...
Use case topic | Link |
Overarching Purpose: Digital Crime investigation by non-LEA Use case: Initial investigation of criminal activity against a victim and/or secondary victim where domain names are used in the commission of the crime (part 1 of 2) | BC-1 & BC-2 Digital Crime Investigation Use Case.docx |
Overarching Purpose: Investigate, detect, prevent, and bring civil claims for Abusive Domain names Use case: Identify owner of abusive domains and other related domains involved in civil legal claims related to phishing, malware, botnets, and other fraudulent activities | BC-3 Use Case - Investigate Abusive Domain.docx |
Overarching Purpose: Obtain domain name holder details for legal claims Use Case: The establishment, exercise or defense of a legal claim involving a registrant of a domain name | BC-5 Use Case - Obtain domain name holder details for legal action.docx |
Overarching Purpose: Site Integrity and Business Integrity Confirmation Use Case: Search Engines, Messaging Services & Social Media Platforms seeking to confirm the authenticity of businesses advertising or Posting News on its Platform | BC- 9 Use Case - Site and Business Integrity Confirmation (2).docx |
Overarching Purpose: Enabling timely resolution of domain-based security events and attacks Use Case: When a network is undergoing an attack involving a domain name, and the operator(s) of that network need to contact the domain owner to remediate the security issue (DDOS, Botnet, etc.) | Use Case - SSAC Operational Security.docx |
Overarching Purpose: The processing of personal data to the extent strictly necessary and proportionate for the purposes of ensuring network and information security, i.e. the ability of a network or an information system to resist, at a given level of confidence, accidental events or unlawful or malicious actions that compromise the availability, authenticity, integrity and confidentiality of stored or transmitted personal data, and the security of the related services offered by, or accessible via, those networks and systems, by public authorities, by computer emergency response teams (CERTs), computer security incident response teams (CSIRTs), by providers of electronic communications networks and services and by providers of security technologies and services. Use Case: Determine “Reputation” of domain name and/or elements associated with domain name registrations. | Use Case - SSAC Reputation Service.docx |
Overarching Purpose: Crime and abuse investigation by non-law enforcement parties Use Case: Investigation of criminal activity where domain names are used. Typical specific example: phishing attack. | Use Case - SSAC Security Practices.docx |
Overarching Purpose: Preventing Fraud - Consumer Protection Use Case: Online buyers identifying and validating the source of goods or services/ Internet users validating the legitimacy of an email or a website to protect themselves | Consumer_Protection_Use_Case_ALAC - Online buyers.docx |
Overarching Purpose: Fraud Prevention – Consumer Protection Use Case: Consumer protection organizations | Consumer_Protection_Use_Case_ALAC - Consumer Protection Organizations.docx |
...