NavigationSearchUser loginRecent blog posts
|
Net coveragegTLD Applicant Strategy: 2013 The Make or Break Year for ApplicantsDo you agree this is a critical time for many of the original 1930 applications to ICANN to operate a gTLD Registry. How has The "Fadi Effect" contributed to those Applicants' Key Dates, Decisions, Dilemmas and their Critical Path to success or a costly Delay. The first step along the path (see below) for each applicant is the need to respond to its Clarifying Questions (CQs), particularly the Financials ones. As of today a small number of global brand applicants have already been withdrawn, reducing the number of applications to 1905. Were their applications' unprepared? I believe that this trend will continue at a pace now, and especially given that applicants can a get a 80% refund on their $185000 application fee if they withdraw before the Initial Evaluation(IE) results are due. The 23 March is one critical key date by which some (see below) applicants receive their IE results, which is looming up fast. My feedback from many applicants through our previous involvement in the financial evaluation process, (developing financial models, advising and offering guidance and financial commentaries on the key financial questions (45- 50)) is that many applicants (and their consultants) are in overload. Are you in agreement with this comment and that the situation is likely to deteriorate. Key Background Information and the "Fadi Effect": But firstly let us briefly look at the background and how applicants arrived at this critical point. The recent arrival of the very impressive Fadi Chehade, as CEO of ICANN, has clearly made a huge impact. I'll call it the "Fadi Effect". Back in June 2012 in London I was one of the lucky people in attendance, with the world wide press when ICANN announced that there were 1930 applications to ICANN to operate a TLD Registry. Each one an Internet start up, with no prior knowledge of operating a gTLD. The monopoly age of .com was dead, perhaps. This ushered in DNS 2 and a huge expansion, and a huge investment by each applicant. $185000 was required — just to apply. ICANN, a not for profit, was in receipt of $357,050,000, increasing overnight its balance sheet by four times. New players came into the DNS space, headed by Google, Amazon, Apple, Microsoft, and everyone else under the guise of competition and consumer choice. The Game Theory and Internet landgrab had began. Will total user confusion result when those lucky applicants (with early Draw and critical competitive advantage) are expected to go operationally live in Quarter4 2013? ICANN staff, through its multistakeholder — bottom up — consensus driven policy development process had put together an Applicant Guidebook. It took six years to write, ending up on Version 12 with 352 pages. Each applicant for a string had to put together financial, technical and operational business models using worst case and most likely business case scenarios, with fifty questions to be answered, to be evaluated and points scored. Despite those six years, twelve versions, the Applicant Guidebook has more holes in it than a typical swiss cheese. US lawyers are going to have a field day. ICANN beware. Whether the whole gTLD evaluation, processes, contractual agreements with ICANN, implementation, delegation to IANA's root zone should go ahead is a very mute point. The recent appointment of the very impressive Fadi Chehade as CEO and the "Fadi Effect" appears to have put the whole program back on track. He put his neck on the line committing ICANN to meet agreed target dates. So far so good. Applicants' Key Strategic Dates So what are these key dates that all applicants, their consultants need to have at their fingertips to better enabled them to make key decisions on short and long term strategies. What are the Priorities. Priority 1 has to be the resubmission of Clarifying Questions (CQs), particularly the Financial related ones to achieve the required pass score at Initial Evaluation. (See Q&As below)
Evaluation ProcessesClarifying Questions - FinancialStart: 14 January 2013 – Closes: 29 May 2013Clarifying Questions - TechnicalStart: 14 January 2013 – Closes: 29 May 2013Objection PeriodClosed: 13 March 2013Independent ObjectorClosed: 13 March 2013Contention SetsPublished: 3 March 2013Contention Set ResolutionsOn going from 3 March 2013Closed Generics Public CommentsClosed: 7 MarchInitial Evaluation Results (Batch 1)Published 23 March 2013GAC Advice at ICANN 46 BeijingStart: 7 April closes 11 AprilInitial Evaluation Results (Batch 2)Published 31 August 2013Public Interest Commitment (PIC)Closed: 5 MarchDelegation ProcessesPre Delegation Test PilotStart: 11 March 2013 – Closes: 5 April 2013Pre Delegation TestingStart: 22 April 2013 – ongoingPost Delegation ProcessesTrademark Clearing House (TMCH)Launches 26 March 2013Sunrise & Trademark Claims ServicesStart: 1 April 2013Contract Negotiations With ICANNStart: 15 April 2013Operational LiveEstimated Q4 2013 Applicants' Key Strategic Decisions Following the LA Priority Draw in December 2012 and the announcement on the 3 March 2013 of the completed list of Contention Sets (now 234 strings affecting 738 applications) each applicant can now analyse its critical path towards its gTLD Registry operational readiness and a successful new gTLD Registry start up. Applicants have so very many key questions that need answering quickly. Key decisions need to be made on what to do next. One has to assume that each application had a strategy on applying. Many it seems — did not. Clearly each applicant has different key issues, timelines, and action points and business critical, sensitive decisions to make. Applicant's Key Strategic Dilemmas: Applicants (and perhaps their business consultants) might identify with some of the following from the endless business scenarios along their critical path. 1. The applicant's business model is totally underfunded. This was not factored in (ICANN's models did not require a huge balloon payment for the auction costs of their contention set). Of course they had no idea when they applied, whether they would be in a contention set, let alone how many. Can additional funding be found? How much would be needed? What is the "economic worth" of operating and "leasing" that particular TLD string, currently in a contention set. Part 2 will be issued shortly on contention set valuations. 2. The applicant has already been hit by a Governmental Advisory Committee (GAC) early warning and further GAC advice is due at ICANN Beijing meeting. Should the worst be feared, in which case should the applicant withdraw now. How much refund would be offered or should the applicant fight back. 3. The applicant is in contention with Google and/or Amazon. What are the implications for their application with debate raging over closed-vertically integrated-generic-"industry word"-business models that the likes of Google and Amazon are using in their applications. 4.The applicant has been hit by the change to Q50b and now will not be able to answer the questions sufficiently well to enable them to get the maximum three points and so pass the Initial Evaluation. One and two points will not be enough. The applicant can elect to go to Extended Evaluation but that will delay their application at least seven months. The problem can be solved. ICANN will not help or engage with any applicant. If the applicant does not have a solution, we do. 5. The applicant deadline on PICs( Public Interest Commitments) has been missed. Many would argue that ICANN have forced them into this position, by failing to give them sufficient time to respond. As a result should only one be submitted, albeit belatedly. They have hundreds. Does each one have to be different. Maybe a change request should be submitted which would change their whole business model. Does that mean that the whole application needs reevaluating, causing inevitable delays. 6. The TMCH (Trade Mark Clearing House) will be open for business on 26 March. What does a corporation do next. What is the cost going to be to a global brand that didn't apply. What is the corporation's defensive strategy. What is the cost to a global brand corporation that did apply. 7. Loads of CQs have just arrived in the applicants' TAS inbox. The questions is what to do next. Response times are short and critical. This is what we will focus on in Part 1 today (see below). Key Applicant Questions and Answers The PART 1 focus will be on: Clarifying Questions (CQs) - Financials and Initial Evaluation Results Day Clarifying Questions (CQs) - Financials, 14 January 2013 – 29 May 2013 Currently 642 applicants have been issued with CQs- Financial as 6 march for Week 8, Prioritization Draw (PD) No 700-799. This is an alarming and surprisingly high number. Here are some typical Q&As. Why are they being issued? When did they start? Who, When, Which applicants will receive them? What is the turnaround time? Will ICANN/evaluators provide feedback and comeback? Has ICANN changed questions post AG?
Q: What are they?
Q: Which applicants and How many will receive them?
Q: What percentage of applicants have currently failed the Financial Capability Evaluation Test?
Q: Which of Q22-Q50 (Financial & Technical) questions were the worst answered?
Q: Has ICANN issued Advisories? Which Questions? Do they help? Are they proforma answers?
Q: What is the current status on CQ- Financials?
Q: When, To Whom are CQs- Financials being issued?
Started Week 1 w/b 14 January (Request our Priority, Contention Set Report (PCS) re CQ issue date).
Q: How long have applicants got to respond on all their CQs, from all panels?
Q: Can applicants contact the evaluation panels directly? Can they issue a CQ response early and request some feedback to resubmit again (within 4 week deadline)?
Q: Why were CQs- Financial & Technical being issued?
Q: What is applicant appropriate responses to CQs (Source: ICANN Webinar 6 March)?
A: They are:
Q: Who will get their Initial Evaluation Results, 23 march 2013? How many points do they require?
Q: What are the applicant's suggested CQ Financial strategy? A:
Written by Phil Buckingham, CEO of Dot Advice Ltd. Follow CircleID on Twitter More under: ICANN, Top-Level Domains Categories: Net coverage
Internal-Use SSL Certificates a Security Risk for Upcoming New gTLDs, ICANN WarnsLucian Constantin reporting from the IDG News Service: "The practice of issuing SSL certificates for internal domain names with unqualified extensions could endanger the privacy and integrity of HTTPS communications for upcoming generic top-level domains (gTLDs), according to a security advisory from the Internet Corporation for Assigned Names and Numbers (ICANN). The advisory was finalized by ICANN's Security and Stability Advisory Committee (SSAC) last week and warns that existing SSL certificates which have been issued for non-public domain names like those used to identify servers inside private networks, could be used to hijack HTTPS traffic for real domain names as new gTLDs become operational. ICANN oversees the Internet's top-level domain name space." Read full story: Computerworld Follow CircleID on Twitter More under: ICANN, Security, Top-Level Domains Categories: Net coverage
Internal-Use SSL Certificates a Security Risk for Upcoming New gTLDs, ICANN WarnsLucian Constantin reporting from the IDG News Service: "The practice of issuing SSL certificates for internal domain names with unqualified extensions could endanger the privacy and integrity of HTTPS communications for upcoming generic top-level domains (gTLDs), according to a security advisory from the Internet Corporation for Assigned Names and Numbers (ICANN). The advisory was finalized by ICANN's Security and Stability Advisory Committee (SSAC) last week and warns that existing SSL certificates which have been issued for non-public domain names like those used to identify servers inside private networks, could be used to hijack HTTPS traffic for real domain names as new gTLDs become operational. ICANN oversees the Internet's top-level domain name space." Read full story: Computerworld Follow CircleID on Twitter More under: ICANN, Security, Top-Level Domains Categories: Net coverage
Ito to Finally Get a DegreeOn May 24, together with Nate Silver, Caterina Fake and Kahlil Gibran Muhammad, I will receive an honorary doctorate from The New School. Thanks to Nancy Lublin and everyone at The New School for making this happen. It turns out that I'm actually an alum of The New School. Back in the fall of 1985, I took and completed two online courses - "Artificial Intelligence & Life" and "Propaganda: Lit Science" which were part of a batch of the first fully online graduate school courses for credit. (MOOC schMOOC!) It used a pre-World Wide Web system called EIES. I remember these courses fondly, especially the Propaganda course. They were really engaging and involved a lot of peer learning. With all of the excitement about massive open online courses (MOOCs), it's interesting to reflect that we've been doing versions of these since the 80s. Last year, MIT asked me to walk with the faculty during commencement, but I didn't have a academic robe. MIT offered to let me wear an MIT robe, but I felt it would be "grammatically incorrect" for me to wear a robe posing as a college graduate so I opted not to attend the official commencement. This year, I'll be able to walk with the faculty proudly wearing my gown from The New School. ;-) And no, I won't make you call me "Doctor Ito". Ha! Categories: Net coverage
Clearing up the "logjam": ICANN Must Drop its Request for a Unilateral Right to Amend the AgreementsA very rare thing happened in the GNSO Council meeting this week — the ICANN community spoke with one voice. Registries, registrars, non-commercial interests, new TLD applicants, IP owners and businesses unanimously and unambiguously agreed that giving ICANN a "unilateral right to amend" the registry and registrar agreements is not compatible with ICANN's bottom-up processes and poses a fundamental threat to the multi-stakeholder model. There is true consensus that this change should be rejected. On February 5, 2013, ICANN surprised the community by re-introducing its demand for a unilateral right to amend the gTLD Registry Agreement. ICANN made the same change in the Registrar Accreditation Agreements. (This was posted for public comment on March 7, 2013. See: Proposed 2013 RAA Posted for Comment). This move came without consultation, nearly five years after the new gTLD Program moved into the implementation phase, and three years after the community and ICANN, through a bottom-up process, rejected this approach and reached a compromise on similar language. During the GNSO Council's monthly teleconference on March 14, 2013, while discussing the recent changes to the Registrar Accreditation Agreement, Council members raised the topic of ICANN's proposed unilateral right to amend the registry and registrar agreements. ICANN staff present on the call explained its position, saying, "the amendment clause is actually intended to be last resort for when there is agreement that something needs to be done, but there is a logjam within the processes that we have that don't allow us to move forward." Essentially, ICANN is asking, "what happens when everyone agrees that a particular change is needed, but the multi-stakeholder processes — or someone manipulating those processes — prevents the community from moving forward with what the community wants." Taken in isolation and without any other context, this is a perfectly reasonable question. If there truly were no mechanisms in the registry or registrar agreements to make necessary changes when the community demands action, then ICANN staff's concerns would be justified. It would be a good question to ask if someone could use ICANN processes to block a change that everyone else supported. The fact is, however, that there already are a number of mechanisms ICANN can take to implement community supported changes. First, of course, contracted-parties can agree to make a change they support. Second, there is a bottom-up Consensus Policy mechanism for critical changes that ensures that any implementation is appropriately balanced across multiple constituencies and stakeholder groups. Truly important and time-sensitive issues can be addressed via Temporary Policies that remain in place for up to a year and, during that year, can be adopted as Consensus Policies. Finally, the new gTLD agreement contains a new mechanism that gives ICANN authority to make amendments supported by a specific percentage of the registry operators effective across the entire registry group. This is the compromise that was developed through a bottom-up process in 2009-2010 when the community rejected the unilateral change provision. ICANN agreed in 2010 that these three mechanisms gave it the necessary tools to amend the registry contract to implement changes demanded by the community. Apparently, it has had a change of heart and now wants the authority to unilaterally impose changes to the agreements. To date, ICANN's explanation is that the introduction of new gTLDs will change things in ways that cannot be anticipated. ICANN has not responded to community requests for a concrete example of when this right would actually be needed. Of course, the ICANN world is not unique — the future is inherently unknown, but parties enter into long-term contracts with high stakes all the time without introducing the kind of uncertainty that a unilateral amendment right would create. To borrow from the gTLD Registries comment made on February 26, 2013: "we are in the midst of dramatic change in the administration of the top-level domain name system. All businesses — whether for profit or nonprofit — require a measure of predictability, stability and certainty of contracts. Public and multi-national company applicants are subject to regulatory regimes that cannot be reconciled with the expanded unilateral authority ICANN is seeking. In deciding whether or not to utilize new gTLDs for their critical infrastructure assets, a key goal of the new gTLD program, registries cannot be subject to the whim of one private entity, even those acting under the guise of public interest, regardless of how well-intentioned that private entity purports to be." ICANN's proposal for this new mechanism, however, has been met with opposition not only from the new gTLD Applicants and existing registries, but also the registrars, non-commercial interests, businesses and IP owners. In fact, every single comment on ICANN's last minute changes to the new gTLD registry agreement called for its removal. EVERYONE is in agreement that this is a bad idea and should be withdrawn. The fact that the entire community has never been so aligned about a particular subject speaks volumes, but despite this clarity ICANN continues to insist on a unilateral right to amend the registry and registrar agreements, Ironically, in this case ICANN itself is creating a logjam that is preventing forward movement. By walking away from the version of the legal agreement contained in the final Applicant Guidebook, ICANN is preventing the new gTLD Program from going forward. This same issue is also the logjam preventing the roll out of a new registrar accreditation agreement containing enormous changes that would benefit registrants, law enforcement, intellectual property owners and Internet users in general. So in response to ICANN's question about clearing logjams, we think they are asking the wrong question. ICANN should stop worrying about the theoretical logjams of the future. It's time to take this request for extraordinary, unilateral power off the table in order to clear away today's very real logjam. Once this request is withdrawn, the new gTLD program can move forward and the Registrar Accreditation Agreement can be finalized. Written by Jeff Neuman, NeuStar, Inc., Vice President, Business Affairs Follow CircleID on Twitter More under: ICANN, Policy & Regulation, Top-Level Domains Categories: Net coverage
North Korea Suffers Internet Outage, U.S. BlamedAccording to reports, North Korea has accused the United States for conducting a cyberattack that has disrupted Internet connectivity in the country. "While the details of the cause of the disruption are unknown, we can confirm that in the last two days, North Korea's sole Internet provider has, in fact, suffered from disruptions in connectivity to the global Internet," reports Doug Madory from Renesys. "North Korea has an extremely small Internet for a country of 24 million people. Not counting the network involved in the recent Pirate Bay hoax, the four networks of North Korea are routed by a single Internet service provider, Star JV (AS131279), which has two international Internet service providers: China Unicom (AS4837) and Intelsat (AS22351). Star began service on 18 November 2010 and gained Intelsat as a provider on 8 April 2012."
UPDATE: Wed 20 Mar 2013 – South Korean authorities have reported that they have been victims of a cyber attack which impacted TV News organizations as well as banking institutions. According to Renesys, at least some of today's incidents escalated to the point of global visibility, as both South and North Koreans networks experienced actual disconnections. Also noted are similar timed outages affecting South Korea's largest natural gas company.
Other sources: (UPDATED Mar 20, 2013 12:04 PM PDT) Follow CircleID on Twitter More under: Cyberattack Categories: Net coverage
North Korea Suffers Internet Outage, U.S. BlamedAccording to reports, North Korea has accused the United States for conducting a cyberattack that has disrupted Internet connectivity in the country. "While the details of the cause of the disruption are unknown, we can confirm that in the last two days, North Korea's sole Internet provider has, in fact, suffered from disruptions in connectivity to the global Internet," reports Doug Madory from Renesys. "North Korea has an extremely small Internet for a country of 24 million people. Not counting the network involved in the recent Pirate Bay hoax, the four networks of North Korea are routed by a single Internet service provider, Star JV (AS131279), which has two international Internet service providers: China Unicom (AS4837) and Intelsat (AS22351). Star began service on 18 November 2010 and gained Intelsat as a provider on 8 April 2012."
UPDATE: Wed 20 Mar 2013 – South Korean authorities have reported that they have been victims of a cyber attack which impacted TV News organizations as well as banking institutions. According to Renesys, at least some of today's incidents escalated to the point of global visibility, as both South and North Koreans networks experienced actual disconnections. Also noted are similar timed outages affecting South Korea's largest natural gas company.
Other sources: (UPDATED Mar 20, 2013 11:04 AM PST) Follow CircleID on Twitter More under: Cyberattack Categories: Net coverage
ICANN's Trademark Clearinghouse Launches March 26. But There Is Time Before the First Sunrise.ICANN has announced that the Trademark Clearinghouse (TMCH) will "launch" on March 26. Brand Owners: Brace yourself. Soon every trademark law firm and corporate registrar will be screaming at you: — The Trademark Clearinghouse Is Here!
Here are some tips for brand owners to consider about ICANN's Trademark Clearinghouse: 1. Relax. Relax. This is advice probably no one is telling you. The truth is, you have some time before the first Sunrise Period. Yes, you should be thinking about your overall brand protection strategy regarding new TLD's now. Yes, you should be checking and updating inaccuracies on your trademark records at the local Patent & Trademark Office now. Yes, you should be compiling your documentation required for the TMCH now. This includes: Licensee and Assignee agreements, your proof of use marketing specimens and copies of trademark registrations for those countries that the TMCH will not be validating via an online database. But you have some time before the first Sunrise Period. How much time do you have before the first Sunrise? The first Sunrise is not likely to occur until summer or fall. The technical specifications for Sunrise were just released this week for public comment. Without a final spec., Registries and Registrars have not yet started programming their systems to support Sunrise and Claims. This gives you several months before any new TLD's launch. ICANN may try to push out the first Sunrise in June. But if so, it is likely to be a long extended Sunrise Period to allow for the on-boarding of Registrars and the slow summer holidays. Our suggestion? Don't act in haste or fold to high-pressure sales tactics from whoever wants your TMCH business. The Annual Meeting of the International Trademark Association (INTA) is in early May. Attend INTA and discuss the TMCH with your colleagues. Visit the exhibitors offering TMCH services (We will be there). You will then have at least another month or two before the first TLD Sunrise launches. There are no prizes for being first. The TMCH is offering an "incentive" for early filers, but the benefit is minimal. The offer is that if you apply early, then your anniversary date for renewals will be based on when the first TLD launches, as opposed to when you submitted your trademark to the TMCH. However, this may not be beneficial unless you plan to participate in that first Sunrise, which has not yet been announced. It could be an IDN. Why not give the TMCH some time to work out the kinks before submitting your trademarks? 2. Should you go direct or through a Trademark Agent? The TMCH will allow trademark owners to submit trademarks directly or through an authorized Trademark Agent. The authorized Trademark Agent can be an ICANN Registrar or Law Firm, but it does not need to be. Just be sure to select a Trademark Agent with extensive experience dealing with ICANN Sunrise Periods and a thorough understanding of how the TMCH will conduct its validation processes. Our suggestion is to wait until the INTA Annual Meeting and learn more about what your options are. To evaluate possible Trademark Agents, here are some areas to consider: Flexible payment options • The TMCH requires pre-payment for all submissions. The pre-payment can either be a credit card, with a maximum of 10 trademarks per order, or a $15,000 bank wire • In comparison, a Trademark Agent will likely extend you credit to enable post-payment One chance to make corrections • Deloitte, the TMCH validator, will be strict about your TMCH application matching the official trademark application. You get only one chance to get your application correct before paying an extra fee. • Pre-validation is a critical step you should take before submitting to the TMCH. If you are not equipped to do this yourself, find someone who will do it for you Sunrise management • ICANN expects to be eventually approving new TLD's at a rate of 20 per week. Who will keep track of the new Sunrise Periods you actually care about? • After your trademark is deemed eligible for Sunrise by the TMCH, you will receive a token called the Signed-Mark-Data (SMD) file. This has to be passed to each and every registrar you might use for a Sunrise period. Bulk management • If you have a lot of trademarks to submit to the TMCH, then entering them manually will cost time, money and get tedious fast • Trademark Agents using the TMCH programming interface (API) will be able to manage TMCH records in bulk Portability beyond the TMCH • At least one major TLD applicant, Donuts, has announced its own trademark blocking service for its TLD's. Called the Domain Marks Protected List (DPML), this block will protect your trademark in all of the Donuts TLD's. They've applied for over 300 TLD's with half of those uncontested. The DPML is not sold by the TMCH but will require that trademark owners first be validated for Sunrise eligibility by the TMCH. Who will manage these non-TMCH Rights Protection Mechanisms for you? Summary I hope these tips help remove some of the anxiety some trademark owners might have about the March 26 launch of the Trademark Clearinghouse. The key point is that this is not a race. You have plenty of time to get your trademarks in the TMCH before the first Sunrise Period. EnCirca has participated in nearly every Sunrise Period conducted by an ICANN TLD. We also offer real-time trademark validation services for TLD's via our TM.Biz subsidiary: We recently provided such services for the .PW and .XXX Sunrise Periods. And TM.Biz will be offering TMCH pre-validation services for Brand Owners, Trademark Agents and Registrars as well. Written by Thomas Barrett, President - EnCirca, Inc Follow CircleID on Twitter More under: ICANN, Top-Level Domains Categories: Net coverage
Independent Objector (IO) Launches Objection on New Applied-for gTLDsIndependent Objector (IO) has lodged objections on 24 new Applied-for gTLD (name scripts) before the International Chamber of Commerce (ICC) on 12th March 2013. IO has exercised his important role and functionality in favor of Public interests on the grounds of Limited Public Interest and Community. New gTLD name scripts .Med, .Health, .Hospital, .Amazon, .Indians are included in the list of objections filed. However non of the exclusively adult-content TLDs is included in the list of the Objection Filed by the IO. For many communities, such TLDs that promote pornographic content are a disgrace and an offensive to their religions and social norms. IO role was introduced by ICANN, who has to act solely in the best interests of global Internet users to look after their concern. IO only could file an objection, when at least one opposing comment is received from public and in cases where no other objection has been filed. The IO may file a Limited Public Interest objection against an application even if a Community objection has been filed, and vice versa. The IO has to remain Independent and neither ICANN staff nor the ICANN Board of Directors has authority to direct or require the IO to file or not file any particular objection. If the IO determines that an objection should be filed, he or she will initiate and prosecute the objection in the public interest. The responsibility for the selection of IO was delegated to M/s Odgers Berndtson. On 14 May 2012 ICANN finally announced the appointment of Professor Alain Pellet as the person who has to serve as the Independent Objector. IO has initiated notices of early warning to highly objectionable applications, however, IO has withdrawn from most of its objections. IO has reserved his right to file any formal objection, until the last date of objections submission, i.e. 13th March 2013. Exercising the role the Independent Objector (IO) lodged 24 Objections on new Applied for gTLD Names where the public opposing comments are already available. Separate objection are filed before the International Chamber of Commerce (ICC). The following list of objections will be examined by experts' panels appointed by the ICC and in light of the New gTLD Dispute Resolution Procedure from ICANN, the ICANN gTLD Applicant Guidebook, the ICC Rules for Expertise, the Appendix III to the ICC Rules for Expertise and the ICC Practice Note on the Administration of Cases.
Community Objections (filed by the Independent Objector):
Limited Public Interest Objections (filed by the Independent Objector):
Written by Imran Ahmed Shah, IT Consultant Follow CircleID on Twitter More under: Domain Names, ICANN, Internet Governance, Top-Level Domains Categories: Net coverage
New gTLD Brand Congress Emphasizes Consumers and InnovationThe New gTLD Brand Congress held earlier this week in New York provided terrific insight into how brands and New gTLD businesses are approaching the space. We saw evidence of forward movement and decision making. Overall, the main takeaways were: • Established brands need to focus on enhancing customer experience in a new .brand world; and • New gTLD businesses or registries will find security/stability to be critical for gaining public trust and connecting with representative communities. Big Brand Decision Making Case Study – CITIBANK (.citi) Mr. Louis Cohen, Citibank SVP of Internet and Digital Marketing, identified the critical questions that informed Citibank's decision making. The first question was "what extensions might be relevant?" Because Citibank has a wide scope of financial products/services, the Citibank team came up with hundreds of potential strings to consider, including .fin, .bank, .mortgage, .citibank, .creditcard etc. Next, Citibank considered how it might use a new string, and whether that use would enhance Citibank's customers' experience. Lastly, Citibank looked at whether its competitors would gain an advantage by pursuing certain strings and whether there were any "risks" to the Citibank brands. According to Mr. Cohen, Citibank "spent months" thinking through these questions. Ultimately, the value proposition for Citibank, according to Mr. Cohen, was to work toward creating a better consumer experience. The result will be taking Citibank's very large/diverse digital footprint and consolidating it into one .citi footprint that will be simpler for consumers and easier to protect from a security standpoint. "Citbank sees opportunity in consolidating its digital footprint into something only we can control" and will allow it to unite its global internet presence "making it easier across the board", stated Mr. Cohen. Mr. Cohen noted that Citibank would still be active in the .com/.net world and that it would have considerable work to do on the SEO front in order to make sure it adapts its content to be searchable in a New gTLD world and an increasingly "mobile first environment." Citibank is also considering the possibility of giving its customers their own .citi email address and contemplating how to treat 2nd level domains in a .citi TLD. Donuts – A Data Driven Process Mr. Richard Tindal, COO of Donuts, also spoke at the Congress and discussed the evolution of Donuts and its business plan. Donuts has garnered a lot of press because it applied for 307 New gTLD strings. Mr. Tindal explained that the Donuts process of picking strings was "intensely data driven." They considered terms which scored high in tests gauging factors such as longevity, usage, rate of entry, potential for conflict with existing brands etc. Donuts has created a proprietary algorithm to consider all these factors. Mr. Tindal stated that Donuts views its business as being similar to a "content agnostic" Internet Service Provider that would offer consumers "great domains" in interesting spaces and that Donuts planned to implement trademark/brand protections beyond those required by ICANN. Overall, Mr. Tindal estimated that Donuts would likely end up owning over 200 of the 307 gTLD strings it applied for. Innovation in the New gTLDs The final panel of the Congress focused on innovation and the future of the New gTLD space. Mr. Roland LaPlante, SVP and CMO at Afilias, Mr. Hal Bailey, Strategic Partner Manager at Google and Mr. Tim Switzer, CFO and COO of DotGreen, all spoke on the issue. The panel first discussed the existing challenges to the New gTLD system. Mr. LaPlante offered that the biggest challenges would be government interference and attempts "to control the [Internet's] naming system" as well as how ICANN and consumers respond when TLDs fail or are decommissioned. He wondered how this type of "shock" to the DNS system might affect Internet stability. From Google's perspective, Mr. Bailey explained that "consumer confusion" was a huge issue because the general public "doesn't know and doesn't care" about New gTLDs, and that it will confuse people and require a transition for users over a "consumer confidence" barrier, which he believes can be made rapidly. On the ICANN side, Mr. Switzer of DotGreen explained that many of the details regarding New gTLDs are "still in play," including important issues like the registry agreements. These would need to be resolved quickly in order for ICANN to meet its deadlines and will be important topics at the upcoming ICANN meeting in Beijing. He also noted that DotGreen has taken a hands-on approach to its involvement with the relevant "green" community by working with green organizations in local communities and creating "green" partnerships. This type of interaction will be an important part of making sure that DotGreen (and other gTLDs) connect with consumers. The panel also discussed the future of the DNS system in a New gTLD world. Mr. LaPlante cited unpublished research commissioned by Afilias (to gauge potential consumer attitudes and behaviors) which seem to indicate a positive reception for New TLDs:
Lastly, the panel agreed with Mr Bailey's assessment that there would be "a very large upward swing in technology over the next few years" and that the New gTLD system could bring innovation and fresh ideas to businesses. Written by David Mitnick, President DomainSkate LLC Follow CircleID on Twitter More under: Domain Names, Registry Services, ICANN, Top-Level Domains Categories: Net coverage
A Look at Why Businesses Buy Cloud Services?If you are a cloud provider, whether you are pure play or an internal IT department, it is very interesting to know who is buying cloud services, and why. In a recent survey by PB7 sponsored by EuroCloud Netherlands and others, a group of Dutch companies was interviewed about their motivations and hesitations around cloud computing. The survey's results were quite a bit more interesting than the usual lot. In this article I have cherry picked a few observations from the larger survey. The full survey is reported on in http://www.slideshare.net/peterthuis/ecm12-ghgg (in Dutch). The majority of companies are using cloud computing these days, and this includes government organizations by the way. That adoption rate is not growing so fast anymore. The growth is in the number of cloud applications that are being deployed (and presumably also in the number of users of those applications). How does cloud computing fit business strategy? Companies change for a number of reasons and objectives, and cloud computing as a driver is no different. Some organizations innovate using cloud computing, but from the survey it appears most are just optimizing business process, or even just substituting current solutions. Substitution happens when an existing solution is replaced by a cheaper one. Examples of these can be seen across the board. As you can expect from a wide survey, the most common applications are mail, messaging, document processing, sales, marketing, distribution, HR. One striking category though is field service where a lot of adoption is going on. Inhibitors for these types of applications include are the value of current investments ("the server in the closet has not been fully written off"). Optimization involves process change: doing things differently. This could involve people inside the organization as well as outside the organization. From anecdotal evidence, we know that collaboration tools are on the rise, in particular when they serve to communicate over organizational boundaries. Think procurement, project collaboration and marketplaces. These are the 'cloud native' apps so to say. The other category involves empowering the current workforce, especially if it is mobile already, a trend we see happening in airlines and retail. Cloud productivity solutions allow the inclusion of staff that was not equipped with computers before. This is clearly a big market for horizontal application suites such as Google Docs and Office 365. Vertical applications areas include HR and e-learning. The less predictable the workload, the bigger the advantage becomes that cloud applications have over non-cloud applications. About a tenth of the researched applications have a 'rapid growth' workload pattern, i.e. new applications, new business. For these categories cloud is by far the preferred solution. These trends align very well with two important cloud characteristics: elastic scalability (especially from a financial perspective), and broad network access (anytime/anywhere/anydevice). Broad network access allows the inclusion of users that are not within the corporate firewall. Infrastructure as a service (IaaS) is definitely on the rise across the board: small/large enterprises as well as governments. It is expected to increased penetration to 30 percent in 2014, a twofold increase in two years. Still, this is a lot less than the penetration of SaaS. As the number of cloud applications per organization rises, integration concerns increase. From the survey, it appears cloud consumers are seeing three different avenues to address these concerns. They call for open standards, they turn to cloud brokers to do the integration for them, and they hope to see ecosystems such as app stores providing this integration for them. Other concerns are security and privacy in general, though it is unclear to what extent these fears are actually translated into action. It is peculiar in this respect that only 40% of cloud users has a clear exit plan. There are quite a few implications for service providers in these findings. The biggest demand for cloud services is for rationalizing existing IT systems, and if they are internal, expanding their use cases to include mobile employees and business partners. As an extension of these, inclusion of more people and partners can allow business processes to be reengineered. Partnering with consultants to help effect these changes might make sense. Potential clients are concerned about integration and security risks. Conceivably, adequately addressing these concerns can be a selling proposition. For the mechanics of that, have a look at another article I wrote (see Can we simplify cloud security?). A lot of these concerns (including integration) are expressible in terms of the CSA Cloud Control Matrix (Disclosure: I updated some of these controls recently as a CSA volunteer). If you are a cloud provider and wonder how to improve your offering, you may be interested in having a look at www.cloudcomputingundercontrol.com where I have outlined a Governance, Risk Management and Compliance roadmap. Written by Peter HJ van Eijk, Cloud Computing Coach, Author and Speaker Follow CircleID on Twitter More under: Cloud Computing Categories: Net coverage
ITU Staff Gone WildIn virtually all governmental legislative bodies, the staff is there to provide secretariat services for the government representatives. The staff role does not include telling the representatives what decisions they should be making. The stricture is supposed to be the same at the International Telecommunication Union (ITU) for its treaty making activities. It is with some amazement that last week, the ITU secretariat staff showed up at a seminar in Bangkok they helped schedule — with a purported "ITU Presentation on WCIT-12 Outcome" to eighteen ITU Member States attempting to sell them on accession to the International Telecommunication Regulations (ITRs) flatly rejected by 55 nations (G55), with 49 additional ones remaining undecided. In other words, less than half the ITU Member States have signed — a stunning adverse result unprecedented in the history of the organization. The slick 36 slide presentation begins by misrepresenting ITU history, provides a completely one-sided view of the ITRs, and at the end, includes an accession form as one of the slides — suggesting that Member States bind themselves to the ITR provisions! The last slide makes the incredulous assertion that "the treaty provides a framework for the accelerated growth of ICTs at the national and international level, in particular to bring Internet access to the two-thirds of the world's population which is still offline, and to drive investment in broadband." The reality here is quite at odds with the SnakeOil sales pitch. The ITRs — which are a treaty instrument construct for the government-run electrical telegraph world of 1850 - are not exactly the right match for a hyper-dynamic, technology and investment driven world of 2013 driven by the global marketplace. There was a reason why 55 ITU Member Nations flatly rejected the ITRs and walked out of the meeting. The entire instrument plainly does not comport with today's world of telecommunications and information systems, and accepting the associated ITR-12 obligations is tantamount to consigning the nation to Internet impoverishment. Reiterating the socio-political acronym "ICT" like an incantation, when ironically the term remains undefined, achieves nothing. The ITU staff attempts to sweep the rejection of the WCIT-12 Final Acts under the carpet with the absurd assertion that it "compares with 1988 when 112 countries signed ITRs on the last day of the Melbourne conference." It does not. I helped run the secretariat for the 1988 conference for Secretary-General Butler. All the Member States present in Melbourne signed the Final Acts. None of them walked out of the conference. At that time, the ITRs arguably had some marginal justification. Today they are an anachronism and negative value proposition. In addition to being a treaty that patently was not needed, the ITR provisions that emerged at WCIT-12 crossed two "red lines" for the G55. They vastly expanded the relatively narrowly compartmentalized scope and effect of the existing ITR provisions to include all electronic communication services and apply to essentially anyone connected to a network. Furthermore, most of the ITR provisions are essentially operational, contractual, and regulatory options that vary greatly among different countries, and purport to rely on activities in an ITU-T that today is essentially non-functional because the work is almost completely accomplished in other global industry venues and arrangements. Twenty-nine nations have reduced their ITU contributions, and few countries today participate in ITU-T activity. It is ludicrous to think that all these fundamental infirmities of the ITRs will somehow become unimportant for the non-signatory nations. The ITU staff has scheduled another of the WCIT-12 sales shows in South Africa in July 2013. The action seems demeaning to the African nations as the ITU staff is not pursuing these events in Europe or North America where they would receive substantial opposition to their presentation assertions. In large measure, the entire WCIT-12 debacle was induced and facilitated by ITU elected officials and staff that encouraged and manipulated almost everything surrounding the conference. They obviously have not stopped. Engaging in this behavior is inappropriate. When the first permanent secretariat for an ITU precursor organization was created — the Berne Bureau that serviced the needs of the signatories to the Convention télégraphique internationale de Paris (1865) et Règlement de service international (Paris, 1865) — it was made clear that the staff were not to become involved in substantive legislative work done by the Nation States among themselves. That important stricture was obviously lost over the past decade. Written by Anthony Rutkowski, Principal, Netmagic Associates LLC Follow CircleID on Twitter More under: Internet Governance Categories: Net coverage
ICANN Releases Guideline for Coordinated Vulnerability Disclosure ReportingICANN has released a set of guidelines to explain its Coordinated Vulnerability Disclosure Reporting. The guidelines serve two purposes, says ICANN: "They define the role ICANN will perform in circumstances where vulnerabilities are reported and ICANN determines that the security, stability or resiliency of the DNS is exploited or threatened. The guidelines also explain how a party, described as a reporter, should disclose information on a vulnerability discovered in a system or network operated by ICANN." Coordinated Vulnerability Disclosure refers to “a reporting methodology where a party (‘reporter’) privately discloses information relating to a discovered vulnerability to a product vendor or service provider (‘affected party’) and allows the affected party time to investigate the claim, and identify and test a remedy or recourse before coordinating the release of a public disclosure of the vulnerability with the reporter.” Illustration of a Coordinated Disclosure Process – The roles and relationships of parties typically involved in a coordinated disclosure. Source: ICANN (Click to Enlarge) Follow CircleID on Twitter More under: Cyberattack, Cybercrime, DNS, ICANN, Malware, Security Categories: Net coverage
ICANN Releases Guideline for Coordinated Vulnerability Disclosure ReportingICANN has released a set of guidelines to explain its Coordinated Vulnerability Disclosure Reporting. The guidelines serve two purposes, says ICANN: "They define the role ICANN will perform in circumstances where vulnerabilities are reported and ICANN determines that the security, stability or resiliency of the DNS is exploited or threatened. The guidelines also explain how a party, described as a reporter, should disclose information on a vulnerability discovered in a system or network operated by ICANN." Coordinated Vulnerability Disclosure refers to “a reporting methodology where a party (‘reporter’) privately discloses information relating to a discovered vulnerability to a product vendor or service provider (‘affected party’) and allows the affected party time to investigate the claim, and identify and test a remedy or recourse before coordinating the release of a public disclosure of the vulnerability with the reporter.” Illustration of a Coordinated Disclosure Process – The roles and relationships of parties typically involved in a coordinated disclosure. Source: ICANN (Click to Enlarge) Follow CircleID on Twitter More under: Cyberattack, Cybercrime, DNS, ICANN, Malware, Security Categories: Net coverage
Security and Reliability: A Closer Look at Penetration TestingAs noted in my first article of this series (see part one, two and three), security and reliability encompass holistic network assessments, vulnerability assessments and penetration testing. In this post I'd like to go deeper into penetration testing; however, first, let's go back for a quick refresh before getting started. There are three broad steps any organization can take with respect to security and reliability to get a handle on their current security posture, whether internal (corporate or "inside the firewall") or external (Internet or "outside the firewall"). These include a series of in-depth assessments that include network, vulnerability and penetration testing. • Network Assessment – Network assessment is a broad term that might encompass a holistic view of an organization's Internet security posture both internally and externally. A network assessment can be tailored to specific security requirements for any organization, but ultimately the assessment will provide a baseline gap analysis and remediation steps to fill those gaps. • Vulnerability Assessment – Once your baseline network assessment is completed, an organization may wish to perform periodic vulnerability assessments. Whether internal or external, vulnerability assessments can uncover critical gaps in security that may lead to credential leaks, intellectual property theft, or denial of service to employees or customers. A well-planned and well-executed vulnerability assessment should eliminate false positives, but it can never give an organization 100 percent confidence that a specific vulnerability cannot be exploited. Vulnerability assessments should be executed on at least a quarterly basis, but it's not uncommon for larger organizations to execute them monthly. • Penetration Testing – The next and final step in assessing your organization's security and reliability is penetration testing. While I typically say that vulnerability assessments give you a "95 percent confidence level" that a vulnerability exists, penetration testing can give you 100 percent confidence that a specific vulnerability exists as well as show you how it can be exploited by attackers. Now that we are all caught up, let's dive in to penetration testing. What is a penetration test? A penetration test typically follows a full vulnerability assessment, after you have identified systems with known or suspected vulnerabilities. The existence of vulnerabilities may be obvious, or may require exploitation to validate. By definition, penetration testing involves exploiting a vulnerability to prove its existence or to expose other previously unknown vulnerabilities, or even additional systems, not previously known or tested. Once you've completed a vulnerability assessment, you must build an attack profile for penetration testing and then execute your attacks. Step One: Attack Profile In the attack profiling phase, you must conduct research on your vulnerabilities to determine the best tools to use to attempt exploitation. There are a plethora of commercial, free and open source penetration testing toolkits, including:
There are many more scripts and toolkits you might use for both vulnerability assessments and penetration testing, such as wireless discovery applications, packet capture applications, port scanners, etc. We'll cover some of the more common tools in future articles. There are too many details to cover in this overview, but suffice it to say a penetration test engineer must understand the underlying operating systems, applications and protocols for the vulnerabilities they are trying to exploit. Exploits may be common to a given application regardless of the platform (operating system and protocols), but they may also be a very specific combination of hardware platform, operating system, application, protocols, and even network elements to include routers, switches and firewalls. The commercial toolkits listed above provide a good framework and automation for running exploits, but they all have many configuration parameters, variables and scripts related to very specific vulnerabilities that one must understand in order to execute and effective penetration test. To paraphrase a famous line from the movie Caddyshack, "be the exploit!" Step Two: Attack Execution Now, the real work begins. You may understand the vulnerability, you may have your tools and scripts ready to execute and exploit the vulnerability, but inevitably things won't go as planned. As with vulnerability assessments, you may have to adapt your profile because you find that a firewall or network ACL (access control list) is blocking communication in one direction or a given vulnerability cannot be exploited for unknown reasons, or operating system/application fingerprinting was inaccurate. There are many scenarios that may cause you to alter course and change tools or methods to attempt exploitation. In Summary Penetration testing (and security on the whole) can be as much art as science, but hopefully this article rounds out our series on security and reliability and gives you some insight on the importance of including this as part of your organization's processes. Ultimately, you will gain confidence in assessing risks and determining which vulnerabilities should be considered real, requiring mitigation. This is the very best way to be prepared for real-time risks and attacks. Written by Brett Watson, Senior Manager, Professional Services at Neustar Follow CircleID on Twitter More under: Cyberattack, Malware, Security Categories: Net coverage
EFOW Wants Total Protection for Geographical Indications Domains in .VIN, .WINE and All Other TLDsThis is a letter sent from the European Federation of Origin Wines (EFOW) to the courteous attention of Dr Steve Crocker, Chair of the ICANN Board , Mr Cherine Chalaby, Chair of the new gTLD Program Committee Board, Mr Fadi Chehadé, CEO of ICANN and Mr Akram Atallah, COO of ICANN. This letter, sent by its President Riccardo Ricci Curbastro, was sent today to ICANN and is entitled "ICANN initiatives for the attribution of new generic top-level Internet domains — PDO and PGI wines' concerns”. The letter: "Dear Madam, dear Sirs, EFOW, the European Federation of Origin Wines, a Brussels based-organisation representing PDO (Protected Designation of Origin) and PGI (Protected Geographical Indication) wines towards European and international institutions, would like to bring to your attention a crucial issue for the safeguard of our sector concerning the attribution of new generic top-level domains (gTLD) by your organisation. We are concerned that this new procedure could lead to the abuses of our members' Intellectual Property Rights (IPRs). As far as we are informed, at the current stage of the ICANN procedure, three private firms have applied to manage a new Internet domain ".wine" and another candidate applied to manage the domain ".vin". Should registrars obtain these new gTDLs, they will be able to commercialise them and allow individuals and/or organisations to combine these gTDLs to a second-level domain name to create a personalised web address, as for instance "chianti.wine", "champagne.vin", "rioja.wine", "port.vin". As you may know, Geographical Indications (GIs) are, according to the WTO TRIPs agreement, indications which identify a good as originating in the territory of a Member, or a region or locality in that territory, where a given quality, reputation or other characteristic of the good is essentially attributable to its geographical origin, for example, "Champagne", "Tequila", "Parma Ham" or "Roquefort". As such, these GI names, like trade marks, enjoy protection as IPRs at the international level and in all WTO Member States. Considering the above, EFOW believes, as they stand, your organisation's rules on the new gTLD do not allow for the protection of GIs which are recognised IPRs. In fact, applicants will only have to abide by "specification 5" according to which operators shall prohibit the registration of country and territory names recognised by the United Nations or of their ISO codes in front of the extensions ".wine" and ".vin". Moreover, we are concerned that none of the four projects mentioned above, commit to the protection of GI wine names. Finally, we are also preoccupied by the fact that these projects envisage the possibility of registering "premium" domain names attributed by public auction to the highest bidders without any further specifications. ICANN's rules and these applications in their actual form thus raise serious concerns for our sector given that they could lead to abuses of GI names on domain names.
We would like to underline that EFOW is not opposed to the attribution of new gTDLs provided that ICANN and registrars provide for the protection of GIs. The current Trade mark Clearinghouse scheme is, however, not sufficient and does not respond to the needs of the GI wine sector. www.efow.eu
EFOW has already raised its concerns with relevant EU countries and would like to know whether ICANN intends to modify its' procedures to allow GI right holders to have the same rights and guarantees as the ones given to trade marks owners. We thank you in advance for taking into consideration our observations and would welcome an open discussion on this specific issue." Will ICANN want to open the discussion and offer a better protection to PDO and PGI wines? Written by Jean Guillon, New generic Top-Level Domain specialist Follow CircleID on Twitter More under: Domain Names, ICANN, Internet Governance, Policy & Regulation, Top-Level Domains Categories: Net coverage
ICANN New gTLD Program SWOT Analysis: OPPORTUNITIES (Part 3)The SWOT analysis is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture (source Wikipedia). OPPORTUNITIES 1. For Registries (new gTLD applicants: brands and non brands):
a) New gTLD applicants to sell domain names = earn cash. When Registrars of the Registry's accredited network sells 1000 domain names at the price of at $5, the Registry earns $5000;
2. For Service providers (Back-end registries, law firms...):
a) Back-end registry providers to earn much more cash as most of their business model is based on the number of domain names sold by new gTLD applicants: the more domain names are sold, the more cash gets in. They will probably be the one to earn most of the money from this first round.
3. For ICANN:
a) ICANN has the opportunity to work with global regulatory bodies, including the United States Patent and Trademark Office, to define how ALL public roots will be regulated, not just ICANN. ICANN should work with global governments to establish top level domains as a legal business class so that trademark law can be applied to Top Level Domains. This would get ICANN out of the business of defining trademark protections for the Top Level Domain industry and back INTO the business of approving new registry operators. ICANN should not do both (Mary Iqbal).
4. For Registrars:
a) More domain names to offer to their clients: every new gTLD launching is an opportunity to contact an existing client and sell him something;
5. For Registrants:
a) An opportunity for develop online identities with precision using more descriptive domain names;
6. For Domainers (they buy domain names to re-sell them):
a) Domainers are always the first one informed about new launchings and what is the best and efficient way to acquire a domain name. With so many new domain names to acquire and so much money to spend, there will be opportunities to acquire generic domain names. Sports new gTLDs should interest domainers: just city names could offer very good opportunities.
7. For CyberSquatters (they buy domain names to try to re-sell them to owners with a prior right...or not):
a) Same as usual: they will continue to exist and proliferate as their is no better mechanism in place to block them;
To come: THREATS (Part 4) Written by Jean Guillon, New generic Top-Level Domain specialist Follow CircleID on Twitter More under: Top-Level Domains Categories: Net coverage
Thinking Carefully About New gTLD Objections: Legal Rights (4 of 4)This last article on the four new gTLD objections will look at the Legal Rights Objection ("LRO"). While other articles in this series have touched on trademark concepts at certain points (see part one, two and three), issues from that area of the law predominate in LRO. Here we review the pertinent LRO-related trademark concepts, with which many readers likely will have some familiarity from working with domains and the UDRP. Still, the theme of the first three articles applies here: Potential objections are more involved and complicated than they may seem, and require careful thought if they are to be made. Standing: Analyzing any new gTLD objection always begins with standing — namely, whether the objector has the right to raise a claim in the first place. AGB 3.2.2. The LRO does not have standing requirements nearly as strict as those for community or as wide-open as those for limited public interest objections, but does require an objector to establish its status as a "rightsholder." While there is not explicit designation of the exact "rights" needed for standing, the Guidebook's later section on the objection standards clearly refers to trademark — i.e., a name, brand, term or characteristic that recognizably identifies its individual or institutional owner, including celebrities who have rights of "publicity." See, e.g., Frampton vs. Frampton Enters, Inc., Case No. D2002-0141 (WIPO, Apr. 17, 2002)(peterframpton.com). [Note: Also, while the Guidebook also addresses rights of an inter-governmental organization ("IGO"), which involves a relatively narrow subset of potential objectors, so it will not be directly addressed here.] Logistics and Cost-Planning: Trademark owners and those with prior experience in UDRP procedures will see a familiar face with respect to LRO: the World Intellectual Property Organization ("WIPO"). WIPO has a very informative FAQ page which will cover what would-be objectors need to know (along with model objection and response form), and the ICANN Webinar of Mar. 6, 2013 contains additional information. Suffice to say here simply that with LRO both the filing and expert costs are levied on a flat-fee basis (recall that ICC Expert fees are billed hourly) and parties have the option to choose the size of the panel (either one or three experts). Myself, I always try to garner a three member panel whenever that option is available. All documents are (as with the other three objections) submitted in English and with a limitation of 5000 words (or 20 pages, whichever is less, excluding attachments). Objection Standards: Once an objector establishes standing under the relatively straightforward standard above, it must then tackle the merits of the objection. What must the objector show to prevail? Practitioners who are familiar with trademark and domain name disputes will recognize that the LRO standard incorporates elements employed in these areas. A LRO panel must determine whether an applied-for string:
AGB § 3.5.2. Some of these buzzwords suggest both trademark dilution ("distinctive character" and "reputation") as well as infringement ("likelihood of confusion"). However, rather than delve into all the nuances of the multipart tests used by courts when analyzing these concepts — see, e.g., AMF Inc. v. Sleekcraft Boats, 599 F.2d 341, 348 (9th Cir. 1979) — simply consider this: is it sufficiently likely that a reasonable person will become confused into thinking that a term associates a particular string with one company when it really belongs to another? If not, then look at whether the mark at issue is really well-known as a brand and very unique. If the answer is not an (extremely) emphatic "yes" to either one of these questions, then pursuing an LRO is probably just wasted effort and expense. So where does one look for help on these issues? Since ICANN has provided a number of helpful guidelines for LRO, we of course will go through those first. Trademark Factors: Section 3.5.2 of the Guidebook lays out a number of expressly "non-exclusive" criteria for determining whether an applied-for string creates a likelihood of confusion or will injure the distinctive nature or reputation of a mark. None will strike trademark or UDRP professionals as particularly unusual, although simplicity in concept can belie greater complexity in practice. 1. Similarity in Sight, Sound and Meaning A LRO panel will examine whether the applied-for gTLD is identical or confusingly similar in appearance, sound or meaning to the objector's mark. For this test, consider the obvious: Regarding sight, do the mark and the string look visually similar? Since TLDs do not involve graphic representations, colors, fonts and the like, the inquiry essentially comes down to spelling. As to sound, say the mark and string out loud to yourself. Do they sound essentially the same? See Deutsche Telekom AG v. foxQ, Case No. D2004-0102 (WIPO, Mar. 7 2004) (UDRP complaint denied despite some sound similarity between domains t-online.com and d-online.com). On meaning: Take into account what term(s) make up the mark and the string. Do they typically have only one connotation or several? This can matter a great deal when examining terms that have generic, descriptive or common dictionary meaning. See, e.g., Advertise.com, Inc. v. AOL Advertising, Inc., 616 F.3d 974, 978-979 (9th Cir. 2010)(advertising.com)(copy of court decision available at: http://1.usa.gov/ZyaxQI); see also Hasbro, Inc. v. Clue Computing, Inc. 66 F. Supp. 2d 117, 133 (D. Mass. 1999) (clue.com). Simple, right? Well, lawyers have come up over the years with complications even to these apparently straightforward inquiries. Among other things:
2. Objector's Bona Fide Acquisition and Use of Trademark Rights A LRO panel also will consider whether the objector legitimately acquired or has used the mark at issue. UDRP colleagues often examine the efficacy of the complainant's asserted rights, including for lack of protectability, lack of authorization or fraudulent procurement. 3. Public Sector Recognition To what extent does the relevant sector of the public recognize the rightsholder's mark? As in trademark litigation, this may require survey evidence. 4. Applicant's Intent in Applying for the gTLD This fourth element calls to mind the "bad faith" factor in UDRP and cybersquatting cases. It asks whether the applicant knew of the objector's mark at the time applying for the gTLD, or whether the applicant has a "pattern" acquiring or operating domains confusingly similar to the marks of others. Of course, this applies only to protectable marks, and not to dictionary or generic terms, where intent to confuse either cannot be inferred or is legally meaningless. See, e.g.,Hero, Inc. v. The Heroic Sandwich, Case No. D2008-0779 (WIPO, Aug. 13, 2008) (hero.com). 5. Applicant's Bona Fide Use This factor allows a panel to evaluate the extent to which the applicant has used (or demonstrably prepared to use) the gTLD corresponding to the objector's mark. While UDRP cases often feature the registration (and little else) of a second-level domain, an applicant for a new gTLD can cite substantial investments in time, resources and money preparing the application and putting backend technology into place. Moreover, using a common word as a domain for its inherent value in attracting internet traffic, even if that term happens to correspond to another's trademark, does not violate the other's rights. Mobile Communication Service Inc. v. WebReg, RN, Case No. D2005-1304 (WIPO, Feb. 24, 2006) (mobilcom.com transfer denied). 6. Applicant's IP Rights Next, a panel looks at "whether the applicant has marks or other intellectual property rights in the sign corresponding to the gTLD," and, if so, whether such acquisition and use of the sign has been bona fide, and whether the likely use of the gTLD by the applicant is consistent with such acquisition or use." This would pertain to "Dot Brand" TLDs, but not to the many new gTLD applications with generic terms, as these serve no source-identifying function. See Image Online Design v. ICANN, 2013 U.S. Dist. LEXIS 16896, 22-24 (C.D. Cal. 2013) (quoting Advertise.com and finding no protectable interest in plaintiff's alleged .WEB "trademark" — which was also the subject of a prior TLD application) (copy of court decision available at: http://bit.ly/15CWCwV). 7. Applicant Commonly Known by Applied-For TLD Taking another page from the UDRP playbook, this factor examines whether and to what extent a TLD applicant has been "commonly known by sign corresponding to the TLD and if so, whether any purported or likely use of the gTLD by the applicant is consistent therewith." This will entail case-by-case analysis since, for example, under the UDRP respondents have become "commonly" known by their domain names simply by having formed a company and done business under that name. 8. Likelihood of Confusion Likelihood of confusion appears both in traditional trademark and domain name disputes, although not in as much detail in the latter setting. Many of the factors above go into a typical judicial likelihood of confusion analysis. Without repeating myself, I simply suggest keeping practical considerations in mind. Among the most important: evidence of actual confusion serves as one of the strongest indicators of a likelihood of confusion, whether from customer service inquiries or other "real-world" data points, or from consumer surveys conducted specifically for the dispute. 9. Other Considerations I have noted a number of proverbial "bumps" in the objector's "road" above when discussing the Guidebook's specific LRO criteria. However, other overarching considerations also may be back in the mind of a panelist seasoned in trademark and domain name-related matters, and since the LRO factors are explicitly referred to as being "non-exclusive" there would seemingly be no reason not to take them into account. Fair Use and Free Speech: First, how do free speech-related defenses such as "fair use" or "nominative use" fit into the LRO context? For readers who are not familiar with the concepts, trademark "fair use" typically involves a mark that is capable of describing the goods or services offered under that mark. Although one may own trademark rights in a descriptive term in certain contexts, "such rights will not prevent others from using the word ... in good faith in its descriptive sense, and not as a trademark." Car-Freshner Corp. v. S.C. Johnson & Son, 70 F.3d 267, 269 (2d Cir. 1995). "If any confusion results to the detriment of the markholder, that was a risk entailed in the selection of a mark with descriptive attributes." Id. at 270. Holders of trademark rights in these types of terms would likely face an uphill battle challenging their use in a New gTLD in a generic or descriptive sense. On the other hand, "nominative" use comes up in situations involving "fair comment" about or criticism of something else. See New Kids on the Block v. New Amer. Pubs., 971 F.2d 302, 308 (9th Cir. 1992). It seems doubtful that an applicant would shell out $185,000 for a new gTLD simply for the narrow purpose of commenting on or referring to something else, making a nominative use defense unlikely to arise. The Generic Nature of Many TLDs: Similar to the rationale described above involving "fair use" and freedom of speech, would-be objectors should know that, prior to the new gTLD program, courts have held top-level domains as being too generic to even be capable of serving as a trademark in the first place. Cases (in the U.S., at least) uniformly hold that adding a ".com" TLD to an otherwise common word will not confer trademark rights in the combined term. "Because TLDs generally serve no source-indicating function, their addition to an otherwise unregistrable mark typically cannot render it registrable." In Re: Oppendahl & Larson,, 373 F.3d 1171, 1174 (Fed. Cir. 2004) (patents.com). See also Image Online, supra, 2013 U.S. Dist. LEXIS 16896 at 22-24 ("the mark ".WEB" used in relation to Internet registry services is generic and cannot enjoy trademark protection"). Accordingly,expect to see LRO filings being mostly limited to just very unique, highly distinctive "dot-brand" gTLDs and not for generic "dictionary" words. No Per Se Dilution For Domain Names: Even holders of marks that are considered famous," "well-known" or having a "reputation" may encounter difficulty relying solely upon a dilution claim rather than likelihood of confusion in mounting an LRO challenge. By way of example, courts in the U.S. have steadfastly refused to impose a "per se" (i.e. "blanket") rule for dilution in domain names. "Ownership of a famous mark does not result in automatic entitlement to ownership of the mark as a domain name." Nissan Motor v. Nissan Computer, 2007 U.S. Dist. LEXIS 90487, 45, citing Hasbro, supra, 66 F. Supp. 2d at 133. Trademark-savvy LRO panelists will no doubt take heed of the potential for abuse in dilution claims and instead require the higher likelihood of confusion threshold to be met. See, e.g., Clue.com, supra, at 135, quoting 3 J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition § 24:114 (4th ed. 1996) ("The dilution doctrine in its 'blurring' mode cannot and should not be carried to the extreme of forbidding the use of every trademark on any and all products and services, however remote from the owner's usage"). Conclusion While LRO would appear to have a somewhat greater likelihood of success than the other three objection types in situations involving particular distinctive and very well-known marks, the same does not hold true for the entire new gTLD landscape, which is populated by a number of applications for generic and descriptive strings,. In the latter scenario, the hill is every bit as tough to climb. Rightsholders would be wise to look carefully for real trademark protection rather than just descriptive uses of their brands in New gTLDs before embarking on the LRO path. This wraps up my series on new gTLD objections, and I hope that everyone has found them helpful and informative. As always, please feel free to reach out to me at any time with any questions. I'll see you all in Beijing! Written by Don Moody, Domain Name & IP attorney in Los Angeles, co-founder of New gTLD Disputes Follow CircleID on Twitter More under: Domain Names, ICANN, Internet Governance, Law, Policy & Regulation, Top-Level Domains Categories: Net coverage
Mishandling the Registrar Contract NegotiationsBy publishing a draft Registrar Accreditation Agreement (RAA) for public comment before it has been agreed on by both parties, has ICANN dealt the bottom-up multi-stakeholder model a blow? ICANN Staff and the registrars have been negotiating a new version of the RAA for the past 18 months following requests by Law Enforcement Agencies (LEA) such as Interpol for greater consumer protection. With both ICANN and registrars working hard, by early this year agreement had been reached on 11.5 of the 12 LEA "asks" A deal looked close. Then at the last minute, ICANN threw extras at the proposed RAA, including an extraordinary provision for the ICANN Board to be able to force unilateral changes into the RAA at any time. Imagine signing a contract with someone where that person can change the contract at any time, without your input, and you are bound by those changes. Crazy, right? Even crazier in the ICANN world, built as it is on the premise of bottom-up consensus, not top-down "we'll change your contract when we damn well feel like it" tactics. Here's one we prepared earlier Still, disagreement in negotiations is no big deal. Surely all both sides have to do is simply continue talking and try to iron them out, right? Wrong when one side tries to push its way forward by publishing a draft agreement and portraying it as the result of these negotiations, even though that's clearly not the case and the other side has asked this not to be done. This is what's happened today, with ICANN putting the current draft RAA out for public comment. "Given the agreement in principle over so many areas, there were two paths forward: continue negotiations to address points that have been raised multiple times by each side, or put the agreement out to the community now for public input on the finalization of the agreement," says ICANN in a statement issued with the draft RAA. "After the long period of negotiations, as well as the import of the 2013 RAA to the New gTLD Program, ICANN feels that it is very important to take the RAA proposal to the community." At least no-one can accuse ICANN of not saying it like it is! The registrars have put out their own statement decrying the way ICANN has handled this. "All of the items that have been agreed to over the past 18 months would, by themselves, produce an RAA that is vastly improved over the current 2009 version. Nearly all of the Law Enforcement requests that were endorsed by the GAC have been included, as well as the major items that were requested by the GNSO. That RAA would bring registrant verification. That RAA would bring enhanced compliance tools. Registrars must emphasize that the key differences between that RAA and the one currently proposed by ICANN are not issues raised by Law Enforcement, GAC or the GNSO but by ICANN staff (underlined in the original statement)." Cart, horse, in that order It appears staff have been driven to put the cart before the horse by Fadi Chehadé's desire to wrap the RAA issue up. Chehadé named the RAA as one of his key deliverables when he formally took office late last year. Since then, he has surprised the community by introducing new requirements in the contract new gTLD registries will have to sign. Among them, the obligation to only use registrars that have signed the 2013 RAA. In other words, under Chehadé's instructions, ICANN is attempting to tie down new gTLD operators to a registrar contract that is still being negotiated. No wonder Chehadé wants these negotiations done sooner rather than later. Registrars feel this "surprise announcement that all new gTLD registries must only use registrars that have signed the 2013 RAA" is nothing more than "a transparent effort by ICANN to arbitrarily link the new gTLD program to the outcome of RAA negotiations." If enacted, they fear the requirement would create separate classes of registrars. "This is unprecedented in the DNS industry," they say. "There can and must be only one meaning of 'ICANN-Accredited'". Worse than this, registrars feel the attempt by ICANN to give its Board power to unilaterally amend the RAA could affect the multi-stakeholder model as a whole. "ICANN insisted on including a proposed Revocation (or "blow up") Clause that would have given them the ability to unilaterally terminate all registrar accreditations," registrars explain in their statement. "After major pushback, ICANN staff relented and in its place proposed giving the ICANN Board the ability to unilaterally amend the RAA. This is identical to what ICANN inserted into the proposed new gTLD registry agreement — a clause met with strong opposition not only from the Registry Stakeholder Group but from the broader ICANN community." So this is the real blow-up clause. "The effect of such a clause in the primary agreements between ICANN and its commercial stakeholders would be devastating to the bottom-up, multi-stakeholder model," the registrars argue. "First, it will effectively mean the end of the GNSO's PDP, as the Board will become the central arena for all controversial issues, not the community. Second, it creates an imbalance of authority in the ICANN model, with no limits on the scope or frequency of unilateral amendments, and no protections for registrars and more important registrants." Red alert I founded and ran a registrar for more than a decade. Today, as a consultant to the domain industry, I represent a registrar (NetNames) in the Registrar Stakeholder Group. Clearly, I am biased towards the registrar point of view in this debate, and this is probably the way some will read this article. But others know I am first and foremost a passionate defender of the multi-stakeholder model. Through 2 years of chairing the GNSO (up until last October) I always sought to defend that ideal when it was put under pressure. And since stepping down as Chair and getting my voice back, when the model is attacked I have spoken out to defend it. When Chehadé launched headfirst into the Trademark Clearinghouse discussions, I warned of the dangers of this approach and was impressed when he later recognised he may have been a little too hasty. With what is happening now on the RAA, isn't it time to sound the alarm bells once again? Chehadé seems to be adopting a "Janus approach" to solving ICANN issues. Publicly, he is engaging, energetic and I have gone on the record saying how much good I think the new CEO is doing ICANN's image worldwide. But in his more direct dealings with ICANN's constituencies, Chehadé seems to think that the end justifies trampling the model. Sure ICANN has its problems and sure everyone can only welcome a determined leadership approach to solving them, but for the unique governance experiment that is ICANN, this bidirectional approach risks making the cure look worse than the disease. Written by Stéphane Van Gelder, Chairman, STEPHANE VAN GELDER CONSULTING Follow CircleID on Twitter More under: Domain Names, ICANN, Internet Governance Categories: Net coverage
Google Bows to Pressure on Closed GenericsThe debate surrounding "closed generics", which has been covered several times in the past, has attracted a lot of attention in recent weeks. At the centre of the debate were a number of new TLD applications from large companies including Google, Amazon and others. Google had stated that they planned to establish a number of domain extensions and operate them as "walled gardens". At the ICANN public meeting in Toronto Google attempted to defend their plans and their position until today was unchanged. However in their submission to the comment period on "closed generics" this evening it's obvious that they have been forced to reconsider that position in relation to some of their applications, though their overall view remains unchanged: After careful analysis, Google has identified four of our current single registrant applications that we will revise: .app, .blog, .cloud and .search. These terms have been identified by governments (via Early Warning) and others within the community as being potentially valuable and useful to industry as a whole. We also believe that for each of these terms we can create a strong set of user experiences and expectations without restricting the string to use with Google products. With this in mind, we intend to work with ICANN, the Government Advisory Committee (GAC), and other members of the relevant communities to amend our applications with new registration policies (and, in some cases, new registry services) to achieve these aims. Details of these plans will be forthcoming in the near future. How that will translate into a policy and whether or not they will actually be granted the ability to run the domain name registries for these domain extensions remains to be seen, but the quite dramatic change in their position is welcome. You can read their full submission here. Written by Michele Neylon, MD of Blacknight Solutions Follow CircleID on Twitter More under: Top-Level Domains Categories: Net coverage
|
Recent comments
ICANN newsNet coverage |