ICANN/GNSO GNSO Email List Archives


<<< Chronological Index >>>    <<< Thread Index >>>

Re: [ga] Provider/User Balance

  • To: Richard Henderson <richardhenderson@xxxxxxxxxxxx>, General Assembly of the DNSO <ga@xxxxxxxxxxxxxx>
  • Subject: Re: [ga] Provider/User Balance
  • From: Danny Younger <dannyyounger@xxxxxxxxx>
  • Date: Mon, 21 Feb 2005 15:48:41 -0800 (PST)
  • Cc: "vinton g. cerf" <vinton.g.cerf@xxxxxxx>
  • Comment: DomainKeys? See http://antispam.yahoo.com/domainkeys
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; b=ZZQ0llraLmp3GHgYG11iCxsTUUCTIBAkeF+tovAz3aVX/M2FA2ipriDLe2SXWWTaEP/WGpGiShvaKj+TrXTlrXzSSSLRwjpRsExYJUJBQm8VW+HxYG2HinRGcslcBUGgZmp+CZuSROaG5rfRF5ibLZJ4YNIsWcCQdDwOWbfFWsk= ;
  • In-reply-to: <000801c5186b$8f64ea90$7a2cfd3e@richard>
  • Sender: owner-ga@xxxxxxxxxxxxxx

In response to Richard's remarks on the need for enforcement "teeth" and Vint's suggestion to float some ideas prior to moving the discussion to a PDP stage, I would begin by cautioning parties to this debate that "coercive" contract enforcement mechanisms are not the only options to consider.
Let us look at an extreme case highlighted by the recent hijacking of the panix.com domain.  It is certainly possible within the context of ICANN contracts to establish monetary penalties or sanctions such as a temporary loss of the ADD command privilege; on the other hand, non-coercive measures can also have a significant effect.  If, for example, it was widely reported that ICANN had concluded that a certain registrar breached their agreements and was tacitly responsible for a security lapse that resulted in a domain name hijacking, the public would assuredly choose to shun that registrar's service for a period of time.  That measure might be as effective as invoking financial penalties in order to obtain the desired results (protecting the security of the DNS).
It think it important that ICANN have at its discretion the right to employ non-coercive measures to secure contract enforcement if it believes that such measures may suffice to accomplish the goal of repairing a contract breech.  It would probably be wise to outline the range of coercive and non-coercive contract enforcement mechanisms available.  

Do you Yahoo!?
 Yahoo! Mail - Helps protect you from nasty viruses.

<<< Chronological Index >>>    <<< Thread Index >>>