...
Group 1: Criminal Law enforcement/national or public security | LEA 1, LEA 2, IP 2, IP 3 |
---|---|
LEA 1 - Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a non-local data controller. | Use Case - GAC LEA1-1371929-8 Redline.docx EPDP Access to Non-Public Data .pdf EPDP Access to Non-Public Data - Overall + Responsibilities.pdf |
LEA 2 - Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a local data controller. | Use Case - GAC LEA2 - 7 July 29 August 2019.docx |
IP 2 - Investigation of criminal activity against a victim in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal trademark) | Use Case - IPC-TM-Criminal.docx |
IP 3 - Investigation of criminal activity in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal copyright) | Use Case - IPC-Copyright-Criminal.docx |
...
Group 5: Registered Name Holder consent or contract | BC 4, BC 6, BC 8, IP 5 |
---|---|
IP 5 - Providers requesting access required to facilitate due process in the UDRP and URS | Use Case - IPC-UDRP-URS-Due-Process - FINAL updated - 15 August 2019.docx |
BC 6 - M&A name portfolio due diligence or purchase of domain name from bankrupt entity or other seller | BC-6 Use Case - M&A and domain purchase.docx |
BC 4 - Maintaining the domain name registration by the Registered Name Holder | BC4 Use Case - Domain Name Maintenance.docx |
BC 8 - Help a certification authority determine and validate the identity of the entity associated with a domain name that will be bound to an SSL/TLS certificate | BC-8 Use Case - Certification Authority.docx |
...