This page will be used by the RDS PDP WG to post draft example use cases for review and discussion by WG members.
As decided in the face-to-face meeting in Helsinki and as added to Work Plan Task 11, the WG plans to consider example use cases for Registration Data and Directory Services as a means to prepare for deliberation on possible RDS requirements. In particular, discussing use cases should help us identify and better understand the following:
Note that example use cases are only intended to help the WG examine real-world scenarios as it prepares for deliberation. Before deliberation, use cases can be helpful to educate the entire WG about existing uses and problems and proposed possible requirements. After the WG begins deliberation, use cases may be helpful to model or test proposed improvements/additions. Use cases may include both factual uses of today's WHOIS policy as well as proposed uses of a next-gen system; however, to avoid confusion between the two, use cases should clearly differentiate between the two.
Important qualifications to the above explanation:
A draft template has been circulated to the WG to serve as a starting point for use case development and to promote consistency in content and format:
For reference, the following excerpt from the EWG's Final Report listing example use cases and associated purposes, users, and data elements can be found here:
RDS PDP WG members volunteering to develop use cases are welcome to start with the EWG's draft example use cases, but are not required to do so.
Contact RDS PDP staff to request any EWG draft use case. |
---|
Example Use Cases now under development by RDS PDP WG members are summarized and linked to the table below.
Draft Use Cases (and any feedback on them) should be submitted directly to the RDS PDP WG mailing list.
Staff will update this table with new draft use cases as they are submitted.
No. | Use Case Goal/Scenario - Title and Hyperlink | Volunteer | Status |
---|---|---|---|
01 | Technical Issue Resolution (example on last page) | Rod Rasmussen | Introduced 12 July |
02 | Michele Neylon | Introduced 20 July | |
03 | Michele Neylon | Introduced 20 July | |
04 | Michele Neylon | Introduced 20 July | |
05 | Michele Neylon | Introduced 20 July | |
06 | Obtain domain name holder details for legal action | Karnika Seth | Introduced 27 July |
08 | Real-World Contact | Fabricio Vayra | Introduced 9 August |
09 | Law Enforcement - Compromised websites | Greg Mounier | Introduced 2 August |
10 | Dissident Group Using Internet to Communicate | Ayden Ferdeline | Introduced 2 August |
12 | Trademark Infringement | Mark Svancarek | Introduced 9 August |
13 | Services required by Registry Agreement | Maxim Alzoba | Introduced 9 August |
14 | WHOIS queries for compliance purposes | Terri Stumme | Introduced 2 August |
15 | Fraudulent contact information | Susan Kawaguchi | Introduced 9 August |
16 | WHOIS misused to shame, anger, or scare a registrant | Ayden Ferdeline | Introduced 9 August |
17 | Rod Rasmussen | Submitted 15 August | |
18 | Business Intelligence | Elaine Pruis | Submitted 7 August |
19 | Certification Authority | Geoff Noakes | Submitted 15 August |
20 | Technical Issue Resolution (specific examples) | Rob Golding | Summarized 4 August |
21 | Investigate Abusive Domain | Rod Rasmussen | Submitted 15 August |
22 | Find Domains Registered by Miscreant | Rod Rasmussen | Submitted 15 August |
23 | Business Domain Name Purchase/Sale |