIs services do not affect legitimate use. All restrictions are designed to target abusive volume users and to provide legitimate users with a fast and available service. ARI has the ability to ‘whitelist’ legitimate bulk users of WhoIs, to ensure they are not impacted by standard volume restrictions.
The data presentation format is consistent with the canonical representation of equivalent fields, as defined in the EPP specifications and ICANN agreement.

2.6.1.1 Port 43 WhoIs

A port 43-based WhoIs service complying with RFC 3912 is provided and will be updated to meet any other relevant standards or best practice guidelines related to the operation of a WhoIs service.
While the text-based service can support thousands of simultaneous queries, it has dynamic limits on queries per IP address to restrict data mining efforts. In the event of identified malicious use of the service, access from a single IP address or address ranges can be limited or blocked.

2.6.1.2 Web-based WhoIs

ARI’s web-based WhoIs service provides information consistent with that contained within the SRS.
The web-based WhoIs service contains an Image Verification Check (IVC) and query limits per IP address. These restrictions strike a balance between acceptable public usage and abusive use or data mining. The web-based WhoIs service can blacklist IP addresses or ranges to prevent abusive use of the service.

2.7 IDNs – Internationalised Domain Names

An Internationalised Domain Name (IDN) allows registrants to register domains in their native language and have it display correctly in IDN aware software. This includes allowing a language to be read in the manner that would be common for its readers. For example, an Arabic domain would be presented right to left for an Arabic IDN aware browser.
The inclusion of IDNs into the TLD zones is supported by ARI. All the registry services, such as the EPP service, SRS Web Interface and RDPS (web and port 43), support IDNs. However there are some stability and security considerations related to IDNs which fall outside the general considerations applicable individually to those services.

2.7.1 Stability Considerations Specific to IDN

To avoid the intentional or accidental registration of visually similar chars, and to avoid identity confusion between domains, there are several restrictions on the registration of IDNs.

2.7.1.1 Prevent Cross Language Registrations

Domains registered within a particular language are restricted to only the chars of that language. This avoids the use of visually similar chars within one language which mimic the appearance of a label within another language, regardless of whether that label is already within the DNS or not.

2.7.1.2 Inter-language and Intra-language Variants to Prevent Similar Registrations

ARI restricts child domains to a specific language and prevents registrations in one language being confused with a registration in another language, for example Cyrillic а (U+0430) and Latin a (U+0061).

2.8 DNSSEC

DNSSEC provides a set of extensions to the DNS that allow an Internet user (normally the resolver acting on a user’s behalf) to validate that the DNS responses they receive were not manipulated en-route.
This type of fraud, commonly called ‘man in the middle’, allows a malicious party to misdirect Internet users. DNSSEC allows a domain owner to sign their domain and to publish the signature, so that all DNS consumers who visit that domain can validate that the responses they receive are as the domain owner intended.
Registries, as the operators of the parent domain for registrants, must publish the DNSSEC material received from registrants, so that Internet users can trust the material they receive from the domain owner. This is commonly referred to as a ‘chain of trust’. Internet users trust the root (operated by IANA), which publishes the registries’ DNSSEC material, therefore registries inherit this trust. Domain owners within the TLD subsequently inherit trust from the parent domain when the registry publishes their DNSSEC material.
In accordance with new gTLD requirements, the TLD zone will be DNSSEC signed and the receipt of DNSSEC material from Registrars for child domains is supported in all provisioning systems.

2.8.1 Stability and Operational Considerations for DNSSEC

2.8.1.1 DNSSEC Practice Statement

ARI’s DNSSEC Practice Statement is included in our response to Question 43. The DPS following the guidelines set out in the draft IETF DNSOP DNSSEC DPS Framework document.

2.8.1.2 Receipt of Public Keys from Registrars

The public key for a child domain is received by ARI from the Registrar via either the EPP or SRS Web Interface. ARI uses an SHA-256 digest to generate the DS Resource Record (RR) for inclusion into the zone file.

2.8.1.3 Resolution Stability

DNSSEC is considered to have made the DNS more trustworthy; however some transitional considerations need to be taken into account. DNSSEC increases the size and complexity of DNS responses. ARI ensures the TLD zone servers are accessible and offer consistent responses over UDP and TCP.
The increased UDP and TCP traffic which results from DNSSEC is accounted for in both network path access and TLD zone server capacity. ARI will ensure that capacity planning appropriately accommodates the expected increase in traffic over time.
ARI complies with all relevant RFCs and best practice guides in operating a DNSSEC-signed TLD. This includes conforming to algorithm updates as appropriate. To ensure Key Signing Key Rollover procedures for child domains are predictable, DS records will be published as soon as they are received via either the EPP server or SRS Web Interface. This allows child domain operators to rollover their keys with the assurance that their timeframes for both old and new keys are reliable.

3 APPROACH TO SECURITY AND STABILITY

Stability and security of the Internet is an important consideration for the registry system. To ensure that the registry services are reliably secured and remain stable under all conditions, ARI takes a conservative approach with the operation and architecture of the registry system.
By architecting all registry services to use the least privileged access to systems and data, risk is significantly reduced for other systems and the registry services as a whole should any one service become compromised. By continuing that principal through to our procedures and processes, we ensure that only access that is necessary to perform tasks is given. ARI has a comprehensive approach to security modelled of the ISO27001 series of standards and explored further in the relevant questions of this response.
By ensuring all our services adhering to all relevant standards, ARI ensures that entities which interact with the registry services do so in a predictable and consistent manner. When variations or enhancements to services are made, they are also aligned with the appropriate interoperability standards.


Demonstration of Technical & Operational Capability


24. Shared Registration System (SRS) Performance

We have engaged ARI Registry Services (ARI) to deliver services for this TLD. ARI provide registry services for a number of TLDs including the .au ccTLD. For more background information on ARI please see the attachment ‘Q24 – ARI Background & Roles.pdf’. This response describes the SRS as implemented by ARI.

1 INTRODUCTION
ARI has demonstrated delivery of an SRS with exceptional availability, performance and reliability. ARI are experienced running mission critical SRSs and have significant knowledge of the industry and building and supporting SRSs.
ARI’s SRS has successfully supported a large group of Registrars for ASCII and IDN based TLDs. The system is proven to sustain high levels of concurrency, transaction load, and system uptime. ARI’s SRS meets the following requirements:
– Resilient to wide range of security & availability threats
– Consistently exceeds performance & availability SLAs
– Allows capacity increase with minimal impact to service
– Provides fair & equitable provisioning for all Registrars

2 CAPACITY
ARI’s SRS was built to sustain 20M domain names. Based on ARI’s experience running a ccTLD registries and industry analysis, ARI were able to calculate the conservative characteristics of a registry this size.
Through conservative statistical analysis of the .au registry and data presented in the May 2011 ICANN reports for the .com & .net, .org, .mobi, .info, .biz and .asia [http:⁄⁄www.icann.org⁄en⁄resources⁄registries⁄reports] we know there is:
– An average of 70 SRS TPS per domain, per month
– A ratio of 3 query to 2 transform txs
This indicates an expected monthly transaction volume of 1,400M txs (840M query and 560M transforms).
Through statistical analysis of the .au registry and backed up by the data published in the .net RFP responses [http:⁄⁄archive.icann.org⁄en⁄tlds⁄net-rfp⁄net-rfp-public-comments.htm] we also know:
– The peak daily TPS is 6% of monthly total
– The peak 5 min is 5% of the peak day
Thus we expect a peak EPP tx rate of 14,000 TPS (5,600 transform TPS and 8,400 query TPS)
Through conservative statistical analysis of the .au registry we know:
– The avg no. contacts⁄domain is 3.76
– The avg no. hosts⁄domain is 2.28
This translates into a requirement to store 75.2M contacts and 45.6M hosts.
Finally through real world observations of the .au registry, which has a comprehensive web interface when compared to those offered by current gTLD registries, we know there is an avg of 0.5 HTTP requests⁄sec to the SRS web interface per Registrar. We also know that this behaviour is reasonably flat. To support an estimated 1000 Registrars, would require 500 requests⁄second.
For perspective on the conservativeness of this, the following was taken from data in the May 2011 ICANN reports referenced above:
– .info: ~7.8M names peaks at ~1,400 TPS (projected peak TPS of ~3,600 with 20M)
– .com: ~98M names peaks at ~41,000 TPS (projected peak TPS of ~8,300 TPS with 20M)
– .org: ~9.3M names, peaks at ~1,400 TPS (projected peak TPS of ~3,100 with 20M)
After performing this analysis the projected TPS for .com was still the largest value.
ARI understand the limitations of this method but it serves as a best estimate of probable tx load. ARI has built overcapacity of resources to account for limitations of this method, however as numbers are more conservative than real world observations, we are confident this capacity is sufficient.
This TLD is projected to reach 17,648 domains at its peak volume and will generate 12.3536 EPP TPS. This will consume 0.09% of the resources of the SRS infrastructure. As is evident ARI’s SRS can easily accommodate this TLD’s growth plans. See attachment ‘Q24 – Registry Scale Estimates & Resource Allocation.xlsx’ for more information.
ARI expects to provide Registry services to 100 TLDs and a total of 12M domains by end of 2014. With all the TLDs and domains combined, ARI’s SRS infrastructure will be 60% utilized. The SRS infrastructure capacity can be easily scaled as described in Q32
ARI benchmarked their SRS infrastructure and used the results to calculate the required computing resources for each of the tiers within the architecture; allowing ARI to accurately estimate the required CPU, IOPS, storage and memory requirements for each server, and the network bandwidth & packet throughput requirements for the anticipated traffic. These capacity numbers were then doubled to account for unanticipated traffic spikes, errors in predictions, and headroom for growth. Despite doubling numbers, effective estimated capacity is still reported as 20M. The technical resource allocations are explored in Q32.

3 SRS ARCHITECTURE
ARI’s SRS has the following major components:
– Network Infrastructure
– EPP Application Servers
– SRS Web Interface Application Servers
– SRS Database
Attachment ‘Q24 – SRS.pdf’ shows the SRS systems architecture and data flows. Detail on this architecture is in our response to Q32. ARI provides two distinct interfaces to the SRS: EPP and SRS Web. Registrar SRS traffic enters the ARI network via the redundant Internet link and passes (via the firewall) to the relevant application server for the requested service (EPP or SRS Web). ARI’s EPP interface sustains high volume and throughput domain provisioning transactions for a large number of concurrent Registrar connections. ARI’s SRS Web interface provides an alternative to EPP with a presentation centric interface and provides reporting and verification features additional to those provided by the EPP interface.

3.1 EPP
ARI’s EPP application server is based on EPP as defined in RFCs 5730 – 5734. Registrars send XML based transactions to a load balanced EPP interface which forwards to one of the EPP application servers. The EPP application server then processes the XML and converts the request into database calls that retrieve or modify registry objects in the SRS database. The EPP application server tier comprises of three independent servers with dedicated connections to the registry database. Failure of any one of these servers will cause Registrar connections to automatically re-establish with one of the remaining servers. Additional EPP application servers can be added easily without any downtime. All EPP servers accept EPP both IPv4 & IPv6.

3.2 SRS Web
The SRS Web application server is a Java web application. Registrars connect via the load balancer to a secure HTTP listener running on the web servers. The SRS web application converts HTTPs requests into database calls which query or update objects in the SRS database. The SRS Web application server tier consists of two independent servers that connect to the database via JDBC. If one of these servers is unavailable the load balancer re-routes requests to the surviving server. Additional servers can be added easily without any downtime. These servers accept both IPv4 & IPv6.

3.3 SRS Database
The SRS database provides persistent storage for domains and supporting objects. It offers a secure way of storing and retrieving objects provisioned within the SRS and is built on the Oracle 11g Enterprise Edition RDBMS. The SRS Database tier consists of four servers clustered using Oracle Real Application Clusters (RAC). In the event of failure of a database server, RAC will transparently transition its client connections to a surviving database host. Additional servers can be added easily without any downtime.

3.4 Number of Servers
EPP Servers – The EPP cluster consists of 3 servers that can more than handle the anticipated 20M domains. This TLD will utilize 0.09% of this capacity at its peak volume. As the utilisation increases ARI will add additional servers ensuring the utilisation doesn’t exceed 50% of total capacity. Adding a new server to the cluster can be done live without downtime.
SRS Web Servers – The SRS Web cluster consists of 2 servers that can more than handle the anticipated 20M domains. This TLD will utilize 0.09% of this capacity at its peak volume. As the utilisation increases ARI will add additional servers ensuring the utilisation doesn’t exceed 50% of total capacity. Adding a new server to the cluster can be done live without downtime.
SRS DB Servers – The SRS DB cluster consists of 4 servers that can more than handle the anticipated 20M domains. This TLD will utilize 0.09% of this capacity at its peak volume. As the utilisation increases ARI will add additional servers ensuring the total utilisation doesn’t exceed 50% of total capacity. Adding a new server to the cluster can be done live without downtime.

3.5 SRS Security
ARI adopts a multi-layered security solution to protect the SRS. An industry leading firewall is deployed behind the edge router and is configured to only allow traffic on the minimum required ports and protocols. Access to the ARI EPP service is restricted to a list of known Registrar IPs.
An Intrusion Detection device is in-line with the firewall to monitor and detect suspicious activity.
All servers are configured with restrictive host based firewalls, intrusion detection, and SELinux. Direct root access to these servers is disabled and all access is audited and logged centrally.
The SRS database is secured by removal of non-essential features and accounts, and ensuring all remaining accounts have strong passwords. All database accounts are assigned the minimum privileges required to execute their business function.
All operating system, database, and network device accounts are subject to strict password management controls such as validity & complexity requirements.
Registrar access to the SRS via EPP or the Web interface is authenticated and secured with multi-factor authentication (NIST Level 3) and digital assertion as follows:
– Registrar’s source IP must be allowed by the front-end firewalls. This source IP is received from the Registrar via a secure communication channel from within the SRS Web interface
– Registrar must use a digital certificate provided by ARI
– Registrar must use authentication credentials that are provided by encrypted email
All communication between the Registrar and the SRS is encrypted using at least 128 bit encryption which been designated as ‘Acceptable’ till ‘2031 and beyond’ by NIST Special Publication 800-57.

3.6 SRS High Availability
SRS availability is of paramount. Downtime is eliminated or minimised where possible. The infrastructure contains no single points of failure. N+1 redundancy is used as a minimum, which not only protects against unplanned downtime but also allows ARI to execute maintenance without impacting service.
Redundancy is provided in the network with hot standby devices & multiple links between devices. Failure of any networking component is transparent to Registrar connections.
N+N redundancy is provided in the EPP and SRS Web application server tiers by the deployment of multiple independent servers grouped together as part of a load-balancing scheme. If a server fails the load balancer routes requests to the remaining servers.
N+N redundancy is provided in the database tier by the use of Oracle Real Application Cluster technology. This delivers active⁄active clustering via shared storage. This insulates Registrars from database server failure.
Complete SRS site failure is mitigated by the maintenance of a remote standby site – a duplicate of the primary site ready to be the primary if required.
The standby site database is replicated using real time transaction replication from the main database using Oracle Data Guard physical standby. If required the Data Guard database can be activated quickly and service resumes at the standby site.

3.7 SRS Scalability
ARI’s SRS scales efficiently. At the application server level, additional computing resource can be brought on-line rapidly by deploying a new server online. During benchmarking this has shown near linear.
The database can be scaled horizontally by adding a new cluster node into the RAC cluster online. This can be achieved without disruption to connections. The SRS has demonstrated over 80% scaling at the database level, but due to the distributed locking nature of Oracle RAC, returns are expected to diminish as the number of servers approaches double digits. To combat this ARI ensures that when the cluster is ‘scaled’ more powerful server equipment is added rather than that equal to the current members. Capacity can be added to the SAN at any time without downtime increasing storage and IOPs.

3.8 SRS Inter-operability and Data Synchronisation
The SRS interfaces with a number of related registry systems as part of normal operations.

3.8.1 DNS Update
Changes made in the SRS are propagated to the DNS via an ARI proprietary DNS Update process. This process runs on the ‘hidden’ primary master nameserver and waits on a queue. It is notified when the business logic inserts changes into the queue for processing. The DNS Update process reads these queue entries and converts them into DNS update (RFC2136) commands that are sent to the nameserver. The process of synchronising changes to SRS data to the DNS occurs in real-time.

3.8.2 WhoIs
The provisioned data supporting the SRS satisfies WhoIs queries. Thus the WhoIs and SRS share data sets and the WhoIs is instantaneously updated. Under normal operating conditions the WhoIs service is provided by the infrastructure at the secondary site in order to segregate the load and protect SRS from WhoIs demand (and vice versa). WhoIs queries that hit the standby site will query data stored in the standby database – maintained in near real-time using Oracle Active Data Guard. If complete site failure occurs WhoIs and SRS can temporarily share the same operations centre at the same site (capacity numbers are calculated for this).

3.8.3 Escrow
A daily Escrow extract process executes on the database server via a dedicated database account with restricted read-only access. The results are then transferred to the local Escrow Communications server by SSH.

4 OPERATIONAL PLAN
ARI follow defined policies⁄procedures that have developed over time by running critical registry systems. Some principals captured by these are:
– Conduct all changes & upgrades under strict and well-practised change control procedures
– test, test and test again
– Maintain Staging environments as close as possible to production infrastructure⁄configuration
– Eliminate all single points of failure
– Conduct regular security reviews & audits
– Maintain team knowledge & experience via skills transfer⁄training
– Replace hardware when no longer supported by vendor
– Maintain spare hardware for all critical components
– Execute regular restore tests of all backups
– Conduct regular capacity planning exercises
– Monitor everything from multiple places but ensure monitoring is not ‘chatty’
– Employ best of breed hardware & software products & frameworks (such as ITIL, ISO27001 and Prince2)
– Maintain two distinct OT&E environments to support pre-production testing for Registrars

5 SLA, RELIABILITY & COMPLIANCE
ARI’s SRS adheres to and goes beyond the scope of Specification 6 and Specification 10 of the Registry Agreement. ARI’s EPP service is XML compliant and XML Namespace aware. It complies with the EPP protocol defined in RFC5730, and the object mappings for domain, hosts & contacts are compliant with RFC 5731, 5732 & 5733 respectively. The transport over TCP is compliant with RFC5734. The service also complies with official extensions to support DNSSEC, RFC5910, & Redemption Grace Period, RFC 3915.
ARI’s SRS is sized to sustain a peak transaction rate of 14,000 TPS while meeting strict internal Operational Level Agreements (OLAs). The monthly-based OLAs below are more stringent than those in Specification 10 (Section 2).
EPP Service Availability: 100%
EPP Session Command Round Trip Time (RTT): 〈=1000ms for 95% of commands
EPP Query Command Round Trip Time (RTT): 〈=500ms for 95% of commands
EPP Transform Command Round Trip Time (RTT): 〈=1000ms for 95% of commands
SRS Web Interface Service Availability: 99.9%
ARI measure the elapsed time of every query, transform and session EPP transaction, and calculate the percentage of commands that fall within OLA on a periodic basis. If percentage value falls below configured thresholds on-call personnel are alerted.
SRS availability is measured by ARI’s monitoring system which polls both the EPP and SRS Web services status. These checks are implemented as full end to end monitoring scripts that mimic user interaction, providing a true representation of availability. These ‘scripts’ are executed from external locations on the Internet.

6 RESOURCES
This function will be performed by ARI. ARI staff are industry leading experts in domain name registries with the experience and knowledge to deliver outstanding SRS performance.
The SRS is designed, built, operated and supported by the following ARI departments:
– Products and Consulting Team (7 staff)
– Production Support Group (27 staff)
– Development Team (11 staff)
A detailed list of the departments, roles and responsibilities in ARI is provided in attachment ‘Q24 – ARI Background & Roles.pdf’. This attachment describes the functions of the teams and the number and nature of staff within.
The number of resources required to design, build, operate and support the SRS does not vary significantly with, and is not linearly proportional to, the number or size of TLDs that ARI provides registry services to.
ARI provides registry backend services to 5 TLDs and has a vast experience in estimating the number of resources required to support a SRS.
Based on past experience ARI estimates that the existing staff is adequate to support an SRS that supporting at least 50M domains. Since this TLD projects 17,648 domains, 0.04% of these resources are allocated to this TLD. See attachment ‘Q24 – Registry Scale Estimates & Resource Allocation.xlsx’ for more information.
ARI protects against loss of critical staff by employing multiple people in each role. Staff members have a primary role plus a secondary role for protection against personnel absence. Additionally ARI can scale resources as required, trained resources can be added to any of the teams with a 2 month lead time.
The Products and Consulting team is responsible for product management of the SRS solution including working with clients and the industry to identify new features or changes required. The team consists of:
– 1 Products and Consulting Manager
– 1 Product Manager
– 1 Technical Product Manager
– 4 Domain Name Industry Consultants
The Production Support Group (PSG) is responsible for the design, deployment and maintenance of the SRS infrastructure including capacity planning and monitoring as well as security aspects – ensuring the SRS services are available and performing at the appropriate level and operating correctly. The team consists of:
– Production Support Manager
– Service Desk:
– 1 Level 1 Support Team Lead
– 8 Customer Support Representatives (Level 1 support)
– 1 Level 2 Support Team Lead
– 4 Registry Specialists (Level 2 support)
– Operations (Level 3 support):
– 1 Operations Team Lead
– 2 Systems Administrators
– 2 Database Administrators
– 2 Network Engineers
– Implementation:
– 1 Project Manager
– 2 Systems Administrators
– 1 Database Administrator
– 1 Network Engineer
The development team is responsible for implementing changes and new features into the SRS as well as bug fixing and complex issue diagnosis. The team consists of:
– 1 Development Manager
– 2 Business Analysts
– 6 Developers
– 2 Quality Analysts
These resources sufficiently accommodate the needs of this TLD, and are included in ARI’s fees as described in our Financial responses.

25. Extensible Provisioning Protocol (EPP)

We have engaged ARI Registry Services (ARI) to deliver services for this TLD. ARI provide registry services for a number of TLDs including the .au ccTLD. For more background information on ARI please see the attachment ‘Q25 – ARI Background & Roles.pdf’. This response describes the Extensible Provisioning Protocol (EPP) interface as implemented by ARI.

1 INTRODUCTION

ARI’s EPP service is XML compliant and XML Namespace aware. The service complies with the EPP protocol defined in RFC5730, and the object mappings for domain, hosts and contacts are compliant with RFC5731-3 respectively. The transport over TCP is implemented in compliance with RFC5734. The service also complies with the official extensions to support DNSSEC, RFC5910 and Redemption Grace Period, RFC3915. ARI implemented EPP draft version 0.6 in 2002, then migrated to EPP RFC 1.0 on its publishing in 2004. The system has operated live since 2002 in the .au ccTLD.
Descriptions in this response follow the terminology used in the EPP RFCs. When referring to the software involved in the process, ARI’s EPP interface is called the server, and the software used by Registrars is called the client.

2 TRANSPORT LAYER

The ARI EPP service implements the RFC5734 – EPP Transport over TCP. Connections are allowed using TLSv1 encryption, optionally supporting SSLv2 Hello for compatibility with legacy clients. AES cipher suites for TLS as described in RFC3268 are the only ones allowed.

2.1 Authentication
Registrar access to the EPP interface is authenticated and secured with multi-factor authentication (NIST Level 3) and digital assertion as follows. Registrars must:
– present a certificate, during TLS negotiation, signed by the ARI Certificate Authority (CA). The server returns a certificate also signed by the ARI CA. Not presenting a valid certificate results in session termination. ARI requires that the Common Name in the subject field of the certificate identifies the Registrar.
– originate connections from an IP address that is known to be assigned to the Registrar with that Common Name.
– Registrar must use authentication credentials provided to the Registrar via encrypted email
– Registrars aren’t able to exceed a fixed number of concurrent connections. The connection limit is prearranged and designed to prevent abuse of Registrars’ systems from affecting the Registry. The limit is set to reasonable levels for each Registrar, but can be increased to ensure legitimate traffic is unaffected. If any of the above conditions aren’t met the connection is terminated.
All communication between the Registrars and the EPP service is encrypted using at least 128 bit encryption which been designated as ‘Acceptable’ till ‘2031 and beyond’ by NIST Special Publication 800-57.

2.3 Connection Close
The server may close the connection as a result of a logout, an error where the state of the connection is indeterminate, or after a timeout. Timeout occurs where no complete EPP message is received on the connection for 10 minutes.

3 EPP PROTOCOL

This section describes the interface relating to the EPP protocol described in RFC5730. This includes session management, poll message functionality and object mappings for domains, hosts and contacts.

3.1 Session Management
Session management refers to login and logout commands, used to authenticate and end a session with the SRS. The Login command is used to establish a session between the client and the server. This command succeeds when:
– The username supplied matches the Common Name in the digital certificate used in establishing the TLS session.
– The provided password is valid for the user.
– The user’s access to the system isn’t suspended.
The Logout command is used to end an active session. On processing a logout the server closes the underlying connection. The Hello command can be used as a session keep-alive mechanism.

3.2 Service Messages
Offline notifications pertaining to certain events are stored in a queue. The client is responsible for polling this queue for new messages and to acknowledge read messages. Messages include notification about server modification of sponsored objects, transfer operations, and balance thresholds.

4 EPP OBJECT MAPPINGS

This section covers the interface for the 3 core EPP objects; domain, host and contact objects, as per RFC5731, 5732, & 5733 respectively.

The EPP domain, contact and host object mapping describes an interface for the check, info, create, delete, renew (domain only), transfer (domain & contact only) and update commands. For domain objects the server doesn’t support the use of host attributes as described by RFC5731, but rather uses host objects as described by RFC5731 and RFC5732. Details of each command are:
– check command: checks availability of 1 or more domain, contact or host objects in the SRS. Domain names will be shown as unavailable if in use, invalid or reserved, other objects will be unavailable if in use or invalid.
– info command: retrieves the information of an object provisioned in the SRS. Full information is returned to the sponsoring client or any client that provides authorisation information for the object. Non-sponsoring clients are returned partial information (no more than is available in the WhoIs).
– create command: provisions objects in the SRS. To ascertain whether an object is available for provisioning, the same rules for the check command apply.
– delete command: begins the process of removing an object from the SRS. Domain names transition into the redemption period and any applicable grace periods are applied. Domain names within the Add Grace Period are purged immediately. All other objects are purged immediately if they are not linked.
– renew command (domain only): extends the registration period of a domain name. The renewal period must be between 1 to 10 years inclusive and the current remaining registration period, plus the amount requested in the renewal mustn’t exceed 10 years.
– transfer command (domain and contact only): provides several operations for the management of the transfer of object sponsorship between clients. Clients that provide correct authorisation information for the object can request transfers. Domain names may be rejected from transfer within 60 days of creation or last transfer. The requesting client may cancel the transfer, or the sponsoring client may reject or approve the transfer. Both the gaining and losing clients may query the status of the current pending or last completed transfer.
– update command: updates authorisation information, delegation information (domains), and registration data pertaining to an object.

5 NON-PROPRIETARY EPP MAPPINGS

ARI’s EPP service implements 2 non-proprietary EPP mappings, to support the required domain name lifecycle and to provide & manage DNSSEC information. The relevant schema documents aren’t provided as they are published as RFCs in the RFC repository.

5.1 Grace Period Mapping
The Domain Registry Grace Period Mapping for the Extensible Provisioning Protocol (as per RFC 3915) is used to support the domain name lifecycle as per existing TLDs. The update command is extended by the restore command to facilitate the restoration of previously deleted domains in the redemption period. This command defines 2 operations, request & report, described here:
– Request operation: requests the restoration of a domain.
– Report operation: completes the restoration by specifying the information supporting the restoration of the domain. The restore report must include a copy of the WhoIs information at both the time the domain was deleted & restored, including the restore reason.

5.2 DNSSEC Mapping
The Domain Name System (DNS) Security Extensions Mapping for EPP, as per RFC5910, is used to support the provisioning of DNS Security Extensions. ARI requires clients use the Key Data interface. Clients may associate a maximum of 4 keys per domain. The registry system generates the corresponding DS data using the SHA-256 digest algorithm for the domain and any active variant domains.
ARI is aware of issues DNSSEC causes when transferring DNS providers – a transfer of Registrar usually means a change in DNS provider. DNSSEC key data won’t be removed from the SRS or the DNS if a transfer occurs. It is the responsibility of and requires the cooperation of the registrant, Registrars, and DNS providers, to provide a seamless transition. ARI observes progress with this issue and implements industry agreed solutions as available. DNSSEC information is included in info responses when the secDNS namespace in login.

6 PROPRIETARY MAPPING

The registry system supports 3 additional EPP extensions where no published standard for the required functionality exists. Developed to conform to the requirements specified in RFC3735, these extensions include the provisioning of Internationalised Domain Names and domain name variants, and the association of arbitrary data with a domain name. These 3 extensions are introduced below, and further described in the attached schema documentation.

6.1 Internationalised Domain Names
ARI has developed an extension to facilitate the registration and management of Internationalised Domain Names as per RFCs 5890-5893 (collectively known as the IDNA 2008 protocol). This extension extends the domain create command and the info response.
The create command is extended to capture the language table identifier that identifies the corresponding IDN language table for the domain name. Additionally the extension requires the Unicode form to avoid an inconsistency with DNS-form, as per RFC 5891.
The domain info command is extended to identify the language tag and Unicode form provided in the initial create command. This information is disclosed to all querying clients that provided the extension namespace at login. This extension is documented in the attachment ‘Q25 – idnadomain-1.0.pdf’.

6.2 Variant
ARI has developed an extension to facilitate the management of Domain Name variants. This extension extends the domain update command and the domain create and info responses. The domain update command is extended to allow the addition (activation) and removal (de-activation) of domain name variants subject to registry operator policy.
The domain create and info responses are extended to return the list of activated domain name variants. This information is disclosed to all querying clients that provided the extension namespace at login. The extension is documented in the attachment ‘Q25 – variant-1.1.pdf’.
ARI is aware of the work underway at IETF to produce a standard for the management and provisioning of IDN Variants and is committed to contributing to the development of the standard as well as to implement it upon its completion.

6.3 Key-Value
ARI has developed an extension to facilitate the transport of arbitrary data between clients and the SRS without the need for developing EPP Extensions for each specific use-case. This extension extends the domain create and domain update transform commands and the domain info query command. This extension is documented in the attachment ‘Q25 – kv-1.0.pdf’.

This feature can be used to extend requirements to support Sunrise registrations, for example extensions used by .ASIA in its Sunrise process:
• An 〈ipr:name〉 element that indicates the name of Registered Mark.
• An 〈ipr:number〉 element that indicates the registration number of the IPR.
• An 〈ipr:ccLocality〉 element that indicates the origin for which the IPR is established (a national or international trademark registry).
• An 〈ipr:entitlement〉 element that indicates whether the applicant holds the trademark as the original “OWNER”, “CO-OWNER” or “ASSIGNEE”.
• An 〈ipr:appDate〉 element that indicates the date the Registered Mark was applied for.
• An 〈ipr:regDate〉 element that indicates the date the Registered Mark was issued and registered.
• An 〈ipr:class〉 element that indicates the class of the registered mark.
• An 〈ipr:type〉 element that indicates the Sunrise phase the application applies for.

Depending on the TMCH (Trademark Clearing House) and corresponding Sunrise requirements, ARI will follow the RFC 5735 and the requirements specified in the agreement and specifications in ICANNʹs Registry Agreement to produce an implementation to support TMCH and Sunrise EPP transactions.

7 ADDITIONAL SECURITY

The registry system provides additional mechanisms to support a robust interface. The use of command rate limiting enables the registry to respond to and withstand erroneous volumes of commands, while a user permission model provides fine-grained access to the EPP interface. These 2 mechanisms are described below.

7.1 Rate Limiting
The registry system supports command and global rate limits using a token-bucket algorithm. Limits apply to each connection to ensure fair and equitable use by all. Clients that exceed limits receive a command failed response message indicating breach of the limit.

7.2 User Permission Model
The registry system supports a fine-grained permission model controlling access to each specific command. By default, clients receive access to all functionality; however it is possible to remove access to a specific command in response to abuse or threat to stability of the system. Clients that attempt a command they have lost permission to execute, receive an EPP command failed response indicating loss of authorisation.

8 COMPLIANCE

Compliance with EPP RFCs is achieved through design and quality assurance (QA). The EPP interface was designed to validate all incoming messages against the respective XML Schema syntax. The XML Schema is copied directly from the relevant RFCs to avoid any ambiguity on version used. Inbound messages that are either malformed XML or invalid are rejected with a 2400 response. Outbound messages are validated against the XML Schema, and if an invalid response is generated, it is replaced with a known valid pre-composed 2400 response, and logged for later debugging.
A QA process provides confidence that changes don’t result in regressions in the interface. Automated build processes execute test suites that ensure every facet of the EPP service (including malformed input, commands sequencing and synchronisation, and boundary values) is covered and compliant with RFCs and the EPP service specification. These tests are executed prior to committing code and automatically nightly. The final deliverable is packaged and tested again to ensure no defects were introduced in the packaging process.
New versions of the EPP Service follow a deployment schedule. The new version is deployed into an OT&E environment for Registrar integration testing. Registrars are encouraged during this stage to test their systems operate correctly. After a fixed time in OT&E without issue, new versions are scheduled for production deployment. This ensures incompatibilities with RFCs that made it through QA processes are detected in test environments prior reaching production.
ARI surveys Registrars for information about the EPP client toolkit. These surveys indicated that while many Registrars use ARI toolkits, several Registrars use either their own or that from another registry. The ability for Registrars to integrate with the ARI EPP service without using the supplied toolkit indicates the service is compliant with RFCs.
ARI is committed to providing an EPP service that integrates with third party toolkits and as such tests are conducted using said toolkits. Any issues identified during testing fall into the following categories:
– Third-party toolkit not compliant with EPP
– EPP service not compliant with EPP
– Both third-party toolkit and EPP service are compliant, however another operational issue causes an issue
Defects are raised and change management processes are followed. Change requests may also be raised to promote integration of third-party toolkits and to meet common practice.

9 CAPACITY

This TLD is projected to reach 17,648 domains at its peak volume and will generate 12.3536 EPP TPS. This will consume 17,648% of the EPP resources. ARI’s SRS can easily accommodate this TLD. This was described in considerable detail in the capacity section of question 24.

10 RESOURCES

This function will be performed by ARI. ARI provides a technical support team to support Registrars and also provides Registrars with a tool kit (in Java and C++) implementing the EPP protocol. Normal operations for all registry services are managed by ARI’s Production Support Group (PSG), who ensure the EPP server is available and performing appropriately.
Faults relating to connections with or functionality of the EPP server are managed by PSG. ARI monitors EPP availability and functionality as part of its monitoring practices, and ensures PSG staff are available to receive fault reports from Registrars any time. PSG has the appropriate network, Unix and application (EPP and load balancing) knowledge to ensure the EPP service remains accessible and performs as required. These ARI departments support EPP:
– Products and Consulting Team (7 staff)
– Production Support Group (27 staff)
– Development Team (11 staff)
A detailed list of the departments, roles and responsibilities in ARI is provided as attachment ‘Q25 – ARI Background & Roles.pdf’. This attachment describes the functions of the above teams and the exact number and nature of staff within.
The number of resources required to design, build, operate and support the SRS does not vary significantly with, and is not linearly proportional to, the number or size of TLDs that ARI provides registry services to.
ARI provides registry backend services to 5 TLDs and has a wealth of experience in estimating the number of resources required to support a registry system.
Based on past experience ARI estimates that existing staff are adequate to support a registry system that supports in excess of 50M domains. Since this TLD projects 17,648 domains, 0.04% of these resources are allocated to this TLD. See attachment ‘Q25 – Registry Scale Estimates & Resource Allocation.xlsx’ for more information.
ARI protects against loss of critical staff by employing multiple people in each role. Staff members have a primary role plus a secondary role for protection against personnel absence. Additionally ARI can scale resources as required, trained resources can be added to any of the above teams with a 2-month lead time.

10.1 Team Details
The products and consulting team is responsible for product management of the EPP solution, and works with clients and industry to identify required system features or changes. The team consists of:
– 1 Products and Consulting Manager
– 1 Product Manager
– 1 Technical Product Manager
– 4 Domain Name Industry Consultants
The Production Support Group (PSG) is responsible for the design, deployment and maintenance of the EPP infrastructure including capacity planning, monitoring, and security. This team ensures the EPP services are available and performing appropriately. The team consists of:
– Production Support Manager
– Service Desk:
– 1 Level 1 Support Team Lead
– 8 Customer Support Representatives (Level 1 support)
– 1 Level 2 Support Team Lead
– 4 Registry Specialists (Level 2 support)
– Operations (Level 3 support):
– 1 Operations Team Lead
– 2 Systems Administrators
– 2 Database Administrators
– 2 Network Engineers
– Implementation:
– 1 Project Manager
– 2 Systems Administrators
– 1 Database Administrator
– 1 Network Engineer
The development team is responsible for EPP changes and features, bug fixes and issue diagnosis. The team consists of:
– 1 Development Manager
– 2 Business Analysts
– 6 Developers
– 2 Quality Analysts
These resources sufficiently accommodate the needs of this TLD, and are included in ARI’s fees as described in our financial responses.


26. Whois

We have engaged ARI Registry Services (ARI) to deliver services for this TLD. ARI provide registry services for a number of TLDs including the .au ccTLD. For more background information on ARI please see the attachment ‘Q26 – ARI Background & Roles.pdf’. This response describes the WhoIs interface as implemented by ARI.

1 INTRODUCTION

ARI’s WhoIs service is for all domain names, contacts, nameservers and Registrars provisioned in the registry database. This response describes the port 43 and web interfaces of WhoIs, security controls to mitigate abuse, compliance with bulk access requirements for registration data, and the architecture delivering the service.

2 PORT 43 WHOIS SERVICE

WhoIs is on TCP port 43 in accordance with RFC3912. Requests are made in semi-free text format and ended by CR & LF. The server responds with a semi-free text format, terminating the response by connection close.
To support IDNs and Localised data we assume the query is encoded in UTF-8 and sends responses encoded in UTF-8. UTF-8 is backwards compatible with the ASCII charset and its use is consistent with the IETF policy on charsets as defined in BCP 18 [http:⁄⁄tools.ietf.org⁄html⁄bcp18].

2.1 Query Format
By default WhoIs searches domains. To facilitate the queries of other objects keywords must be used. Supported keywords are:
– Domain
– Host⁄Nameserver
– Contact
– Registrar
Keywords are case-insensitive. The rest of the input is the search string. Wildcard chars may be used in search strings to match zero or more chars (%), or match exactly one char(_). Wildcard chars must not be in the first 5 chars.

2.2 Response Format
The response follows a semi-structured format of object-specific data, followed by query-related meta-information, then a disclaimer.
The object-specific data is represented by key⁄value pairs, beginning with the key, followed by a colon and a space then the value terminated by an ASCII CR & LF. Where no object is found ‘No Data Found’ is returned.
The meta-information is used to identify data freshness and indicate when limits have been exceeded. It appears on one line within ‘〉〉〉’ and ‘〈〈〈’ chars.
The legal disclaimer is presented without leading comment marks wrapped at 72 chars. This format is consistent with that in the registry agreement.

2.3 Domain Data
Domain data is returned in response to a query with the keyword omitted, or with the ‘domain’ keyword. Domain queries return information on domains that are provisioned in the registry database.
The IDN domains may be specified in either the ASCII-compatible encoded form or the Unicode form. Clients are expected to perform any mappings, in conformance with relevant guidelines such as those specified in RFC5894 and UTS46.
Variant domains may be specified in the search string and WhoIs will match (using case-insensitive comparison) and return information for the primary registered domain.
For queries containing wildcard chars, if only one domain name is matched its details are returned, if more than one domain name is matched then the first 50 matched domain names are listed.

2.3.1 Internationalised Domain Names
The WhoIs response format, prescribed in Specification 4, does not provide a mechanism to identify active variant domain names. ARI will include active variant domain names in WhoIs responses until a common approach for handling and display of variant names is determined.

2.3.2 Reserved Domain Names
Domain names reserved from allocation will have a specific response that indicates the domain is not registered but also not available.

2.4 Nameserver Data
Nameserver data is returned in response to a query where the ‘nameserver’ or ‘host’ keywords have been used. Nameserver queries return information on hosts that are provisioned in the registry.
The search string for a nameserver query can be either a hostname or IP. Queries using the hostname produce one result unless wildcards are used. Queries using the IP produce one or more results depending on the number of hostnames that match that address. Queries for the hostname are matched case-insensitively.
The quad-dotted notation is expected for IPv4 and the RFC3513 – IPv6 Addressing Architecture format for IPv6. Wildcards cannot be used for IP queries.

2.5 Contact Data
Contact data is returned in response to a query where the ‘contact’ keyword was used. Contact queries return information on contacts that are provisioned in the registry.
The search string for a contact query is the contact identifier. Contact identifiers are matched using a case-insensitive comparison. Wildcards cannot be used.

2.6 Registrar Data
Registrar data is returned in response to a query where the ‘Registrar’ keyword was used. Registrar queries return information on Registrar objects that are provisioned in the registry.
The search string for a Registrar query can be name or IANA ID. Queries using the name or the IANA ID produce only one result. Queries for the name are matched using a case-insensitive comparison. Wildcards cannot be used.

2.7 Non-standard Data
The SRS supports domain-related data beyond that above. It may include information used to claim eligibility to participate in the sunrise process, or other arbitrary data collected using the Key-Value Mapping to the EPP. This information will be included in the WhoIs response after the last object-specific data field and before the meta-information.

3 WEB-BASED WHOIS SERVICE

WhoIs is also available via port 80 using HTTP, known as Web-based WhoIs. This interface provides identical query capabilities to the port 43 interface via an HTML form.

4 SECURITY CONTROLS

WhoIs has an in-built mechanism to blacklist malicious users for a specified duration. Blacklisted users are blocked by source IP address and receive a specific blacklisted notification instead of the normal WhoIs response.
Users may be blacklisted if ARI’s monitoring system determines excessive use. A whitelist is used to facilitate legitimate use by law enforcement agencies and other reputable entities.

5 BULK ACCESS

The registry system complies with the requirements for the Periodic Access to Thin Registration Data and Exceptional Access to Thick Registration Data as described in Specification 4.

5.1 Periodic Access to Thin Registration Data
ARI shall provide ICANN with Periodic Access to Thin Registration Data. The data will contain the following elements as specified by ICANN. The format of the data will be consistent with the format specified for Data Escrow. The Escrow Format prescribes an XML document encoded in UTF-8. The generated data will be verified to ensure that it is well formed and valid.
The data will be generated every Monday for transactions committed up to and on Sunday unless otherwise directed by ICANN. The generated file will be made available to ICANN using SFTP. Credentials, encryption material, and other parameters will be negotiated between ARI and ICANN using an out-of-band mechanism.

5.2 Exceptional Access to Thick Registration Data
If requested by ICANN, ARI shall provide exceptional access to thick registration data for a specified Registrar. The date will contain full information for the following objects:
– Domain names sponsored by the Registrar
– Hosts sponsored by the Registrar
– Contacts sponsored by the Registrar
– Contacts linked from domain names sponsored by the Registrar
As above the format of the data will be consistent with the format specified for Data Escrow. And will be made available to ICANN using SFTP.

6 CAPACITY

ARI’s WhoIs infrastructure is built to sustain 20M domain names. Based on ARI’s experience running a high volume ccTLD registry (.au) and industry analysis, ARI were able to calculate the conservative characteristics of a registry of this size.
Through conservative statistical analysis of the .au registry and data presented in the May 2011 ICANN reports for the .com & .net, .org, .mobi, .info, .biz and .asia [http:⁄⁄www.icann.org⁄en⁄resources⁄registries⁄reports] we know there is:
– An average of 30 SRS txs per domain, per month.
Which indicates an expected monthly transaction volume of 600M txs?
Through statistical analysis of the .au registry and backed up by the data published in the .net RFP responses [http:⁄⁄archive.icann.org⁄en⁄tlds⁄net-rfp⁄net-rfp-public-comments.htm] we also know:
– The peak daily transactions is 6% of the monthly total
– The peak 5 min is 5% of the peak day
Thus we expect a peak WhoIs tx rate of WhoIs 6,000 TPS.
For perspective on the conservativeness of this, the following numbers were taken from data in the May 2011 ICANN reports referenced above:
– .info ~7.8M domain names, peaks at ~1,300 TPS (projected peak TPS of ~3,400 with 20M names).
– .mobi ~1M domain names, peaks at ~150 TPS (projected peak TPS of ~3,000 TPS with 20M names).
– .org ~9.3M domain names, peaks at ~1,300 TPS (projected peak TPS of ~2,800 with 20M names).
ARI understand the limitations of these calculations but they serve as a best estimate of probable transaction load. ARI has built overcapacity of resources to account for limitations of this method, however as conservative numbers were used and these are greater than real world observations, we are confident these capacity numbers are sufficient.
ARI benchmarked their WhoIs infrastructure and used the results to calculate the required computing resources for each of the tiers within the WhoIs architecture – allowing ARI to accurately estimate the required CPU, IOPS, storage and memory requirements for each server within the architecture, as well as the network bandwidth and packet throughput requirements for the anticipated WhoIs traffic. These capacity numbers were then doubled to account for unanticipated traffic spikes, errors in predictions and head room for growth. The technical resource allocations are explored in question 32.
This TLD is projected to reach 17,648 domains at its peak volume and will generate 5.2944 WhoIs transactions per second. This will consume 0.09% of the resources of the WhoIs infrastructure. As is evident ARI’s WhoIs can easily accommodate this TLD’s growth plans. See attachment ‘Q26 – Registry Scale Estimates & Resource Allocation.xlsx’ for more information.
ARI expects to provide Registry services to 100 TLDs and a total of 12M domains by end of 2014. With all the TLDs and domains combined, ARI’s WhoIs infrastructure will be only 60% utilized. The WhoIs infrastructure capacity can also be easily scaled as described in question 32

7 ARCHITECTURE

WhoIs uses a database separate from the SRS database as it operates from the secondary site such that network and database resources are decoupled from the operation of the SRS. Oracle Data Guard ensures the two databases are synchronised in real-time. The WhoIs service is operated live from the SRS ‘failover’ site, with the SRS ‘primary’ site serving as the ‘failover’ site for the WhoIs service. Both sites have enough capacity to run both services simultaneously, however by separating them, in normal operating modes headroom above the already over provisioned capacity is available. The architecture and data flow diagrams are described below and shown in the attachment ‘Q26 – WhoIs.pdf’.
Traffic enters the network from the Internet through border routers and then firewalls. All traffic destined for this service except for TCP ports 43, 80 & 443 is blocked. Load balancers forward the request to one of the application servers running ARI built WhoIs software. Each server is connected to the database cluster through another firewall further restricting access to the. Each server uses a restricted Oracle user that has read only access to the registry data and can only access the data that is relevant to the WhoIs queries. This ensures that in the unlikely event of an application server compromise the effects are limited.
All components are configured and provisioned to provide N+1 redundancy. Multiple Internet providers with separate upstream bandwidth suppliers are used. At least one additional component of all hardware exists, enabling maintenance without downtime. This configuration provides a service exceeding the availability requirements in Specification 10.
The use of load balancing allows addition of application servers with no downtime. From a database perspective, the ability to scale is enabled by utilising Oracle RAC database clustering. The entire service, including routers, firewalls and application is IPv6 compatible and WhoIs is offered on both IPv4 and IPv6. Detail about this architecture is available in our response to Question 32.

7.1 Synchronisation
The WhoIs database is synchronised with the SRS database using Oracle Data Guard. Committed transactions in the SRS database are reflected in the WhoIs database in real-time. Should synchronisation break, WhoIs continues to operate with the latest available data until the issue is reconciled. The channel between the two sites consists of two independent dedicated point to point links as well as the Internet. Replication traffic flows via the dedicated links or if both links fail replication traffic flows over Internet tunnels.

7.2. Interconnectivity with Other Services
The WhoIs service is not directly interconnected with other registry services or systems. The software has been developed to provide the WhoIs service exclusively and retrieve response information from a database physically separate to the SRS transactional database. This database is updated as described in ‘Synchronisation’ above. Although for smaller system the WhoIs and SRS can be configured to use the same data store. The WhoIs servers log every request to a central repository that is logically separate from the WhoIs database. This repository is used for query counts, detection of data mining and statistical analysis on query trends.

7.3 IT and Infrastructure Resources
The WhoIs service is provided utilizing Cisco networking equipment, IBM servers & SAN. They are described in the attachment ‘Q26 – WhoIs.pdf’. For more information on the architecture including server specifications and database capabilities please see Questions 32 & 33.

8 COMPLIANCE

Compliance with WhoIs RFCs is achieved through design and QA. The WhoIs interface was designed to conform to the RFCs as documented and independent test cases have been developed.
QA processes provide confidence that any changes to the service don’t result in regression of the WhoIs. Automated build processes execute test suites that ensure every facet of the WhoIs service (including malformed input, commands sequencing and synchronisation, and boundary values) is covered and compliant with RFCs. These tests are executed prior to the committing of code and nightly. The final deliverable is packaged and tested again to ensure no defects were introduced in the packaging of the software.
New versions of the WhoIs follow a deployment schedule. The new version is deployed into an OT&E environment for Registrar integration testing. Registrars who rely on WhoIs functionality are encouraged during this stage to test their systems operate without change. After a fixed time in OT&E without issue, new versions are scheduled for production deployment. This ensures incompatibilities with RFCs that made it through QA processes are detected in test environments prior to reaching production.
ARI is committed to providing a WhoIs service that integrates with third party tools and as such tests are conducted using these tools such as jWhoIs, a popular UNIX command line WhoIs client. Any issues identified during integration fall into 1 of the following categories:
– Third-party tool not compliant with the WhoIs specification
– WhoIs service not compliant
– Both third-party tool and WhoIs service are compliant, however another operational issue causes a problem
Defects are raised and follow the change management. Change requests may also be raised to promote integration of third-party tools and to meet common practice.

9 RESOURCES

This function will be performed by ARI. The WhoIs system is supported by a number of ARI departments:
– Products and Consulting Team (7 staff)
– Production Support Group (27 staff)
– Development Team (11 staff)
– Legal, Abuse and Compliance Team (6 staff)
A detailed list of the departments, roles and responsibilities in ARI is provided as attachment ‘Q26 – ARI Background & Roles.pdf’. This attachment describes the functions of the above teams and the exact number and nature of staff within.
The number of resources required to design, build, operate and support the SRS does not vary significantly with, and is not linearly proportional to, the number or size of TLDs that ARI provides registry services to.
ARI provides registry backend services to 5 TLDs and has a wealth of experience in estimating the number of resources required to support a registry system.
Based on past experience ARI estimates that the existing staff is adequate to support a registry system that supports in excess of 50M domains. Since this TLD projects 17,648 domains, 0.04% of these resources are allocated to this TLD. See attachment ‘Q26 – Registry Scale Estimates & Resource Allocation.xlsx’ for more information.
ARI protects against loss of critical staff by employing multiple people in each role. Staff members have a primary role plus a secondary role for protection against personnel absence. Additionally ARI can scale resources as required. Additional trained resources can be added to any of the above teams with a 2 month lead time.
The products and consulting team is responsible for product management of the WhoIs solution including working with clients and the industry to identify new features or changes required to the system. The team consists of:
– 1 Products and Consulting Manager
– 1 Product Manager
– 1 Technical Product Manager
– 4 Domain Name Industry Consultants
ARI employ a development team responsible for the maintenance and continual improvement of the WhoIs software. The team consists of:
– 1 Development Manager
– 2 Business Analysts
– 6 Developers
– 2 Quality Analysts
ARI’s Production Support Team ensures the successful operation of the WhoIs system. The team comprises Database Administrators, Systems Administrators and Network Administrators. This team routinely checks and monitors bandwidth, disk and CPU usages to plan and respond to expected increases in the volume of queries, and perform maintenance of the system including security patches and failover and recovery testing. The team consists of:
– Production Support Manager
– Service Desk:
– 1 Level 1 Support Team Lead
– 8 Customer Support Representatives (Level 1 support)
– 1 Level 2 Support Team Lead
– 4 Registry Specialists (Level 2 support)
– Operations (Level 3 support)
– 1 Operations Team Lead
– 2 Systems Administrators
– 2 Database Administrators
– 2 Network Engineers
– Implementation
– 1 Project Manager
– 2 Systems Administrators
– 1 Database Administrators
– 1 Network Engineers
ARI’s registry provides abuse monitoring detection mechanisms to block data mining. ARI support staff may be contacted to remove blacklisted users during which they may be referred to the Legal, Abuse and Compliance Team for evaluation of their activities. Additionally the support team in conjunction with the Legal, Abuse and Compliance team administer requests for listing on the whitelist. The team consists of:
– 1 Legal Manager
– 1 Legal Counsel
– 4 Policy Compliance Officers
These resources sufficiently accommodate the needs of this TLD, and are included in ARI’s fees as described in our Financial responses.

27. Registration Life Cycle

We have engaged ARI Registry Services (ARI) to deliver services for this TLD. ARI provide registry services for a number of TLDs including the .au ccTLD. For more background information on ARI please see the attachment ‘Q27 – ARI Background & Roles.pdf’. This response describes the Registration Lifecycle as implemented by ARI.

1 INTRODUCTION

The lifecycle described matches current gTLD registries. All states, grace periods and transitions are supported by the EPP protocol as described in RFC5730 – 5734 & the Grace Period Mapping published in RFC3915. An overview is in attachment ‘Q27 – Registration Lifecycle.pdf’.

2 REGISTRATION PERIODS

The registry supports registration up to 10 years and renewals for 1 to 10 years. The total current validity period can’t exceed 10 years.
Transfers under part A of the ICANN Policy on Transfer of Registrations between Registrars (Adopted 7 November 2008) extend registration by 1 year. The period truncates to 10 years if required.

3 STATES

The states that a domain can exist in are: Registered, Pending Transfer, Redemption, Pending Restore & Pending Delete.
All domain name statuses (RFC3915, 5730-5734 and 5910) are covered below

3.1 Registered
EPP Status: ok
In DNS: Yes
Allowed Operations: Update, Renew, Transfer (request) & Delete
The default state of a domain – no pending operations. The sponsoring Registrar may update the domain.

3.2 Pending Transfer
EPP Status: pendingTransfer
In DNS: Yes
Allowed Operations: Transfer (cancel, reject, approve)
Another Registrar has requested transfer of the domain and it is not yet completed All transform operations, other than those to cancel, reject, or approve the transfer are rejected.

3.3 Redemption
EPP Status: pendingDelete
RGP Status: redemptionPeriod
In DNS: No
Allowed Operations: Restore (request)
Domain has been deleted. The sponsor may request restoration of the domain. The domain continues to be withheld from the DNS unless it is restored. No transform operations other than restore are allowed.

3.4 Pending Restore
EPP Status: pendingDelete
RGP Status: pendingRestore
In DNS: Yes
Allowed Operations: Restore (report)
A restore request is pending. The sponsor must submit a restore report. The domain is provisioned the DNS. No transform operations other than the restore report are allowed.

3.5 Pending Delete
EPP Status: pendingDelete
RGP Status: pendingDelete
In DNS: No
Allowed Operations: None
The Redemption Grace Period has lapsed and the domain is pending purge from the registry. This state prohibits the sponsor from updating, restoring or modifying the domain. This status applies for 5 days. At the end of this period the domain is purged from the database and made available for registration.

4 GRACE PERIODS

The registry system supports 4 grace periods: add, renew, auto-renew, and transfer, described below with consideration for overlap of grace periods. States described here are additional to those above.

4.1 Add Grace Period
Length: 5 days
RGP Status: addPeriod
Allows for the no-cost cancellation of a domain registrations resulting from typing mistakes and other errors by Registrars and registrants – beginning on the creation of a domain and lasting for 5 days. When the following operations are performed during this period these rules apply:
– Delete: the sponsoring Registrar, who must have created the domain, may delete the domain and receive a refund. The domain is deleted with immediate effect. The refund is subject to the Add Grace Period Limits consensus policy. Excess deletions over 50 or 10% of creates (whichever is greater), are not subject to a refund, except in extraordinary circumstances.
– Renew: the sponsor may renew the domain but does not receive any refund for the initial registration fee. The Registrar is charged for the renewal operation. The total period for the domain is the sum of the initial period in the create and any renewal term, limited to a 10 year maximum.
– Transfer: Under ICANN policy a transfer can’t occur during the Add Grace Period or at any other time in the first 60 days after the initial registration. The registry system enforces this, rejecting such requests.
– Bulk Transfers: Under Part B of the ICANN Policy on Transfer of Registrations between Registrars, a bulk transfer can occur during the Add Grace Period. Any bulk transfer causes the Add Grace Period to not apply.
The Add Grace Period does not have any impact on other commands.

4.2 Renew Grace Period
Length: 5 days
RGP Status: renewPeriod
Allows the sponsoring Registrar to undo a renewal via the deletion of a domain – beginning on the receipt of a renewal command and lasting for 5 days. If any of the following operations are performed during this period these rules apply:
– Delete: the sponsoring Registrar, who must have initiated the renewal, may delete the domain and receive a renewal fee refund. The extension to the registration period caused by the preceding renew is reversed and unless the domain is also in the Add Grace Period, the domain enters the Redemption state. If also in the Add Grace Period it is deleted with immediate effect and availability for registration.
– Renew: the sponsoring Registrar, who must have performed the initial renew, can subsequently renew the domain again, causing a second independent Renewal Grace Period to start. The Registrar is charged for the operation and the total registration period for the domain is extended by the renewal term, limited to the 10 year maximum.
– Transfer: an approved transfer command ends the current Renew Grace Period without a refund and begins a Transfer Grace Period.
– Bulk Transfers: bulk transfers cause the Renew Grace Period to end without a refund, consequently registration periods are not changed.
The Renew Grace Period has no impact on other commands.

4.3 Auto-Renew Grace Period
Length: 45 days
RGP Status: autoRenewPeriod
Auto-Renew Grace Period allows for domains to remain in the DNS past registration expiration while giving adequate time for the sponsoring Registrar to obtain intention of renewal from the registrant.
This period begins on the expiration of the domain and lasts for 45 days. If any of the following are performed during this period these rules apply:
– Delete: the sponsoring Registrar, who must be the sponsor when the Auto-Renew Grace Period commenced, may delete the domain and receive an auto-renew fee refund. The registration period auto-renew extension is reversed and the domain enters the Redemption state.
– Renew: the sponsoring Registrar, who must be the sponsor when the auto-renew occurred, can renew the domain again causing an independent Renewal Grace Period to begin. The Registrar is charged and the registration period is extended by the renewal term, limited to the 10 year maximum.
– Transfer: an approved transfer command ends the current Auto-Renew Grace Period with a refund to the losing Registrar and begins a Transfer Grace Period. The registration period auto-renew extension is reversed and the registration is extended by the period specified in the transfer.
– Bulk Transfers: bulk transfers cause the Auto-Renew Grace Period to end without a refund consequently registration periods are not changed.
The Auto-Renew Grace Period does not have any impact on other commands.

4.4 Transfer Grace Period
Length: 5 days
RGP Status: transferPeriod
Transfer Grace Period allows the sponsoring Registrar to undo the registration period extension (due to a transfer command), via the deletion of a domain. This period begins on a transfer completion and lasts for 5 calendar days. If the following are performed during the period these rules apply:
– Delete: the sponsoring Registrar, who must have initiated the transfer, may delete the domain and receive a transfer fee refund. The extension to the registration period of the preceding transfer is reversed and the Redemption state is entered.
– Renew: the sponsoring Registrar can renew the domain thus causing an independent Renewal Grace Period to begin. The Registrar is charged and the registration period for the domain is extended by the renewal term, limited to the 10 year maximum.
– Transfer: under Part A of the ICANN Policy on Transfer of Registrations between Registrars a transfer may not occur during the 60 day period after transfer (except in special circumstances). The registry system enforces this – effects of transfer do not require consideration. Should a special situation require transfer back to the losing Registrar, this is dealt with by taking into account the specific situation. The registry system does not allow this without intervention by registry staff.
– Bulk Transfers: bulk transfers cause the Transfer Grace Period to end without a refund; consequently registration periods are not changed.
The Transfer Grace Period does not have any impact on other commands.

4.5 Redemption Grace Period
Length: 30 days
RGP Status: as described in Redemption state
Redemption Grace Period refers to the period of time the domain spends in the Redemption state, starting after a domain is deleted. The Redemption state description provides information on operations during this period.

4.6 Overlap of Grace Periods
The 4 possible overlapping grace periods are:
– Add Grace Period with 1 or more Renew Grace Periods.
– Renew Grace Period with 1 or more other Renew Grace Periods.
– Transfer Grace Period with 1 or more Renew Grace Periods.
– Auto-Renew Grace Period with 1 or more Renew Grace Periods.
These are treated independently with respect to timelines however action that is taken has the combined effects of all grace periods still current.

4.6.1 Transfer Clarification
If several billable operations, including a transfer, are performed on a domain and it is deleted in the operations’ grace periods, only those operations performed after⁄including the latest transfer are eligible for refund.

5 TRANSITIONS

5.1 Available 〉 Registered
Triggered by the receipt of a create command to register the domain. The sponsoring Registrar is charged for the creation amount. This transition begins the Add Grace Period.

5.2 Registered 〉 Pending Transfer
Triggered by the receipt of a request transfer command. The transfer must result in domain registration extension – the gaining Registrar is charged for the transfer. Requests to transfer the domain within 60 days of creation or a previous transfer are rejected. As per ‘4.4 Transfer Grace Period’, exceptions specified in ICANN’s Transfer Policy apply – dealt with individually.

5.3 Pending Transfer 〉 Registered
Triggered by 1 of 4 operations:
– Operation 1 (Cancel): during the Pending Transfer period the gaining Registrar may cancel the transfer by issuing a cancel transfer command. The gaining Registrar is refunded the transfer fee, the registration period remains unchanged and all existing grace periods at the time of transfer request remain in effect.
– Operation 2 (Reject): during the Pending Transfer period the losing Registrar may reject the transfer by issuing a reject transfer command. The gaining Registrar is refunded the transfer. The registration period remains unchanged and all grace periods existing at the time of transfer request remain in effect if not elapsed.
– Operation 3 (Approve): During the Pending Transfer period the losing Registrar may approve the transfer by issuing an approve transfer command. If the transfer was requested during the Auto-Renew Grace Period, the extension to the registration period is reversed and the losing Registrar is refunded the auto-renew. The registration period is extended by the amount specified in the transfer request. This begins the Transfer Grace Period.
– Operation 4 (Auto-Approve): If after 5 days, no action has been taken, the system approves the transfer. If the transfer was requested during the Auto-Renew Grace Period the extension to the registration period is reversed and the losing Registrar is refunded the auto-renew. The registration period is extended by the amount specified in the transfer request. This begins the Transfer Grace Period.

5.4 Registered 〉 Deleted
On receipt of a delete command if the domain is in the Add Grace Period, it is purged from the Database and immediately available for registration. Renew Grace Period may also be in effect.

5.5 Registered 〉 Redemption
On receipt of a delete command if the domain is not in the Add Grace Period, it transitions to the Redemption Period state and all grace periods in effect are considered.

5.6 Redemption 〉 Pending Restore
On receipt of a restore command if the Redemption Period has not lapsed, the domain transitions to the Pending Restore state. The domain is provisioned in the DNS. The sponsoring Registrar is charged a fee for the restore request.

5.7 Pending Restore 〉 Registered
During the Pending Restore period the sponsoring Registrar may complete the restore via a restore report containing the WhoIs information – submitted prior to the deletion, the WhoIs information at the time of the report, and the reason for the restoration.

5.8 Pending Restore 〉 Redemption
Seven calendar days after the transition to the Pending Restore state, if no restore report is received the domain transitions to the Redemption state, which begins a new redemption period. The domain is removed from the DNS. The restore has no refund.

5.9 Redemption 〉 Pending Delete
Thirty calendar days after the transition to the Redemption state, if no restore request is received the domain transitions to the Pending Delete state.

5.10 Pending Delete 〉 Deleted
Five calendar days after the transition to the Pending Delete state, the domain is removed from the Database and is immediately available for registration.

6 LOCKS

Locks may be applied to the domain to prevent specific operations occurring. The sponsoring Registrar may set the locks prefixed with ‘client’ while locks prefixed with ‘server’ are added and removed by the registry operator. Locks are added and removed independently but they can be combined to facilitate the enforcement of higher processes, such as ‘Registrar Lock’, and outcomes required as part of UDRP. All locks are compatible with EPP RFCs. The available locks are:
– clientDeleteProhibited, serverDeleteProhibited – Requests to delete the object are rejected
– clientHold, serverHold – DNS information is not published
– clientRenewProhibited, serverRenewProhibited – Requests to renew the object are rejected. Auto-renew is allowed
– clientTransferProhibited, serverTransferProhibited – Requests to transfer the object are rejected
– clientUpdateProhibited, serverUpdateProhibited – Requests to update the object are rejected, unless the update removes this status

7 SPECIAL CONSIDERATIONS

7.1 ICANN-Approved Bulk Transfers
ICANN-Approved Bulk Transfers do not follow the typical transfer lifecycle. Existing grace periods are invalidated and no refunds are credited to the losing Registrar. The prohibition of transfer period on domains created or transferred within 60 days does not apply.

7.2 Uniform Rapid Suspension
In the Uniform Rapid Suspension (URS) process, as described in the ‘gTLD Applicant Guidebook’ 11th January 2012, the following modification to the above processes is required.
Remedy allows for the addition of a year to the registration period, limited to the 10 year maximum. During this time no transform operations may be performed other than to restore the domain as allowed by Appeal. At the expiration of the registration period the domain is not automatically renewed, but proceeds to the Redemption state as per the lifecycle described above, and it is not eligible for restoration.

8 UPDATE⁄DNS

The update command does not impact the state of the domain through the Registration Lifecycle, however the command can be used to add and remove delegation information, which changes the DNS state of the domain.
A domain is required to have 2 or more nameservers published in the DNS. An update that results in a domain having less than 2 nameservers removes the domain from the DNS. An exception is when 1 nameserver remains assigned to a domain due to deletion of its other nameservers due to purge of their parent domain. The next update that modifies delegation information ends the exception and from then on the domain requires 2 nameservers be in the DNS.

9 RESOURCES

This function will be performed by ARI. ARI’s registry performs all time-based transitions automatically and enforces all other business rules – without requiring human resources for normal operation. If changes to the automatic behaviours or restrictions enforced by the policy system are required, ARI has a development team for this.
Domain Name Lifecycle aspects requiring human resources to manage are included in the ARI outsourcing include:
– Processing Add Grace Period exemptions as requested by Registrars.
– Processing restore reports provided by Registrars.
– Meeting the registry operator’s obligations under ICANN’s Transfer Dispute Policy.
– Performing exception processing in the case of approved transfers during the 60 day transfer prohibition window.
The Registration Lifecycle is designed, built, operated and supported by these ARI departments:
– Products and Consulting Team (7 staff)
– Legal, Abuse and Compliance Team (6 staff)
– Development Team (11 staff)
A detailed list of the departments, roles and responsibilities in ARI is provided as attachment ‘Q27 – ARI Background & Roles.pdf’. This attachment describes the functions of the above teams and the exact number and nature of staff within.
The number of resources required to design, build, operate and support the SRS does not vary significantly with, and is not linearly proportional to, the number or size of TLDs that ARI provides registry services to.
ARI provides registry backend services to 5 TLDs and has a wealth of experience in estimating the number of resources required to support a registry system.
Based on past experience ARI estimates that the existing staff is adequate to support a registry system that supports in excess of 50M domains. Since this TLD projects 17,648 domains, 0.04% of these resources are allocated to this TLD. See attachment ‘Q27 – Registry Scale Estimates & Resource Allocation.xlsx’ for more information.
ARI protects against loss of critical staff by employing multiple people in each role. Staff members have a primary role plus a secondary role for protection against personnel absence. Additionally ARI can scale resources as required. Additional trained resources can be added to any of the above teams with a 2 month lead time.
The Products and Consulting team is responsible for product management of the Registration Lifecycle, including working with clients and the industry to identify new features or changes required to the system. The team consists of:
– 1 Products and Consulting Manager
– 1 Product Manager
– 1 Technical Product Manager
– 4 Domain Name Industry Consultants
Most manual tasks fall to the Legal, Abuse and Compliance team, with staff experienced in development of policy for policy rich TLD environments. They have the required legal and industry background to perform this function. The team consists of:
– 1 Legal Manager
– 1 Legal Counsel
– 4 Policy Compliance Officers
The automated aspects of the Registration lifecycle are supported by ARI’s Domain Name Registry software. ARI has a development team for maintenance and improvement of the software. The team consist of:
– 1 Development Manager
– 2 Business Analysts
– 6 Developers
– 2 Quality Analysts
Information on these roles is in Resources in our response to Question 31. These resources sufficiently accommodate the needs of this TLD, and are included in ARI’s fees as described in our Financial responses.

28. Abuse Prevention and Mitigation

We have engaged ARI Registry Services (ARI) to deliver services for this TLD. ARI provide registry services for a number of TLDs including the .au ccTLD. For more background information on ARI please see the attachment ‘Q28 – ARI Background & Roles.pdf’. The Registry works closely with DotAsia Organisation (through Namesphere, as the registry front-end services provider) to develop and implement additional measures to improve abuse prevention and mitigation. DotAsia is the operator for the .ASIA gTLD and is a pioneer in the development of registry level policies to mitigate against abusive registrations.

1 INTRODUCTION

The efforts that will be undertaken in this TLD to minimise abusive registrations and other activities that have a negative impact on Internet users are described below. As described in response to #20, especially regarding the enforcement of the community purposes, an important area of such enforcement relies on the set of Abuse Prevention & Mitigation (APM) processes described here. As a TLD promoting the sustainable holistic body, mind and spiritual wellness, maintaining a highly ethical, professional and socially responsible approach to curbing abuse and illegal activities is of great importance for the registry.

For Community Compliancy Complaints (see #20e) received that indicate that the activity is of any of the following nature, the APM processes described in this section will be initiated:
- suspected illegal activities
- suspected technical exploitation of the registry or registry related resources
- suspected abuse of a domain registration that could cause harm to other domain registrations, or the security and stability of the TLD, the DNS or the Internet at large.

We will be utilising the Anti-Abuse Service of our managed registry service provider, ARI. This service includes the implementation of our comprehensive Anti-Abuse Policy. This policy, developed in consultation with ARI, clearly defines abusive behaviour and identifies particular types of abusive behaviour and the mitigation response to such behaviour.

2 OVERVIEW

We have engaged ARI to deliver registry services for this TLD. ARI will, owing to their extensive industry experience and established anti-abuse operations, implement and manage on our behalf various procedures and measures adopted to mitigate the potential for abuse, identify abuse and handle identified abuse. ARI will forward to us all matters requiring determination by the registry operator which fall beyond the scope of ARI’s Anti-Abuse Service. This is described below in the context of the implementation of our Anti-Abuse Policy.
Despite utilisation of ARI’s Anti-Abuse Service, we are nonetheless cognisant of our responsibility to minimise abusive registrations and other activities that have a negative impact on Internet users in the TLD. In recognition of this responsibility, we will play an instrumental role in overseeing the implementation of the Anti-Abuse Service by ARI. We will also have contractual commitments in the form of SLA’s in place to ensure that ARI’s delivery of the Anti-Abuse Service is aligned with our strong commitment to minimise abuse in our TLD.
That strong commitment is further demonstrated by our adoption of many of the requirements proposed in the ‘2011 Proposed Security, Stability and Resiliency Requirements for Financial TLDs’ (at http:⁄⁄www.icann.org⁄en⁄news⁄correspondence⁄aba-bits-to-beckstrom-crocker-20dec11-en.pdf) (the ‘BITS Requirements). We acknowledge that these requirements were developed by the financial services sector in relation to financial TLDs, but nevertheless believe that their adoption in this TLD (which is not financial-related) results in a more robust approach to combating abuse.
Consistent with Requirement 6 of the BITS Requirements, we will certify to ICANN on an annual basis our compliance with our Registry Agreement.
Please note that the various policies and practices that we have implemented to minimise abusive registrations and other activities that affect the rights of trademark holders are specifically described in our response to Question 29.

3 POLICY

In consultation with ARI we have developed a comprehensive Anti-Abuse Policy, which is the main instrument that captures our strategy in relation to abuse in the TLD.

3.1 Definition of Abuse
Abusive behaviour in a TLD may relate to the core domain name-related activities performed by Registrars and registries including, but not limited to:
– The allocation of registered domain names.
– The maintenance of and access to registration information.
– The transfer, deletion, and reallocation of domain names.
– The manner in which the registrant uses the domain name upon creation.
Challenges arise in attempting to define abusive behaviour in the TLD due to its broad scope. Defining abusive behaviour by reference to the stage in the domain name lifecycle in which the behaviour occurs presents difficulty given that a particular type of abuse may occur at various stages of the life cycle.
With this in mind, ARI has fully adopted the definition of abuse developed by the Registration Abuse Policies Working Group (Registration Abuse Policies Working Group Final Report 2010, at http:⁄⁄gnso.icann.org⁄issues⁄rap⁄rap-wg-final-report-29may10-en.pdf), which does not focus on any particular stage in the domain name life cycle.
Abusive behaviour in a TLD may be defined as an action that:
– causes actual and substantial harm, or is a material predicate of such harm.
– is illegal or illegitimate, or is otherwise considered contrary to the intention and design of the mission⁄purpose of the TLD.
In applying this definition the following must be noted:
1. The party or parties harmed, and the severity and immediacy of the abuse, should be identified in relation to the specific alleged abuse.
2. The term ʺharmʺ is not intended to shield a party from fair market competition.
3. A predicate is a related action or enabler. There must be a clear link between the predicate and the abuse, and justification enough to address the abuse by addressing the predicate (enabling action).
For example, WhoIs data can be used in ways that cause harm to domain name registrants, intellectual property (IP) rights holders and Internet users. Harmful actions may include the generation of spam, the abuse of personal data, IP infringement, loss of reputation or identity theft, loss of data, phishing and other cybercrime-related exploits, harassment, stalking, or other activity with negative personal or economic consequences. Examples of predicates to these harmful actions are automated email harvesting, domain name registration by proxy⁄privacy services to aid wrongful activity, support of false or misleading registrant data, and the use of WhoIs data to develop large email lists for commercial purposes. The misuse of WhoIs data is therefore considered abusive because it is contrary to the intention and design of the stated legitimate purpose of WhoIs data.

3.2 Aims and Overview of Our Anti-Abuse Policy
Our Anti-Abuse Policy will put registrants on notice of the ways in which we will identify and respond to abuse and serve as a deterrent to those seeking to register and use domain names for abusive purposes. The policy will be made easily accessible on the Abuse page of our registry website which will be accessible and have clear links from the home page along with FAQs and contact information for reporting abuse.
Consistent with Requirements 15 and 16 of the BITS Requirements, our policy:
– Defines abusive behaviour in our TLD.
– Identifies types of actions that constitute abusive behaviour, consistent with our adoption of the RAPWG definition of ‘abuse’.
– Classifies abusive behaviours based on the severity and immediacy of the harm caused.
– Identifies how abusive behaviour can be notified to us and the steps that we will take to determine whether the notified behaviour is abusive.
– Identifies the actions that we may take in response to behaviour determined to be abusive.

Our RRA will oblige all Registrars to do the following in relation to the Anti-Abuse Policy:
– comply with the Anti-Abuse Policy; and
– include in their registration agreement with each registrant an obligation for registrants to comply with the Anti-Abuse Policy and each of the following requirements:
‘operational standards, policies, procedures, and practices for the TLD established from time to time by the registry operator in a non-arbitrary manner and applicable to all Registrars, including affiliates of the registry operator, and consistent with ICANNʹs standards, policies, procedures, and practices and the registry operator’s Registry Agreement with ICANN. Additional or revised registry operator operational standards, policies, procedures, and practices for the TLD shall be effective upon thirty days notice by the registry operator to the Registrar. If there is a discrepancy between the terms required by this Agreement and the terms of the Registrar’s registration agreement, the terms of this Agreement shall supersede those of the Registrar’s registration agreement’.
Our RRA will additionally incorporate the following BITS Requirements:
– Requirement 7: Registrars must certify annually to ICANN and us compliance with ICANN’s Registrar Accreditation Agreement (RAA) our Registry-Registrar Agreement (RRA).
– Requirement 9: Registrars must provide and maintain valid primary contact information (name, email address, and phone number) on their website.
– Requirement 14: Registrars must notify us immediately regarding any investigation or compliance action, including the nature of the investigation or compliance action by ICANN or any outside party (eg law enforcement, etc.) along with the TLD impacted.
– Requirement 19: Registrars must disclose registration requirements on their website.
We will re-validate our RRAs at least annually, consistent with Requirement 10.

3.3 Anti-Abuse Policy
Our Anti-Abuse Policy is as follows:
Anti-Abuse Policy
Introduction:
The abusive registration and use of domain names in the TLD is not tolerated given that the inherent nature of such abuses creates security and stability issues for all participants in the Internet environment.
Definition of Abusive Behaviour:
Abusive behaviour is an action that:
– causes actual and substantial harm, or is a material predicate of such harm; or
– is illegal or illegitimate, or is otherwise considered contrary to the intention and design of the mission⁄purpose of the TLD.
A ‘predicate’ is an action or enabler of harm.
‘Material’ means that something is consequential or significant.
Examples of abusive behaviour falling within this definition:
– Spam: the use of electronic messaging systems to send unsolicited bulk messages. The term applies to e-mail spam and similar abuses such as instant messaging spam, mobile messaging spam, and the spamming of web sites and Internet forums. An example, for purposes of illustration, would be the use of email in denial-of-service attacks.
– Phishing: the use of a fraudulently presented web site to deceive Internet users into divulging sensitive information such as usernames, passwords or financial data.
– Pharming: the redirecting of unknowing users to fraudulent web sites or services, typically through DNS hijacking or poisoning, in order to deceive Internet users into divulging sensitive information such as usernames, passwords or financial data.
– Wilful distribution of malware: the dissemination of software designed to infiltrate or cause damage to devices or to collect confidential data from users without the owner’s informed consent.
– Fast Flux hosting: the use of DNS to frequently change the location on the Internet to which the domain name of an Internet host or nameserver resolves in order to disguise the location of web sites or other Internet services, or to avoid detection and mitigation efforts, or to host illegal activities. Fast flux hosting may only be used with prior permission of the registry operator.
– Botnet command and control: the development and use of a command, agent, motor, service or software which is implemented: (1) to remotely control the computer or computer system of an Internet user without their knowledge or consent, (2) to generate direct denial of service (DDOS) attacks.
– Distribution of child pornography: the storage, publication, display and⁄or dissemination of pornographic materials depicting individuals under the age of majority in the relevant jurisdiction.
– Illegal access to other computers or networks: the illegal accessing of computers, accounts, or networks belonging to another party, or attempt to penetrate security measures of another individual’s system (hacking); also, any activity that might be used as a precursor to an attempted system penetration.

Detection of Abusive Behaviour:
Abusive behaviour in the TLD may be detected in the following ways:
– By us through our on-going monitoring activities and industry participation.
– By third parties (general public, law enforcement, government agencies, industry partners) through notification submitted to the abuse point of contact on our website, or industry alerts.
Reports of abusive behaviour will be notified immediately to the Registrar of record.

Handling of abusive behaviour:
When abusive behaviour is detected in our TLD through notification by a third party, a preliminary assessment will be performed in order to determine whether the notification is legitimately made. Applying the definitions of types of abusive behaviours identified in this policy, we will classify each incidence of legitimately reported abuse into one of two categories based on the probable severity and immediacy of harm to registrants and Internet users. These categories are provided below and are defined by reference to the action that may be taken by us. The examples of types of abusive behaviour falling within each category are illustrative only.
Category 1:
Probable Severity or Immediacy of Harm: Low
Examples of types of abusive behaviour: Spam, Malware
Mitigation steps:
1. Investigate
2. Notify registrant
Category 2:
Probable Severity or Immediacy of Harm: Medium to High
Examples of types of abusive behaviour: Fast Flux Hosting, Phishing, Illegal Access to other Computers or Networks, Pharming, Botnet command and control
Mitigation steps:
1. Suspend domain name
2. Investigate
3. Restore or terminate domain name
In the event that we receive specific instructions regarding a domain name from a law enforcement agency, government or quasi-governmental agency utilising the expedited process for such agencies, our mitigation steps will be in accordance with those instructions provided that they do not result in the contravention of applicable law. In addition, we will take all reasonable efforts to notify law enforcement agencies of abusive behaviour in our TLD which we believe may constitute evidence of a commission of a crime, eg distribution of child pornography.
Note that these expected actions are intended to provide a guide to our response to abusive behaviour rather than any guarantee that a particular action will be taken.
The identification of abusive behaviour in the TLD, as defined above, shall give us the right, but not the obligation, to take such actions in accordance with the following text in the RRA, which provides that the registry operator:
‘reserves the right to deny, cancel or transfer any registration or transaction, or place any domain name(s) on registry lock, hold or similar status, or instruct Registrars to take such an action as we deem necessary in our discretion to;
1. protect the integrity and stability of the registry;
2. comply with any applicable laws, government rules or requirements, requests of law enforcement, or dispute resolution process;
3. avoid any liability, civil or criminal, on the part of the registry operator, as well as its affiliates, subsidiaries, officers, directors, and employees, per the terms of the registration agreement; and
4. correct mistakes made by the registry operator or any Registrar in connection with a domain name registration.
We reserve the right to place upon registry lock, hold or similar status a domain name during resolution of a dispute.
We also reserve the right to deny registration of a domain name to a registrant who has repeatedly engaged in abusive behaviour in our TLD or any other TLD.
Registrars only and not Resellers may offer proxy registration services to private individuals using the domain name for non-commercial purposes.
We may amend or otherwise modify this policy to keep abreast of changes in consensus policy or new and emerging types of abusive behaviour in the Internet.
Registrar’s failure to comply with this Anti-Abuse Policy shall constitute a material breach of the RRA, and shall give rise to the rights and remedies available to us under the RRA.

4 ABUSE PREVENTION AND MITIGATION

This section describes the implementation of our abuse related processes regarding:
– Building awareness of the Anti-Abuse Policy.
– Mitigating the potential for abusive behaviour.
– Identifying abusive behaviour.
– Handling abusive behaviour.

4.1. Awareness of Policy
The Anti-Abuse Policy will be published on the Abuse page of our registry website, which will be accessible and have clear links from the home page. In addition, the URL to the Abuse page will be included in all email correspondence to the registrant, thereby placing all registrants on notice of the applicability of the Anti-Abuse Policy to all domain names registered in our TLD. The Abuse page will, consistent with Requirement 8 of the BITS Requirements, provide registry contact information (name, email address, and phone number) to enable the public to communicate with us about TLD policies. The Abuse page will emphasise and evidence our commitment to combating abusive registrations by clearly identifying what our policy on abuse is and what effect our implementation of the policy may have on registrants. We anticipate that this clear message, which communicates our commitment to combating abusive registrations, will serve to minimise abusive registrations in our TLD.

4.2 Pre-emptive – Mitigating of the Potential for Abuse
The following practices and procedures will be adopted to mitigate the potential for abusive behaviour in our TLD.

4.2.1 ICANN Prescribed Measures
In accordance with our obligations as a registry operator, we will comply with all requirements in the ‘gTLD Applicant Guidebook’. In particular, we will comply with the following measures prescribed by ICANN which serve to mitigate the potential for abuse in the TLD:
– DNSSEC deployment, which reduces the opportunity for pharming and other man-in-the-middle attacks. We will encourage Registrars and Internet Service Providers to deploy DNSSEC capable resolvers in addition to encouraging DNS hosting providers to deploy DNSSEC in an easy-to-use manner in order to facilitate deployment by registrants. DNSSEC deployment is further discussed in the context of our response to Question 43.
– Prohibition on Wild Carding as required by section 2.2 of Specification 6 of the Registry Agreement.
– Removal of Orphan Glue records (discussed below in ‎‘4.2.8 Orphan Glue Record Management’).

4.2.2 Increasing Registrant Security Awareness
In accordance with our commitment to operating a secure and reliable TLD, we will attempt to improve registrant awareness of the threats of domain name hijacking, registrant impersonation and fraud, and emphasise the need for and responsibility of registrants to keep registration (including WhoIs) information accurate. Awareness will be raised by:
– Publishing the necessary information on the Abuse page of our registry website in the form of videos, presentations and FAQ’s.
– Developing and providing to registrants and resellers Best Common Practices that describe appropriate use and assignment of domain auth Info codes and risks of misuse when the uniqueness property of this domain name password is not preserved.
The increase in awareness renders registrants less susceptible to attacks on their domain names owing to the adoption of the recommended best practices thus serving to mitigate the potential for abuse in the TLD. The clear responsibility on registrants to provide and maintain accurate registration information (including WhoIs) further serves to minimise the potential for abusive registrations in the TLD.

4.2.3 Mitigating the Potential for Abusive Registrations that Affect the Legal Rights of Others
Many of the examples of abusive behaviour identified in our Anti-Abuse Policy may affect the rights of trademark holders. While our Anti-Abuse Policy addresses abusive behaviour in a general sense, we have additionally developed specific policies and procedures to combat behaviours that affect the rights of trademark holders at start-up and on an ongoing basis. These include the implementation of a trademark claims service and a sunrise registration service at start-up and implementation of the UDRP, URS and PDDRP on an ongoing basis. The implementation of these policies and procedures serves to mitigate the potential for abuse in the TLD by ensuring that domain names are allocated to those who hold a corresponding trademark.
These policies and procedures are described in detail in our response to Question 29.

4.2.4 Safeguards Against Allowing for Unqualified Registrations
The eligibility restrictions for this TLD are outlined in our response to Question 18.
Eligibility restrictions will be implemented contractually through our RRA, which will require Registrars to include the following in their Registration Agreements:
– Registrant warrants that it satisfies eligibility requirements.
Where applicable, eligibility restrictions will be enforced through the adoption of the Charter Eligibility Dispute Resolution Policy or a similar policy, and Registrars will be obliged to require in their registration agreements that registrants agree to be bound by such policy and acknowledge that a registration may be cancelled in the event that a challenge against it under such policy is successful.
Providing an administrative process for enforcing eligibility criteria and taking action when notified of eligibility violations mitigates the potential for abuse. This is achieved through the risk of cancellation in the event that it is determined in a challenge procedure that eligibility criteria are not satisfied.

4.2.5 Registrant Disqualification
As specified in our Anti-Abuse Policy, we reserve the right to deny registration of a domain name to a registrant who has repeatedly engaged in abusive behaviour in our TLD or any other TLD.
Registrants, their agents or affiliates found through the application of our Anti-Abuse Policy to have repeatedly engaged in abusive registration will be disqualified from maintaining any registrations or making future registrations. This will be triggered when our records indicate that a registrant has had action taken against it an unusual number of times through the application of our Anti-Abuse Policy. Registrant disqualification provides an additional disincentive for qualified registrants to maintain abusive registrations in that it puts at risk even otherwise non-abusive registrations, through the possible loss of all registrations.
In addition, nameservers that are found to be associated only with fraudulent registrations will be added to a local blacklist and any existing or new registration that uses such fraudulent NS record will be investigated.
The disqualification of ‘bad actors’ and the creation of blacklists mitigates the potential for abuse by preventing individuals known to partake in such behaviour from registering domain names.

4.2.6 Restrictions on Proxy Registration Services
Whilst it is understood that implementing measures to promote WhoIs accuracy is necessary to ensure that the registrant may be tracked down, it is recognised that some registrants may wish to utilise a proxy registration service to protect their privacy. In the event that Registrars elect to offer such services, the following conditions apply:
– Proxy registration services may only be offered by Registrars and NOT resellers.
– Registrars must ensure that the actual WhoIs data is obtained from the registrant and must maintain accurate records of such data.
– Registrars must provide Law Enforcement Agencies (LEA) with the actual WhoIs data upon receipt of a verified request.
– Proxy registration services may only be made available to private individuals using the domain name for non-commercial purposes.
These conditions will be implemented contractually by inclusion of corresponding clauses in the RRA as well as being published on the Abuse page of our registry website. Individuals and organisations will be encouraged through our Abuse page to report any domain names they believe violate the above restrictions, following which appropriate action may be taken by us. Publication of these conditions on the Abuse page of our registry website ensures that registrants are aware that despite utilisation of a proxy registration service, actual WhoIs information will be provided to LEA upon request in order to hold registrants liable for all actions in relation to their domain name. The certainty that WhoIs information relating to domain names which draw the attention of LEA will be disclosed results in the TLD being less attractive to those seeking to register domain names for abusive purposes, thus mitigating the potential for abuse in the TLD.

4.2.7 Registry Lock
Certain mission-critical domain names such as transactional sites, email systems and site supporting applications may warrant a higher level of security. Whilst we will take efforts to promote the awareness of security amongst registrants, it is recognised that an added level of security may be provided to registrants by ‘registry locking’ the domain name thereby prohibiting any updates at the registry operator level. The registry lock service will be offered to all Registrars who may request this service on behalf of their registrants in order to prevent unintentional transfer, modification or deletion of the domain name. This service mitigates the potential for abuse by prohibiting any unauthorised updates that may be associated with fraudulent behaviour. For example, an attacker may update nameservers of a mission-critical domain name, thereby redirecting customers to an illegitimate website without actually transferring control of the domain name.
Upon receipt of a list of domain names to be placed on registry lock by an authorised representative from a Registrar, ARI will:
1. Validate that the Registrar is the Registrar of record for the domain names.
2. Set or modify the status codes for the names submitted to serverUpdateProhibited, serverDeleteProhibited and⁄or serverTransferProhibited depending on the request.
3. Record the status of the domain name in the Shared Registration System (SRS).
4. Provide a monthly report to Registrars indicating the names for which the registry lock service was provided in the previous month.

4.2.8 Orphan Glue Record Management
The ARI registry SRS database does not allow orphan records. Glue records are removed when the delegation point NS record is removed. Other domains that need the glue record for correct DNS operation may become unreachable or less reachable depending on their overall DNS service architecture. It is the registrant’s responsibility to ensure that their domain name does not rely on a glue record that has been removed and that it is delegated to a valid nameserver. The removal of glue records upon removal of the delegation point NS record mitigates the potential for use of orphan glue records in an abusive manner.

4.2.9 Promoting WhoIs Accuracy
Inaccurate WhoIs information significantly hampers the ability to enforce policies in relation to abuse in the TLD by allowing the registrant to remain anonymous. In addition, LEAs rely on the integrity and accuracy of WhoIs information in their investigative processes to identify and locate wrongdoers. In recognition of this, we will implement a range of measures to promote the accuracy of WhoIs information in our TLD including:
– Random monthly audits: registrants of randomly selected domain names are contacted by telephone using the provided WhoIs information by a member of the ARI Abuse and Compliance Team in order to verify all WhoIs information. Where the registrant is not contactable by telephone, alternative contact details (email, postal address) will be used to contact the registrant, who must then provide a contact number that is verified by the member of the ARI Policy Compliance team. In the event that the registrant is not able to be contacted by any of the methods provided in WhoIs, the domain name will be cancelled following five contact attempts or one month after the initial contact attempt (based on the premise that a failure to respond is indicative of inaccurate WhoIs information and is grounds for terminating the registration agreement).
– Semi-annual audits: to identify incomplete WhoIs information. Registrants will be contacted using provided WhoIs information and requested to provide missing information. In the event that the registrant fails to provide missing information as requested, the domain name will be cancelled following five contact attempts or one month after the initial contact attempt.
– Email reminders: to update WhoIs information to be sent to registrants every 6 months.
– Reporting system: a web-based submission service for reporting WhoIs accuracy issues available on the Abuse page of our registry website.
– Analysis of registry data: to identify patterns and correlations indicative of inaccurate WhoIs (eg repetitive use of fraudulent details).
Registrants will continually be made aware, through the registry website and email reminders, of their responsibility to provide and maintain accurate WhoIs information and the ramifications of a failure to do so or respond to requests to do so, including termination of the Registration Agreement.
The measures to promote WhoIs accuracy described above strike a balance between the need to maintain the integrity of the WhoIs service, which facilitates the identification of those taking part in illegal or fraudulent behaviour, and the operating practices of the registry operator and Registrars, which aim to offer domain names to registrants in an efficient and timely manner.
Awareness by registrants that we will actively take steps to maintain the accuracy of WhoIs information mitigates the potential for abuse in the TLD by discouraging abusive behaviour given that registrants may be identified, located and held liable for all actions in relation to their domain name.

4.3 Reactive – Identification
The methods by which abusive behaviour in our TLD may be identified are described below. These include detection by ARI and notification from third parties. These methods serve to merely identify and not determine whether abuse actually exists. Upon identification of abuse, the behaviour will be handled in accordance with ‘4.4 Abuse Handling’.
Any abusive behaviour identified through one of the methods below will, in accordance with Requirement 13 of the BITS Requirements, be notified immediately to relevant Registrars.

4.3.1 Detection – Analysis of Data
ARI will routinely analyse registry data in order to identify abusive domain names by searching for behaviours typically indicative of abuse. The following are examples of the data variables that will serve as indicators of a suspicious domain name and may trigger further action by the ARI Abuse and Compliance Team:
– Unusual Domain Name Registration Practices: practices such as registering hundreds of domains at a time, registering domains which are unusually long or complex or include an obvious series of numbers tied to a random word (abuse40, abuse50, abuse60) may, when considered as a whole, be indicative of abuse.
– Domains or IP addresses identified as members of a Fast Flux Service Network (FFSN): ARI uses the formula developed by the University of Mannheim and tested by participants of the Fast Flux PDP WG to determine members of this list. IP addresses appearing within identified FFSN domains, as either NS or A records shall be added to this list.
– An Unusual Number of Changes to the NS record: the use of fast-flux techniques to disguise the location of web sites or other Internet services, to avoid detection and mitigation efforts, or to host illegal activities is considered abusive in the TLD. Fast flux techniques use DNS to frequently change the location on the Internet to which the domain name of an Internet host or nameserver resolves. As such an unusual number of changes to the NS record may be indicative of the use of fast-flux techniques given that there is little, if any, legitimate need to change the NS record for a domain name more than a few times a month.
– Results of WhoIs audits: The audits conducted to promote WhoIs accuracy described above are not limited to serving that purpose but may also be used to identify abusive behaviour given the strong correlation between inaccurate WhoIs data and abuse.
– Analysis of cross-validation of registrant WhoIs data against WhoIs data known to be fraudulent.
– Analysis of Domain Names belonging to a registrant subject to action under the Anti-Abuse Policy: in cases where action is taken against a registrant through the application of the Anti-Abuse Policy, we will also investigate other domain names by the same registrant (same name, nameserver IP address, email address, postal address etc).

4.3.2 Abuse Reported by Third Parties
Whilst we are confident in our abilities to detect abusive behaviour in the TLD owing to our robust ongoing monitoring activities, we recognise the value of notification from third parties to identify abuse. To this end, we will incorporate notifications from the following third parties in our efforts to identify abusive behaviour:
– Industry partners through ARI’s participation in industry forums which facilitate the sharing of information.
– LEA through a single abuse point of contact (our Abuse page on the registry website, as discussed in detail below) and an expedited process (described in detail in ‘4.4 Abuse Handling’) specifically for LEA.
– Members of the general public through a single abuse point of contact (our Abuse page on the registry website).

4.3.2.1 Industry Participation and Information Sharing
ARI is a member of the Registry Internet Safety Group (RISG), whose mission is to facilitate data exchange and promulgate best practices to address Internet identity theft, especially phishing and malware distribution. In addition, ARI coordinates with the Anti-Phishing Working Group (APWG) and other DNS abuse organisations and is subscribed to the NXdomain mailing list. ARI’s strong participation in the industry facilitates collaboration with relevant organisations on abuse-related issues and ensures that ARI is responsive to new and emerging domain name abuses.
The information shared as a result of this industry participation will be used to identify domain names registered or used for abusive purposes. Information shared may include a list of registrants known to partake in abusive behaviour in other TLDs. Whilst presence on such lists will not constitute grounds for registrant disqualification, ARI will investigate domain names registered to those listed registrants and take action in accordance with the Anti-Abuse Policy. In addition, information shared regarding practices indicative of abuse will facilitate detection of abuse by our own monitoring activities.

4.3.2.2 Single Abuse Point of Contact on Website
In accordance with section 4.1 of Specification 6 of the Registry Agreement, we will establish a single abuse point of contact (SAPOC) responsible for addressing and providing a timely response to abuse complaints concerning all names registered in the TLD through all Registrars of record, including those involving a reseller. Complaints may be received from members of the general public, other registries, Registrars, LEA, government and quasi-governmental agencies and recognised members of the anti-abuse community.
The SAPOC’s accurate contact details (email and mailing address as well as a primary contact for handling inquiries related to abuse in the TLD) will be provided to ICANN and published on the Abuse page of our registry website, which will also include:
– All public facing policies in relation to the TLD, including the Anti-Abuse Policy.
– A web-based submission service for reporting inaccuracies in WhoIs information.
– Registrant Best Practices.
– Conditions that apply to proxy registration services and direction to the SAPOC to report domain names that violate the conditions.
As such, the SAPOC may receive complaints regarding a range of matters including but not limited to:
– Violations of the Anti-Abuse Policy.
– Inaccurate WhoIs information.
– Violation of the restriction of proxy registration services to individuals.
The SAPOC will be the primary method by which we will receive notification of abusive behaviour from third parties. It must be emphasised that the SAPOC will be the initial point of contact following which other processes will be triggered depending on the identity of the reporting organisation. Accordingly, separate processes for identifying abuse exist for reports by LEA⁄government and quasi-governmental agencies and members of the general public. These processes will be described in turn below.

4.3.2.2.1 Notification by LEA of Abuse
We recognise that LEA, governmental and quasi-governmental agencies may be privy to information beyond the reach of others which may prove critical in the identification of abusive behaviour in our TLD. As such, we will provide an expedited process which serves as a channel of communication for LEA, government and quasi-governmental agencies to, amongst other things, report illegal conduct in connection with the use of the TLD.
The process will involve prioritisation and prompt investigation of reports identifying abuse from those organisations. The steps in the expedited process are summarised as follows:
1. ARI’s Abuse and Compliance Team will identify relevant LEA, government and quasi-governmental agencies who may take part in the expedited process, depending on the mission⁄purpose and jurisdiction of our TLD. A means of verification will be established with each of the identified agencies in order to verify the identity of a reporting agency utilising the expedited process.
2. We will publish contact details on the Abuse page of the registry website for the SAPOC to be utilised by only those taking part in the expedited process.
3. All calls to this number will be responded to by the ARI Service Desk on a 24⁄7 basis. All calls will result in the generation of a ticket in ARI’s case management system (CMS).
4. The identity of the reporting agency will be identified using the established means of verification (ARIʹs Security Policy has strict guidelines regarding the verification of external parties over the telephone). If no means of verification has been established, the report will be immediately escalated to the ARI Abuse and Compliance Team. Results of verification will be recorded against the relevant CMS ticket.
6. Upon verification of the reporting agency, the ARI Service Desk will obtain the details necessary to adequately investigate the report of abusive behaviour in the TLD. This information will be recorded against the relevant CMS ticket.
7. Reports from verified agencies may be provided in the Incident Object Description Exchange Format (IODEF) as defined in RFC 5070. Provision of information in the IODEF will improve our ability to resolve complaints by simplifying collaboration and data sharing.
8. Tickets will then be forwarded to the ARI Abuse and Compliance Team to be dealt with in accordance with ‘4.4 Abuse Handling’.

4.3.2.2.2 Notification by General Public of Abuse
Abusive behaviour in the TLD may also be identified by members of the general public including but not limited to other registries, Registrars or security researchers. The steps in this notification process are summarised as follows:
1. We will publish contact details on the Abuse page of the registry website for the SAPOC (note that these contact details are not the same as those provided for the expedited process).
2. All calls to this number will be responded to by the ARI Service Desk on a 24⁄7 basis. All calls will result in the generation of a CMS ticket.
3. The details of the report identifying abuse will be documented in the CMS ticket using a standard information gathering template.
4. Tickets will be forwarded to the ARI Abuse and Compliance Team, to be dealt with in accordance with ‎‘4.4 Abuse Handling’.

4.4 Abuse Handling
Upon being made aware of abuse in the TLD, whether by ongoing monitoring activities or notification from third parties, the ARI Abuse and Compliance Team will perform the following functions:

4.4.1 Preliminary Assessment and Categorisation
Each report of purported abuse will undergo an initial preliminary assessment by the ARI Abuse and Compliance Team to determine the legitimacy of the report. This step may involve simply visiting the offending website and is intended to weed out spurious reports, and will not involve the in-depth investigation needed to make a determination as to whether the reported behaviour is abusive.
Where the report is assessed as being legitimate, the type of activity reported will be classified as one of the types of abusive behaviour as found in the Anti-Abuse Policy by the application of the definitions provided. In order to make this classification, the ARI Abuse and Compliance Team must establish a clear link between the activity reported and the alleged type of abusive behaviour such that addressing the reported activity will address the abusive behaviour.
While we recognise that each incident of abuse represents a unique security threat and should be mitigated accordingly, we also recognise that prompt action justified by objective criteria are key to ensuring that mitigation efforts are effective. With this in mind, we have categorised the actions that we may take in response to various types of abuse by reference to the severity and immediacy of harm. This categorisation will be applied to each validated report of abuse and actions will be taken in accordance with the table below. It must be emphasised that the actions to mitigate the identified type of abuse in the table are merely intended to provide a rough guideline and may vary upon further investigation.
Category 1
Probable Severity or Immediacy of Harm: Low
Examples of types of abusive behaviour: Spam, Malware
Mitigation steps:
1. Investigate
2. Notify registrant
Category 2
Probable Severity or Immediacy of Harm: Medium to High
Examples of types of abusive behaviour: Fast Flux Hosting, Phishing, Illegal Access to other Computers or Networks, Pharming, Botnet command and control
Mitigation steps:
1. Suspend domain name
2. Investigate
3. Restore or terminate domain name
The mitigation steps for each category will now be described:

4.4.2 Investigation – Category 1
Types of abusive behaviour that fall into this category include those that represent a low severity or immediacy of harm to registrants and Internet users. These generally include behaviours that result in the dissemination of unsolicited information or the publication of illegitimate information. While undesirable, these activities do not generally present such an immediate threat as to justify suspension of the domain name in question. We will contact the registrant to instruct that the breach of the Anti-Abuse Policy be rectified. If the ARI Abuse and Compliance Team’s investigation reveals that the severity or immediacy of harm is greater than originally anticipated, the abusive behaviour will be escalated to Category 2 and mitigated in accordance with the applicable steps. These are described below. The assessment made and actions taken will be recorded against the relevant CMS ticket.

4.4.3 Suspension – Category 2
Types of abusive behaviour that fall into this category include those that represent a medium to high severity or immediacy of harm to registrants and Internet users. These generally include behaviours that result in intrusion into other computers’ networks and systems or financial gain by fraudulent means. Following notification of the existence of such behaviours, the ARI Abuse and Compliance Team will suspend the domain name pending further investigation to determine whether the domain name should be restored or cancelled. Cancellation will result if, upon further investigation, the behaviour is determined to be one of the types of abuse defined in the Anti-Abuse Policy. Restoration of the domain name will result where further investigation determines that abusive behaviour, as defined by the Anti-Abuse Policy, does not exist. Due to the higher severity or immediacy of harm attributed to types of abusive behaviour in this category, ARI will, in accordance with their contractual commitment to us in the form of SLA’s, carry out the mitigation response within 24 hours by either restoring or cancelling the domain name. The assessment made and actions taken will be recorded against the relevant CMS ticket.

Phishing is considered to be a serious violation of the Anti-Abuse Policy owing to its fraudulent exploitation of consumer vulnerabilities for the purposes of financial gain. Given the direct relationship between phishing uptime and extent of harm caused, we recognise the urgency required to execute processes that handle phish domain termination in a timely and cost effective manner. Accordingly, the ARI Abuse and Compliance Team will prioritise all reports of phishing from brand owners, anti-phishing providers or otherwise and carry out the appropriate mitigation response within 12 hours in accordance with the SLA’s in place between us and ARI. In addition, since a majority of phish domains are subdomains, we believe it is necessary to ensure that subdomains do not represent an unregulated domain space to which phishers are known to gravitate. Regulation of the subdomain space is achieved by holding the registrant of the parent domain liable for any actions that may occur in relation to subdomains. In reality, this means that where a subdomain determined to be used for phishing is identified, the parent domain may be suspended and possibly cancelled, thus effectively neutralising every subdomain hosted on the parent. In our RRA we will require that Registrars ensure that their Registration Agreements reflect our ability to address phish subdomains in this manner.

4.4.4 Executing LEA Instructions
We understand the importance of our role as a registry operator in addressing consumer vulnerabilities and are cognisant of our obligations to assist LEAs, government and quasi-governmental agencies in the execution of their responsibilities. As such, we will make all reasonable efforts to ensure the integration of these agencies into our processes for the identification and handling of abuse by, amongst other things:
1. Providing expedited channels of communication (discussed above).
2. Notifying LEA of abusive behaviour believed to constitute evidence of a commission of a crime eg distribution of child pornography.
3. Sharing all available information upon request from LEA utilising the expedited process, including results of our investigation.
4. Providing bulk WhoIs information upon request from LEA utilising the expedited process.
5. Acting on instructions from a verified reporting agency.
It is anticipated that these actions will assist agencies in the prevention, detection, investigation, prosecution or punishment of criminal offences or breaches of laws imposing penalties. The relevant agencies are not limited to those enforcing criminal matters but may also include those enforcing civil matters in order to eliminate consumer vulnerabilities.
Upon notification of abusive behaviour by LEA, government or quasi– governmental agencies through the expedited process and verification of the reporting agency, a matter will be immediately communicated to us for our consideration. If we do not instruct ARI to refer the matter to us for our resolution, the CMS ticket will be forwarded to the ARI Abuse and Compliance Team, which will take one of the following actions:
1. The reported behaviour will be subject to preliminary assessment and categorisation as described above. The reported behaviour will then be mitigated based on the results of the categorisation. A report describing the manner in which the notification from the agency was handled will be provided to the agency within 24 hours. This report will be recorded against the relevant CMS ticket.
OR
2. Where specific instructions are received from the reporting agency in the required format, ARI will act in accordance with those instructions provided that they do not result in the contravention of applicable law. ARI will, in accordance with their contractual commitment to us in the form of SLA’s, execute such instructions within 12 hours. The following criteria must be satisfied by the reporting agency at this stage:
a. The request must be made in writing to ARI using a Pro Forma document on the agency’s letterhead. The Pro Forma document will be sent to the verified agency upon request.
b. The Pro Forma document must be delivered to ARI by fax.
c. The Pro Forma document must:
i. Describe in sufficient detail the actions the agency seeks ARI to take.
ii. Provide the domain name⁄s affected.
iii. Certify that the agency is an ‘enforcement body’ for the purposes of the Privacy Act 1988 (Cth) or local equivalent.
iv. Certify that the requested actions are required for the investigation and⁄or enforcement of relevant legislation which must be specified.
v. Certify that the requested actions are necessary for the agency to effectively carry out its functions.
Following prompt execution of the request, a report will be provided to the agency in a timely manner. This report will be recorded against the relevant CMS ticket.
Finally, whilst we do not anticipate the occurrence of a security situation owing to our robust systems and processes deployed to combat abuse, we are aware of the availability of the Expedited Registry Security Request Process to inform ICANN of a present or imminent security situation and to request a contractual waiver for actions we might take or have taken to mitigate or eliminate the security concern.

5 RESOURCES

This function will be performed by ARI. Abuse services are supported by the following departments:

– Abuse and Compliance Team (6 staff)
– Development Team (11 staff)
– Service Desk (14 staff)

A detailed list of the departments, roles and responsibilities in ARI is provided as attachment ‘Q28 – ARI Background & Roles.pdf’. This attachment describes the functions of the above teams and the exact number and nature of staff within.
The number of resources required to design, build, operate and support the SRS does not vary significantly with, and is not linearly proportional to, the number or size of TLDs that ARI provides registry services to.
ARI provides registry backend services to 5 TLDs and has a wealth of experience in estimating the number of resources required to support a registry system.
Based on past experience ARI estimates that the existing staff is adequate to support a registry system that supports in excess of 50M domains. Since this TLD projects 17,648 domains, 0.04% of these resources are allocated to this TLD. See attachment ‘Q28 – Registry Scale Estimates & Resource Allocation.xlsx’ for more information.
ARI protects against loss of critical staff by employing multiple people in each role. Staff members have a primary role plus a secondary role for protection against personnel absence. Additionally ARI can scale resources as required.

ARI’s Anti-Abuse Service serves to prevent and mitigate abusive behaviour in the TLD as well as activities that may infringe trademarks. These responsibilities will be undertaken by three teams. ARI’s Development Team will be responsible for developing the technical platforms and meeting technical requirements needed to implement the procedures and measures adopted to mitigate the potential for abuse, identify abuse and handle identified abuse. ARI’s Abuse and Compliance Team will be responsible for the ongoing implementation of measures to minimise abusive registrations and other activities that have a negative impact on Internet users. ARI’s Service Desk will be responsible for responding to reports of abuse received through the abuse point of contact on the registry’s website and logging these in a ticket in ARI’s case management system.
The responsibilities of these teams relevant to the initial implementation and ongoing maintenance of our measures to minimise abusive registrations and other activities that affect the rights of trademark holders are described in our response to Question 29.
All of the responsibilities undertaken by ARI’s Development Team, Abuse and Compliance Team, and Service Desk are inclusive in ARI’s Managed TLD Registry services fee, which is accounted for as an outsourcing cost in our response to Question 47. The resources needs of these teams have been determined by applying the conservative growth projections for our TLD (which are identified in our response to Question 48) to the team’s responsibilities at start-up and on an ongoing basis.

5.1 ARI Development Team
All tools and systems needed to support the initial and ongoing implementation of measures adopted to mitigate the potential for abuse, identify abuse and handle identified abuse will be developed and maintained by ARI. ARI has a software development department dedicated to this purpose which will ensure that the tools are fit for purpose and adjusted as requirements change.
ARI’s Development Team participate actively in the industry; this facilitates collaboration with relevant organisations on abuse related issues and ensures that the ARI Development Team is responsive to new and emerging domain name abuses and the tools and systems required to be built to address these abuses. This team consists of:
– 1 Development Manager
– 2 Business Analysts
– 6 Developers
– 2 Quality Analysts

5.2 ARI Abuse and Compliance Team
ARI’s Abuse and Compliance Team will be staffed by six full-time equivalent positions. These roles will entail the following:
Policy Compliance Officers: A principal responsibility of the Policy Compliance Officers will be handling notifications of abuse through the SAPOC. This will involve managing the expedited process, identifying and categorising suspected abuse according to our Anti-Abuse Policy, and carrying out the appropriate mitigation response for all categorised abuses. When abuse is identified, Policy Compliance Officers will investigate other domain names held by a registrant whose domain name is subject to a mitigation response. They will maintain a list of and disqualify registrants found to have repeatedly engaged in abusive behaviour. They will also be responsible for analysing registry data in search of behaviours indicative of abuse, reviewing industry lists in search of data that may identify abuse in the TLD.
Another key responsibility of Policy Compliance Officers will be implementing measures to promote WhoIs accuracy (including managing and addressing all reports of inaccurate WhoIs information received from the web submission service) and verifying the physical address provided by a registrant against various databases for format and content requirements for the region.
Policy Compliance Officers will act on the instructions of verified LEA and Dispute Resolution Providers and participate in ICANN and industry groups involved in the promulgation of policies and best practices to address abusive behaviour. They will escalate complaints and issues to the Legal Manager when necessary and communicate with all relevant stakeholders (Registrars, registrants, LEA, general public) as needed in fulfilling these responsibilities. This role will be provided on a 24⁄7 basis, supported outside of ordinary business hours by ARI’s Service Desk.
Policy Compliance Officers will be required to have the following skills⁄qualifications: customer service⁄fault handling experience, comprehensive knowledge of abusive behaviour in a TLD and related policies, Internet industry knowledge, relevant post-secondary qualification, excellent communication and professional skills, accurate data entry skills, high-level problem solving skills, and high-level computer skills.
Legal Manager: The Legal Manager will be responsible for handling all potential disputes arising in connection with the implementation of ARI’s Anti-Abuse service and related policies. This will involve assessing escalated complaints and issues, liaising with Legal Counsel and the registry operator, resolving disputes and communicating with all relevant stakeholders (Registrars, registrants, LEA, general public) as needed in fulfilling these responsibilities. The Legal Manager will be responsible for forwarding all matters requiring determination by the registry operator which fall outside the scope of ARI’s Anti-Abuse functions. The Legal Manager will be required to have the following skills⁄qualifications: legal background (in particular, intellectual property⁄information technology law) or experience with relevant tertiary or post-graduate qualifications, dispute resolution experience, Internet industry experience, strong negotiation skills, excellent communication and professional skills, good computer skills, high-level problem solving skills.
Legal Counsel: A qualified lawyer who will be responsible for all in-house legal advice, including responding to LEA and dealing with abusive behaviour.
The team consists of:
– 4 Policy Compliance Officers
– 1 Legal Manager
– 1 Legal Counsel

5.3 ARI Service Desk
ARI’s Service Desk will be staffed by 14 full-time equivalent positions. Responsibilities of Service Desk relevant to ARI’s Anti-Abuse Service include the following: responding to notifications of abuse through the abuse point of contact and expedited process for LEA, logging notifications as a ticket in ARI’s case management system, notifying us of a report received through the expedited process for LEA, government and quasi-governmental agencies, and forwarding tickets to ARI’s Abuse and Compliance team for resolution in accordance with the Anti-Abuse Policy.
For more information on the skills and responsibilities of these roles please see the in-depth resources section in response to Question 31.
Based on the projections and the experience of ARI, the resources described here are more than sufficient to accommodate the needs of this TLD.
The use of these resources and the services they enable is included in the fees paid to ARI which are described in the financial responses.


29. Rights Protection Mechanisms

The Registry is committed to a comprehensive strategy on Rights Protection Mechanisms (RPM). The Registry works closely with DotAsia Organisation (through Namesphere) and draws from the successful experience and knowledge of the RPM measures implemented for the .ASIA, especially in its acclaimed Sunrise process and its contributions to rapid suspension policies.

29.1 Sunrise and Startup Processes

A comprehensive Sunrise and startup process is the key to successful RPMs. A successful Sunrise program not only provides priority to rights holders, but also sends a clear message to the market that the TLD is serious about RPMs, thereby further deterring abusive registrations.

The Sunrise process provides for the introduction of the TLD in an orderly and equitable manner. Its purpose is to give reasonable protection and priority to stakeholders and certain prior rights holders, as well as to deter abusive and bad faith registrations. The Sunrise policies are also designed to facilitate reliability for ICANN Accredited Registrars and fair competition amongst registrants. It is intended to create a stable and effective launch and registration process for the benefit of various stakeholders and the Internet community at large.

Learning from the successful experience of the .ASIA sunrise, which achieved 0 disputes and also 100% satisfaction (satisfied or very satisfied) in an online poll of Intellectual Property Rights (IPR) practitioners, the Registry will implement a thorough and multi-phased Sunrise and startup process similar to that of the .ASIA registry.

A comprehensive set of Sunrise policies will be put in place in addition to the standard Sunrise and Trademark Claims services as specified in SPECIFICATION 7: MINIMUM REQUIREMENTS FOR RIGHTS PROTECTION MECHANISMS, of the New gTLD Registry Agreement. The Sunrise policies will follow a similar framework of the .ASIA Sunrise Policies (http:⁄⁄dot.asia⁄policies⁄DotAsia-Sunrise-Policies--COMPLETE-2007-08-10.pdf), in so far as it does not conflict with the specification 7.

29.1.1 Standard Sunrise and Trademark Claims Services

As a basic commitment, the Registry will implement the requirements from Specification 7 of the New gTLD Registry Agreement, and in accordance to the relevant Trademark Clearing House (TMCH) Sunrise and Trademark Claims services.

For this standard Sunrise, the Registry will establish, at a minimum, the eligibility requirements verified by Clearinghouse data, and incorporate a Sunrise Dispute Resolution ⁄ Challenge Policy. The standard Sunrise eligibility requirements include: (i) ownership of a mark that satisfies the criteria set forth in section 7.2 of the Trademark Clearing House specifications, (ii) description of international class of goods or services covered by registration; (iii) representation that all provided information is true and correct; and (iv) provision of data sufficient to document rights in the trademark.

The Registry believes that these form only the very basic layer of RPM and will therefore add significant measures on top of the standard process to ensure that prior rights of others are not abused.

In terms of Sunrise, Specification 7 and the TMCH descriptions only provide a basic framework for Trademark holders to protect names that are identical to their trademark. The Registry believes that additional protection is important and can be efficiently and effectively put in place with a multi-phased Sunrise program. Further discussion about this is included in 29.1.4 below.

29.1.2 Auction Process

An important part of the success of the .ASIA Sunrise program is the use of auction in the resolution of contention. It is known that many Trademarks are similar or identical because of the different jurisdictions and different classes. Therefore, it is inevitable that there would be some competition among rights holders to certain names. A complete Sunrise program requires a contention resolution mechanism that works to reduce the tension of competition and resolve the issue in a stable and orderly manner.

When the .ASIA Sunrise Auction process was first introduced, the community was worried about possible high prices in the auctions making it costly for trademark holders. The results of the process demonstrate however the original intent prevailed. If a pure first-come-first-served model is used, the tension at the opening of the registry at the Sunrise period would be extremely high. Also, because of the competition, the so-called FCFS approach essentially becomes a lottery and one that favours registrars with systems in closer proximity to the registry servers. The tension and the inherent unjust of the process caused thousands of disputes and litigation in previous launches of TLDs utilizing such an approach.

In the .ASIA Sunrise process, a total of about 30,000 applications were received. Out of which less than 2% ended up in an auction. Furthermore, only about 40% ended up in a contested auction (i.e. that there was more than 1 bid in the auction). What that means is that, while it demonstrated clearly that there is certainly competition among trademark holders, it only represents a very small portion. Also, when there was more than one verified applicant for a Sunrise domain and an auction is setup, many trademark holders elect not to bid for the name. Based on the understanding from DotAsia, it is found that many trademark holders do know that their mark is “shared” by other companies, perhaps in different jurisdiction or in different categories. Their motivation to participate in the Sunrise is to avoid abuse of their mark by other parties. Because in the Sunrise process, before an auction is held, each of the verified applicants will be given the information of the other verified applicants in the auction ahead of time. They therefore know who else is bidding for the name and can evaluate whether the other party may in fact abuse their mark. Knowing that the other party is another legitimate trademark holder who may not be abusing their mark, many of the trademark holders elected not to bid and let the other party win the auction with a nominal bid at $10.

What this illustrates is that the auction process is a very successful tool in reducing the stress of the people and the systems in the launch of a registry. Overall, the average winning price of the auctions in the .ASIA startup process was less than US$200. That represents a significant cost benefit for rights holders in comparison to possible litigation or alternative dispute resolution proceedings.

29.1.3 Sunrise Challenge (Dispute Resolution) Process

Besides a contention resolution process, an important part of any Sunrise process is a well developed Sunrise Challenge Process to ensure the integrity of the Sunrise program. The Sunrise Challenge Process is important such that after the allocation of a Sunrise name, there is a period of time where legitimate rights owners can challenge the legitimacy and eligibility of a registrant based on the Sunrise policies to a domain name.

Following again the .ASIA experience, a comprehensive Sunrise Challenge (Dispute Resolution) Process will be put in place and a dispute resolution provider will be selected to arbitrate disputes. A sample of the .ASIA Sunrise Challenge Process is included in the Attached. As part of the requirement of Specification 7 of the new gTLD Registry Agreement, An SDRP will be adopted to allow any party to raise a challenge on at least the four grounds identified in the Applicant Guidebook at TMCH s6.2.4. The remedy will be cancellation or deletion of a successfully challenged domain name. All registrants will be required to submit to proceedings under the SDRP, which will specify that SDRP claims may be raised after registration of a sunrise domain and will require that complaints clearly identify the challenger, the challenged domain, and the ground⁄s on which the complaint is based.

29.1.4 Additional Protection Mechanisms for Sunrise

In addition to the basic “identical” match of a Trademark to a domain name applied for during the Sunrise period, the Registry intends to follow the successful example of .ASIA to include additional types of matches, for example:
- Exceptions for registered mark (tm, sm, etc.) type or entity type (ltd, inc, etc.) identifiers
- Exceptions for the TLD string (i.e. allowing marks containing the TLD string to omit that substring)
- Considerations for commonly used short forms and omission of locality indications
- Acceptance of standard Romanization and Transliterations for Company Names
- Extended protection for trademarks + the class of the trademark (e.g. “BRAND Shoes” or “BRAND Computers”, etc.)

These considerations allow trademark holders priority registration opportunity to protect names that are important and related to them.

29.1.5 Community Sunrise Considerations

The Registry will also develop specialized phases targeted to provide priority registration periods for the community that the Registry will be primarily serving. For example, in the .ASIA Sunrise, Asian businesses and registered companies are allowed to participate in one of the phases of the Sunrise program ahead of the general availability of the domain. This allowed many Asian businesses who may not have a registered trademark to make use of the Sunrise process to protect their name.

For .spa, three additional sets of considerations will be considered:

29.1.5.1 Primary Community Considerations

The primary community has been described in #20c, and can be clearly delineated based on the response in #20e A) Eligibility. In summary:
- Spa operators, professionals and practitioners
- Spa associations and their members around the world
- Spa products and services manufacturers and distributors

A special phase in the Sunrise, before the general standard trademark Sunrise, should be afforded to allow the primary community a priority to register names corresponding to their spa related operations.

In order to be eligible for Sunrise as a community member, the registrant must be able to provide information⁄data demonstrating that they have:
1. A valid operating license, where applicable;
2. A spa, beauty or wellness certification, where applicable;
3. A valid business registration;
4. A membership with any spa or wellness industry association;
5. A declaration that the domain will be used for the promotion of spas and wellness related products or services.

For community organizations, such as spa associations, to be eligible, the registrant must be able to provide information⁄data substantiating that they have:
1. A valid entity registration, or equivalent;
2. Proof that the organization accepts members from the spa and wellness community; and,
3. A declaration that the domain will be used for the promotion of the spa and wellness community.

Furthermore, primary community members whose name itself contains the word “spa” should be able to omit that word for the second level domain name applied for under the “.spa” TLD. For example a spa with the name “ABCD Spa” should be able to apply for “abcd.spa” with the domain name applied for being considered an acceptable match to their entity name. This is similar to section 3.3.4 Exceptions for the term “Asia” in the .ASIA Sunrise Policies (http:⁄⁄dot.asia⁄policies⁄DotAsia-Sunrise-Policies--COMPLETE-2007-08-10.pdf).

29.1.5.2 Secondary Community Considerations

(From #20) The secondary community generally also includes holistic and personal wellness centers and organizations. While these secondary community organizations do not relate directly to the operation of spas, they nevertheless often overlap with and participate in the spa community and may share certain benefits for the utilization of the .spa domain. Together the industry calls it generally the “spa and wellness” community. In this document, we will use both “spa and wellness community” as well as “spa community”.

A special phase in the Sunrise, together with or after the general standard trademark Sunrise, should be afforded to allow the secondary community a priority to register names corresponding to their spa related operations before Landrush. This could be handled similar to Sunrise 3 of the .ASIA Sunrise process (http:⁄⁄dot.asia⁄policies⁄DotAsia-Sunrise-Policies--COMPLETE-2007-08-10.pdf), with requirements and processes similar to Primary Community members (except with a lower priority).

29.1.5.3 Coincidental Usage Considerations

(From #22) Based on the research as described in #20d, we recognize that there is coincidental usage of the string “spa” in other contexts beyond its predominant meaning. For completeness in mitigating against abusive usage of the .spa TLD based on such coincidental usage, the Registry will put in place 3 key measures to address potential concerns:
1. Reserved Names List
2. Special Sunrise Consideration
3. Claim & Notification Mechanism

Some details have already been included in the response to #22.

These RPMs are especially put in place to ensure that the prior rights of those who may be unintentionally implicated also be considered and protected.

For the set of reserved names put in place and added to the Reserved Names List, an ongoing activation mechanism similar to Sunrise 1 of the .ASIA Sunrise policies (http:⁄⁄dot.asia⁄policies⁄DotAsia-Sunrise-Policies--COMPLETE-2007-08-10.pdf) which is also an ongoing process for the activation of governmental reserved names.

If special Sunrise Considerations are included, i.e. if a phase of the .spa Sunrise would allow for entities for which coincidental usage of the string “spa” has an implicative meaning for them to apply for their corresponding name under .spa during Sunrise, then a mixture of a similar mechanism as .ASIA Sunrise 1 (for the activation of reserved names based on the Town of Spa in Belgium) and .ASIA Sunrise 3 (for application of registered entity name in Italy, i.e. registered “Società Per Azioni”, i.e. S.p.A.) could be utilized.

Especially for registered “Società Per Azioni” (i.e. S.p.A.) companies, the .spa Registry is prepared to work closely with the relevant authorities in Italy to explore the best approach to minimize unintended conflicts and⁄or circumventive abuse of .spa domains.

Such measures could include at one end of the spectrum to reserve all registered “Società Per Azioni” (i.e. S.p.A.) to another end of the spectrum where registrations are open and standard RPM of UDRP and URS are relied upon.

The Registry believes it is most appropriate to work with GAC and hear from GAC any further advice, if any, before completing the policy development process for the .spa TLD, especially for the Sunrise process involving coincidental usage of the TLD string “spa”. It is also important to maintain a balance where the primary community for the .spa TLD is not disenfranchised.

As a strawman proposal, the Registry suggests the following framework for handling the overlap with registered “Società Per Azioni”, i.e. S.p.A. entities:
1. Initially reserve all registered “Società Per Azioni”, i.e. S.p.A. entity names during Sunrise and Landrush
2. Allow activation of the names through a special Sunrise process
3. Continue to reserve all registered “Società Per Azioni”, i.e. S.p.A. entity names for 18 months from Go Live of the .spa TLD (and allow for ongoing activation by such entities)
4. Release the reservations and put in place a claims and notification process for another 6 months to ensure that new .spa registrants are aware if their registered .spa domain name may overlap with a registered “Società Per Azioni”, i.e. S.p.A., and that the registered “Società Per Azioni”, i.e. S.p.A. is notified of such registration.

This should provide a suitable balance that would ensure a stable and orderly introduction of the .spa TLD with due consideration for the protection of coincidental usage of the string “S.p.A” without compromising the long term development of the spa and wellness community .spa TLD.

Finally, it is important to note that all .spa registrants must still adhere to the mandatory guidelines and remain consistent with the community purpose of the .spa TLD, especially in promoting positive energy and a highly ethical, professional and tolerant attitude balanced with vigilant measures against abusive behaviours and described in #20d and #20e.

29.1.6 Reconsideration and Amendments Process

Besides the multitude of provisions for rights holders to participate in the Sunrise process, another important feature of the success of the .ASIA Sunrise program is the inclusion of a built-in reconsideration and amendment process. Because of the many applications a trademark holder may need to be filing, especially considering in the future the many new gTLD launches, it is possible that clerical mistakes and errors could be made in the Sunrise application. The .ASIA Sunrise process included a built-in reconsideration and amendment process that was critical to the overall success of the program. The success rate of the .ASIA Sunrise applications was over 90% as compared to other previous Sunrise launches where the success rate may be closer to 50-60%.

This explains the high approval rating of the .ASIA Sunrise program and also the rationale for the Registry to learn from and follow the good example set by .ASIA in the development of its comprehensive Sunrise policies.

29.1.7 Proactive Outreach and Specialized Programs

Furthermore, on top of the Sunrise program, a Pioneer Domains Program will be put in place to provide even further protection for prior rights holders while maintaining a strong balance against users’ rights.

Two features of the Pioneer programs for rights holders include: 1) the ability to apply for typo or other variant forms of their trademark to improve protection; 2) the use of the Pioneer Domains Challenge process to protect against abuse.

Again, following from the success of the .ASIA startup processes, the Registry intends to put in place a Pioneer Domains Program similar to the .ASIA Pioneer Domains Program (http:⁄⁄pioneer.domains.asia⁄ascii⁄policies.html). Together with the Pioneer Domains Program, a Pioneer Domains Challenge Process will be put in place (http:⁄⁄pioneer.domains.asia⁄ascii⁄challenge.html).

In short, the Pioneer Domains Program invites potential registrants to submit proposals, explaining how they would use and promote the domain name. Each proposal will require an application fee and prior acknowledgment and acceptance of relevant terms and conditions. Evaluation criteria will take into account the applicantʹs business plan, marketing expertise, and the manner and purposes for which the proposed site would be operated. For Trademark applicants, the evaluation criteria is based on the trademarks filed and the rights holder can also apply for variations relevant to their mark.

29.1.8 Additional RPM Considerations

In addition to the RPMs mandated by the Applicant Guidebook, certain requirements proposed in the ‘2011 Proposed Security, Stability and Resiliency Requirements for Financial TLDs’ (at http:⁄⁄www.icann.org⁄en⁄news⁄correspondence⁄aba-bits-to-beckstrom-crocker-20dec11-en.pdf) (the ‘BITS Requirements) will be adopted. We acknowledge that these requirements were developed by the financial services sector in relation to financial TLDs, but nevertheless believe that their adoption in this TLD (which is not financial-related) results in a more robust approach to combating abuse. The following requirements will be adopted:
Req. 6: annual certification to ICANN of compliance with the Registry Agreement.
Req. 8: provision and maintenance of valid Registry Operator primary contact information (name, email address, and phone number) on the registry website.
Req. 10: re-validation of Registry-Registrar Agreements at least annually.
Req. 13: immediate notification to Registrars regarding any RPM investigation or compliance action including the nature of the investigation or compliance action by ICANN or any outside party.
The Registry-Registrar Agreement (RRA) will additionally impose upon Registrars the following requirements:
Req. 7: Annual certification to ICANN compliance with the Registrar Accreditation Agreement (RAA).
Req. 9: Provision and maintenance of valid primary contact information (name, email address, and phone number) on Registrar’s website.
Req. 19: Disclosure of registration requirements on Registrar’s website.

29.2 UDRP, URS and other Suspension Processes

While the Startup process, including the multi-phased Sunrise program provides a proactive process for prior rights holders to protect their names under the TLD in a priority registration process, RPMs after the allocation and delegation of a second level domain under the TLD is equally important.

29.2.1 UDRP Implementation

The Registry will comply with and put in place mechanisms to ensure the enforcement of UDRP decisions. These include provisions within the Registry-Registrar Agreements (RRA) with Accredited Registrars to ensure that they have adequate provisions in their Registration agreement with registrants to submit to UDRP proceedings, as well as to work closely with Accredited registrars in the implementation of UDRP decisions and required actions through the URS process.

29.2.2 URS Implementation

The URS is a new RPM the implementation of which is mandated in all new gTLDs. The URS is targeted at providing a rapid takedown solution to clear-cut cases of cybersquatting. It is intended to have a deterrent effect and reduce the number of UDRP disputes. The URS is intended to supplement and not replace the UDRP, and the Applicant Guidebook foreshadows (at URS ss8.6 & 13) the likelihood of URS claimants also commencing UDRP claims. For this reason the URS Implementation Plan considers potential interaction between URS and UDRP stakeholders. The following stakeholders are involved in implementation of the URS:
– URS claimants
– Registrants
– Registrars
– Registry operator
– ARI
– URS provider⁄s
– URS Examiner
The roles of these stakeholders are described below by reference to:
– URS Implementation Plan
– Contractual implementation

The URS Implementation Plan identifies certain aspects of implementation that are not clearly addressed in the Applicant Guidebook. For example, the Guidebook does not specify how from an operational perspective suspension of a domain name will transform to another status (e.g., transfer of a domain following a successful UDRP challenge); we assume that such a status change would only occur upon expiry of a registration but acknowledge the potential for further development of URS policy to allow for change of status as a result of a subsequent UDRP decision. In addition to identifying such gaps, the URS Implementation Plan identifies our proposed method of addressing these. Furthermore, understanding that a fundamental aim of the URS is expediency, all steps in the Implementation Plan below will be undertaken as soon as practical but without compromising security or accuracy.

29.2.2.1 Implementation

URS Implementation Plan

1. As an initial step, ARI will notify to each URS provider an email address for all URS-related filings and other correspondence. On an ongoing basis, ARI’s Abuse and Compliance Team will monitor this address for communications from URS providers. ARI will validate all correspondence received from a URS provider.
2. ARI will within 24 hours of receipt of a URS Notice of Complaint lock the domain name⁄s the subject of complaint by restricting all changes to the registration data, including transfer and deletion of the domain name. The domain name will continue to resolve while in this locked status.
3. ARI will immediately notify the URS provider in the manner requested by the URS provider once the domain name⁄s have been locked.
4. Upon receipt of a favourable URS Determination ARI will lock the domain name the subject of the Determination for the balance of the registration period and redirect the nameservers to an informational web page provided by the URS provider. While a domain name is locked, ARI will continue to display all of the WhoIs information of the original registrant except for the redirection of the nameservers and (subject to future policy development taking into account the transfer of a URS-locked domain name following a successful UDRP challenge) the additional statement that the domain will not be able to be transferred, deleted or modified for the life of the registration.
5. Upon receipt of notification from the URS provider of termination of a URS proceeding ARI will promptly unlock the domain and return full control to the registrant.
6. Where a default has occurred (in accordance with the Applicant Guidebook at URS s6.1) and a Determination has been made in favour of the complainant, in the event that ARI receives notice from a URS provider that a Response has been filed in accordance with s6.4, ARI will as soon as practical restore a domain name to resolve to the original IP address while preserving its locked status until a Determination from de novo review is notified to ARI.
7. ARI will ensure that no changes are made to the resolution of a domain name the subject of a successful URS Determination until expiry of the registration or the additional registration year unless otherwise instructed by UDRP provider.
8. ARI will make available to successful URS complainants an optional extension of the registration period for one additional year at commercial rates. We understand that this requirement has been based on the provision in the Expired Domain Deletion Policy (3.7.5.7 of the 2009 RAA), under which there is no requirement to notify the complainant that a name is due to expire. From this we conclude that there is likewise no requirement on this TLD to notify a successful URS complainant that a name is due to expire.
9. The Applicant Guidebook specifies that renewal must be offered ‘at commercial rates’ but does not specify how and to whom the renewal payment should be made. If payment is to be made to a stakeholder other than the registry operator, it is not clear how this will be received by the registry operator. ARI’s Abuse and Compliance Team will be prepared and have the expertise and flexibility necessary to develop the technical and financial interfaces necessary to facilitate the receipt of renewal fees by ARI.

Contractual Implementation

The following features of the URS Implementation Plan described above will be executed by inclusion of corresponding clauses in the RRA:
– In the event that a registrant does not submit an answer to a URS complaint in accordance with the Applicant Guidebook at URS s6.1 (default), Registrars must prevent registrants from making changes to the WhoIs information of a registration in default.
– Registrars must prevent changes to a domain in locked status to ensure that both the Registrar’s systems and registry’s systems contain the same information for the locked domain.
– Registrars must not take any action relating to a URS proceeding except as in accordance with a validated communication from ARI or a URS provider.

29.2.3 Other Suspension Programs

In addition to the basic dispute and suspension programs, the Abuse Prevention Mechanisms as described in #28 as well as the geographical names reservation processes described in #22, the Registry, following the footsteps of the .ASIA Registry as well, will explore appropriate suspension mechanisms and challenge processes to further improve the protection to prior rights holders.

For example, .ASIA has completed an MoU with the International Federation Against Copyrights Theft Greater China (IFACT-GC), and has explored extensively and works closely with the Anti-Phishing Working Group on possible alternative rapid suspension processes against gross copyright infringement and phishing sites. These discussions also helped inform some of the discussions that lead to the development of the URS.

Given the focus of the TLD, the Registry will also consider and explore adopting other relevant forums for domain dispute resolution. For example, the Registry may explore the adoption of other industry arbitration processes relevant to the use to broaden the protection of the legitimate prior rights of others in the registration of domain names in the TLD. These measures will be put in place in addition to not in replacement of and must not be in conflict of the basic requirements of submitting to UDRP, URS and other ICANN policies.

29.2.4 Post-Delegation Dispute Resolution Process (PDDRP)

While the Registry is confident that its processes and policies will be effective in curbing abusive registrations, and that it has the knowledge and capabilities to implement and enforce such measures, the Registry is fully prepared to work with ICANN should a PDDRP be initiated.

The Registry fully submits to the process and, along with its Backend Registry Services Provider as well as Front End Registry Services Provider, will comply with all ICANN requirements through a PDDRP.

29.2.5 ARI Abuse and Compliance Team

ARI’s Abuse and Compliance Team will be staffed by five full-time equivalent positions:
– 4 Policy Compliance Officers
– 1 Legal Manager
Policy Compliance Officers will be responsible for managing sunrise and landrush applications, supporting the SDRP, TM Claims Service, URS, UDRP and Trademark PDDRP, managing communications with the TMCH, receiving, assessing and managing trademark infringement complaints received through the single abuse point of contact, escalating complaints and issues to the Legal Manager when necessary and communicating with all relevant stakeholders (Registrars, registrants, trademark holders, general public) as needed in fulfilling these responsibilities. This role will be provided on a 24⁄7 basis supported outside of ordinary business hours by ARI’s Service Desk. Policy Compliance Officers will be required to have the following skills⁄qualifications: customer service⁄fault handling experience, complete knowledge of all RPMs offered by the TLD and related policies, Internet industry knowledge, relevant post-secondary qualification, excellent communication and professional skills, accurate data entry skills, high-level problem solving skills, and high-level computer skills.

The Legal Manager will be responsible for handling all potential disputes arising in connection with RPMs and related policies. This will involve assessing complaints and issues, liaising with legal counsel and management, resolving disputes and communicating with all relevant stakeholders (Registrars, registrants, trademark holders, general public) as needed in fulfilling these responsibilities. The Legal Manager will be required to have the following skills⁄qualifications: legal background (in particular, intellectual property⁄information technology law) or experience with relevant tertiary or post-graduate qualifications, dispute resolution experience, Internet industry experience, excellent communication, negotiation, problem solving and professional skills and good computer skills.

For more information on the skills and responsibilities of these roles, please see the in-depth resources section in response to Question 31. Based on the projections and the experience of ARI, the resources described here are more than sufficient to accommodate the needs of this TLD.

29.3 Meeting & Exceeding Requirements

29.3.1 Capabilities and Knowledge

The Registry is supported by Namesphere as the Front-End Services provider, and works closely with DotAsia Organisation (through Namesphere) to develop the Sunrise and Startup processes as well as agreements and other administrative proceedings to ensure effective, efficient and implementable enforcement of such policies and processes.

DotAsia has significant knowledge and expertise in the development and successful implementation of Sunrise and RPM policies, as demonstrated by the successful launch of the .ASIA TLD. A dedicated team comprised of DotAsia, the Registry and our Registry Back-End Services Provider will be convened to ensure that policy as well as technical capabilities are in place to support the RPMs.

29.3.2 Compliance with Specification 7

The Registry is committed to comply with Specification 7 of the New gTLD Registry Agreement, and plans to implement additional RPM on top of the basic requirements of Specification 7.

29.3.3 Plans for Meeting Compliance with Contractual Requirements

The Registry, along with its Front-End Services Provider and Back-End Services Provider will work to ensure that contractual compliance is met. Besides the basic requirements in Specification 7, the Registry intends to consult with ICANN through the process as additional RPMs are put in place to ensure that they also comply with contractual requirements. With the strong experience from our partners, especially from DotAsia, the Registry can be assured that it will meet and comply with all the ICANN contractual requirements.

The following will be memorialized and be made binding via the Registry-Registrar and Registrar-Registrant Agreements:

The registry may reject a registration request or a reservation request, or may delete, revoke, suspend, cancel, or transfer a registration or reservation under the following criteria:
a. to enforce registry policies and ICANN requirements; each as amended from time to time;
b. that is not accompanied by complete and accurate information as required by ICANN requirements and⁄or registry policies or where required information is not updated and⁄or corrected as required by ICANN requirements and⁄or registry policies;
c. to protect the integrity and stability of the registry, its operations, and the TLD system;
d. to comply with any applicable law, regulation, holding, order, or decision issued by a court, administrative authority, or dispute resolution service provider with jurisdiction over the registry;
e. to establish, assert, or defend the legal rights of the registry or a third party or to avoid any civil or criminal liability on the part of the registry and⁄or its affiliates, subsidiaries, officers, directors, representatives, employees, contractors, and stockholders;
f. to correct mistakes made by the registry or any accredited registrar in connection with a registration; or
g. as otherwise provided in the Registry-Registrar Agreement and⁄or the Registrar-Registrant Agreement.

29.3.4 Consistency with Technical, Operational and Financial Approach

The use of pendingCreate along with other registry system features ensure that Sunrise and other startup processes could be processed in a standards based manner. In addition, DotAsia has helped to work out an open EPP extension for the implementation of Sunrise applications:

These EPP Extensions include:
• An 〈ipr:name〉 element that indicates the name of Registered Mark.
• An 〈ipr:number〉 element that indicates the registration number of the IPR.
• An 〈ipr:ccLocality〉 element that indicates the origin for which the IPR is established (a national or international trademark registry).
• An 〈ipr:entitlement〉 element that indicates whether the applicant holds the trademark as the original “OWNER”, “CO-OWNER” or “ASSIGNEE”.
• An 〈ipr:appDate〉 element that indicates the date the Registered Mark was applied for.
• An 〈ipr:regDate〉 element that indicates the date the Registered Mark was issued and registered.
• An 〈ipr:class〉 element that indicates the class of the registered mark.
• An 〈ipr:type〉 element that indicates the Sunrise phase the application applies for.

Note that some of these extensions might be subject to change based on ICANN-developed requirements for the Trademark Clearinghouse and also specific implementation of the Sunrise process at the Registry.

29.3.5 Committed Resource to Carry out plans

Both ARI and Namesphere as the Registry Back-End and Registry Front-End Services provider respectively have teams prepared and dedicated with capacity and capability to implement a comprehensive Sunrise and Startup process as well as the additional RPM measures that the Registry intends to put in place.

29.3.6 Rights Protection as A Core Objective

Based on the in depth discussion and commitment to the multitude of RPM features as well as a multi-phased startup process to ensure the stable and orderly introduction of the TLD, the Registry believes that it has demonstrated its commitment to rights protection as a core objective.

Beyond RPMs, the comprehensive geographical names protection program as explained in #22 further demonstrates the dedication of the Registry towards the protection of the prior rights of others.

29.3.7 Effective Mechanisms in Addition to Requirements in Registry Agreement

The policies and processes proposed by the Registry are proven and time tested to be effective in curbing abusive registrations. The .ASIA sunrise processes were highly regarded by the industry and yielded 100% satisfaction rating from an online poll of Intellectual Property Rights practitioners.

Much of the approach has been tested and proven successful through the launch of the .ASIA TLD. The success of the process can be observed by the imitation or following of the processes, including the multi-phased startup, the auction based contention resolution, as well as the Pioneer Domains Program (i.e. an Request for proposal -- RFP -- type process) are now commonly used processes when a TLD is launched or certain section of names are released by a TLD (e.g. 1 and 2 character names in existing gTLDs).

30(a). Security Policy: Summary of the security policy for the proposed registry

We have engaged ARI Registry Services (ARI) to deliver services for this TLD. ARI provide registry services for a number of TLDs including the .au ccTLD. For more background information on ARI please see the attachment ‘Q30a – ARI Background & Roles.pdf’. This response describes Security as implemented by ARI under direction from the registry operator taking into account any specific needs for this TLD.

1 SECURITY POLICY SUMMARY

ARI operates an ISO27001 compliant Information Security Management System (ISMS) for Domain Name Registry Operations; see attachment ‘Q30a – SAI Global Certificate of Compliance.pdf’. The ISMS is an organisation-wide system encompassing all levels of Information Security policy, procedure, standards, and records. Full details of all the policies and procedures included in the ISMS are included in the attachment to Question 30b.

1.1 The ISMS
ARI’s ISMS’s governing policy:
– Defines the scope of operations to be managed (Domain Name Registry Operations).
– Designates the responsible parties (COO, CTO and Information Security Officer) for governance, Production Support Group for implementation and maintenance, and other departments for supporting services.
– Requires a complete Risk Assessment (a developed Security Threat Profile for the Service – in this case registry services for the TLD – and a Risk Analysis tracing threats and vulnerabilities through to Risks) and Risk Treatment Plan (each major risk in the Risk Assessment references the Statement of Applicability indicating controls to be implemented, responsible parties, and the effectiveness metrics for each).
– Includes a series of major sub policies governing security, which include but are not limited to:
– ICT acceptable use policy and physical security policies.
– PSG Security Policy which outlines the registry operations policies, the management of end-user devices, classification of networks and servers according to the classification of information they contain, networking, server & database configuration and maintenance guidelines, vulnerability and patch management, data integrity controls, access management, penetration testing, third party management, logging and monitoring, and cryptography.
– Requires ongoing review:
– Of risks, threats, the Risk Treatment Plan, client requirements and commitments, process and policy compliance, process and policy effectiveness, user etc.
– Regular internal and external penetration testing & vulnerability scanning.
– Ad-hoc review raised during normal operations, common sources being change management processes, scheduled maintenance or project debriefs, and security incidents.
– Yearly review cycle which includes both internal and external audits, including external surveillance audits for compliance.
– Additional yearly security controls assessment reviews, which include analysis of the security control implementations themselves (rather than compliance with any particular standard).
– At 24 month intervals, external penetration testing of selected production services.
– periodic ISO reaccreditation
ARI’s ISMS encompasses the following ARI standards:
– Configuration standards for operating systems, networking devices and databases based on several key publications, including those released by NIST (eg SP800-123, SP800-44v2, SP-800-40, SP800-41) and the NSA, staff testing and experience, and vendor supplied standards.
– Security Incident Classification, which identifies the various classifications of security incidents and events to ensure that events that qualify as security incidents.
– Information Classification and Handling which specifies the information classification scheme and the specific requirements of handling, labelling, management and destruction for each level of classification.

1.2 SECURITY PROCESSES
Processes are used to implement the policies. These include, but are not limited to:

1.2.1 Change Management
This includes change management and its sub-processes for access management, software deployment, release of small changes and scheduled maintenance. This process includes:
– The classification of changes and the flow into sub processes by classification.
– The release and deployment process for change control into production environments, outlining peer review, testing steps, approval points, checklist sets, staging requirements and communication requirements.
– The software release and deployment process with its specific testing and staged rollout requirements.
– The scheduled maintenance process and its various review points.

1.2.2 Incident Management
This includes incident management process and its sub-process for unplanned outages. These outline:
– How incidents are managed through escalation points, recording requirements, communication requirements etc.
– The unplanned outage procedure which applies directly to situations where the registry itself or other critical services are unexpectedly offline.

1.2.3 Problem Management
The goal of problem management is to drive long term resolution of underlying causes of incidents. This process centres on finding and resolving the root causes of incidents. It defines escalation points to third parties or other ARI departments such as Development, as well as verification of the solution prior to problem closure.

1.2.4 Security Incident Management
This process deals with the specific handling of security incidents. It outlines the requirements and decision points for managing security incidents. Decision points, escalation points to senior management and authorities are defined, along with evidence-gathering requirements, classification of incidents and incident logging.

1.2.5 Access Management
This process handles all access changes to systems. HR must authorize new users, and access changes are authorized by departmental managers and approved by the Information Security Officer.
When staff leave or significantly change roles, a separation process is followed which ensures all access that may have been granted during their employment (not just their initially granted access) is checked and where appropriate, revoked.
Finally, quarterly review of all access is undertaken by the ISO, reviewing and approving or rejecting (with an action ticket) as appropriate.

2 ARI’s SECURITY INFRASTRUCTURE SOLUTIONS

ARI has developed a layered approach to IT security infrastructure. At a high level, some of the layers are as follows:
– DDoS countermeasures are employed outside ARI networks. These include routing traps for DDoS attacks, upstream provider intervention, private peering links and third party filtering services.
– Routing controls at the edge of the network at a minimum ensures that only traffic with valid routing passes into ARI networks.
– Overprovisioning and burstable network capabilities help protect against DoS and DDoS attacks.
– Network firewalls filter any traffic not pre-defined by network engineering staff as valid.
– Application layer firewalls then analyse application level traffic and filter any suspicious traffic. Examples of these would be an attempt at SQL injection, script injection, cross-site scripting, or session hijacking.
– Server firewalls on front-end servers again filter out any traffic that is not strictly defined by systems administrators during configuration as valid traffic.
– Only applications strictly necessary for services are running on the servers.
– These applications are kept up-to-date with the latest security patches, as are all of the security infrastructure components that protect them or that they run on.
– ARI infrastructure is penetration-tested by external tools and contracted security professionals for vulnerabilities to known exploits.
– ARI applications are designed, coded and tested to security standards such as OWASP and penetration-tested for vulnerabilities to common classes of exploits by external tools and contracted security professionals.
– ARI configures SELinux on its production servers. Specific details of this configuration is confidential; essentially any compromised application is extremely limited in what it can do.
– Monitoring is used to detect security incidents at all layers of the security model. Specifically:
– Network Intrusion Detection systems are employed to monitor ARI networks for suspicious traffic.
– ARI maintains its own host-based Intrusion Detection system based on tripwire, which has now undergone four years of development. Specific details are confidential, but in summary, the system can detect any unusual activity with respect to configuration, program files, program processes, users, or network traffic.
– More generic monitoring systems are used as indicators of security incidents. Any behaviour outside the norm across over 1,100 individual application, database, systems, network and environmental checks is investigated.
– Capacity management components of the monitoring suite are also used to detect and classify security incidents. Some examples are:
– Network traffic counts, packet counts and specific application query counts.
– Long term trend data on network traffic vs. specific incident windows.
– CPU, Storage, Memory and Process monitors on servers.
– A second layer of hardware firewalling separates application and middle tier servers from database servers.
– Applications only have as much access to database information as is required to perform their function.
– Finally, database servers have their own security standards, including server-based firewalls, vulnerability management for operating system and RDBMS software, and encryption of critical data.

2.1 Physical Security Infrastructure
ARI maintains a series of physical security infrastructure measures including but not limited to biometric and physical key access control to secured areas and security camera recording, alarm systems and monitoring.

3 COMMITMENTS TO REGISTRANTS

We commit to the following:
– Safeguarding the confidentiality, integrity and availability of registrant’s data.
– Compliance with the relevant regulation and legislation with respect to privacy.
– Working with law enforcement where appropriate in response to illegal activity or at the request of law enforcement agencies.
– Maintaining a best practice information security management system that continues to be ISO27001-compliant.
– Validating requests from external parties requesting data or changes to the registry to ensure the identity of these parties and that their request is appropriate. This includes requests from ICANN.
– That access to DNS and contact administrative facilities requires multi-factor authentication by the Registrar on behalf of the registrant.– That Registry data cannot be manipulated in any fashion other than those permitted to authenticated Registrars using the EPP or the SRS web interface. Authenticated Registrars can only access Registry data of domain names sponsored by them.
– A Domain transfer can only be done by utilizing the AUTH CODE provided to the Domain Registrant.
– Those emergency procedures are in place and tested to respond to extraordinary events affecting the integrity, confidentiality or availability of data within the registry.

4 AUGMENTED LEVEL OF SECURITY

This TLD is a generic TLD and as such requires security considerations that are commensurate with its purpose. Our goal with this TLD is to provide registrants with adequate protections against unauthorized changes to their names, without making the registration process too onerous and thus increasing costs.
The following attributes describe the security with respect to the TLD:
– ARI, follows the highest security standards with respect to its Registry Operations. ARI is ISO 27001 certified and has been in the business of providing a Registry backend for 10 years. ARI have confirmed their adherence to all of the security standards as described in this application. As per recommendation 24 this ensures that the technical implementations do not compromise elevated security standards
– Registrant will only be permitted to make changes to their domain name after a authenticating to their Registrar.
– Registrants will only be able to access all interfaces for domain registration and management via HTTPS. A reputed digital certificate vendor will provide the SSL certificate of the secure site.
– Registrar identity will be manually verified before they are accredited within this TLD. This will include verification of corporate identity, identity of individuals involved ⁄ mentioned, and verification of contact information
– Registrars will only be permitted to connect with the SRS via EPP after a multi-factor authentication that validates their digital identity. This is described further ahead.
– Registrars will only be permitted to use a certificate signed by ARI to connect with the Registry systems. Self-signed certificates will not be permitted.
– The Registry is DNSSEC enabled and the TLD zone will be DNSSEC enabled. This is described in detail in our response to question 43. The following additional requirements will exist for Registrars who want to get accredited to sell this TLD:
– Registrars must support DNSSEC capabilities within its control panels.
– If the Registrar provides Managed DNS services to Registrants within this TLD they must provide the option for DNSSEC. This ensures that DNSSEC is deployed at each zone and subsequent sub-zones at Registry, Registrar and Registrant level as per recommendation 26.
– Registrar access to all Registry Systems will be via TLS and secured with multi-factor authentication as per recommendation 27. This is described in detail in our responses to Question 24 and Question 25.
– Registrant access to all Registrar and Registry Systems will be via TLS and secured with multi-factor authentication as per recommendation 28. This is described in detail in our response to Question 25, Question 27 and Question 29.
– All communication between the Registrar or the Registrars systems and the registry system is encrypted using at least 128 bit encryption which been designated as ‘Acceptable’ till ‘2031 and beyond’ by NIST Special Publication 800-57. This includes the following communication:
– Secure websites and control panels provided by the Registrar to the Registrant.
– Ticketing systems provided by the Registrar to the Registrant.
– Web and EPP interfaces provided by ARI to the Registrars.
– Ticketing systems provided by ARI to the Registrar.
– Any communication between the Registrant, Registrar and Registry that is deemed as critical or contains credentials or sensitive information.

Where these requirements put controls on Registrars these will be enforced through the RRA.

5 RESOURCES

This function will be performed by ARI. The following resources are allocated to performing the tasks required to deliver the services described:
– Executive Management Team (4 staff)
– Production Support Group (27 staff)
ARI has ten years’ experience designing, developing, deploying, securing and operating critical Registry systems, as well as TLD consulting and technology leadership.
As a technology company, ARI’s senior management are technology and methodology leaders in their respective fields who ensure the organisation maintains a focus on technical excellence and hiring, training and staff management.
Executive Management is heavily involved in ensuring security standards are met and that continued review and improvement is constantly undertaken. This includes the:
– Chief Operations Officer
– Chief Technology Officer
A detailed list of the departments, roles and responsibilities in ARI is provided as attachment ‘Q30a – ARI Background & Roles.pdf’. This attachment describes the functions of the above teams and the exact number and nature of staff within.
The number of resources required to design, build, operate and support the SRS does not vary significantly with, and is not linearly proportional to, the number or size of TLDs that ARI provides registry services to.
ARI provides registry backend services to 5 TLDs and has a wealth of experience in estimating the number of resources required to support a registry system.
Based on past experience ARI estimates that the existing staff is adequate to support a registry system that supports in excess of 50M domains. Since this TLD projects 17,648 domains, 0.04% of these resources are allocated to this TLD. See attachment ‘Q30a – Registry Scale Estimates & Resource Allocation.xlsx’ for more information.
ARI protects against loss of critical staff by employing multiple people in each role. Staff members have a primary role plus a secondary role for protection against personnel absence. Additionally ARI can scale resources as required. Additional trained resources can be added to any of the above teams with a 2 month lead time.
The Production Support Group is responsible for the deployment and operation of TLD registries.
The group consists of:
– Production Support Manager (also the ISO)
– Service Desk:
– 1 Level 1 Support Team Lead
– 8 Customer Support Representatives (Level 1 support)
– 1 Level 2 Support Team Lead
– 4 Registry Specialists (Level 2 support)
– Operations (Level 3 support):
– 1 Operations Team Lead
– 2 Systems Administrators
– 2 Database Administrators
– 2 Network Engineers
– Implementation:
– 1 Project Manager
– 2 Systems Administrators
– 1 Database Administrators
– 1 Network Engineers
ARI employs a rigorous hiring process and screening (Police background checks for technical staff and Australian Federal Government ‘Protected’ level security clearances for registry operations staff).



© 2012 Internet Corporation For Assigned Names and Numbers.