Malicious Use of Orphan Glue Records Clause Samples

POPULAR SAMPLE Copied 1 times
Malicious Use of Orphan Glue Records. Registry Operator shall take action to remove orphan glue records (as defined at ▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
Malicious Use of Orphan Glue Records. Registry Operator shall take action to remove orphan glue records (as defined at ▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct. Initial Registration Periods. Initial registrations of registered names may be made in the registry in one (1) year increments for up to a maximum of ten (10) years. For the avoidance of doubt, initial registrations of registered names may not exceed ten (10) years.
Malicious Use of Orphan Glue Records. ▇▇▇▇▇ shall take action to remove orphan glue records when provided with evidence in written form that such records are present in connection with malicious conduct.
Malicious Use of Orphan Glue Records. Registry Operator shall take action to remove orphan glue records (as defined at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct. 2. Section 3(b) of Specification 11 is hereby amended and restated in its entirety as follows: b) Registry Operator will periodically conduct a technical analysis to assess whether domains in the TLD are being used to perpetrate DNS Abuse. Registry Operator will maintain statistical reports on identified DNS Abuse and the actions taken as a result of the periodic security checks. Registry Operator will maintain these reports for the term of the Agreement unless a shorter period is required by law or approved by ICANN, and will provide them to ICANN upon request.

Related to Malicious Use of Orphan Glue Records

  • Malicious Software Any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence. Management Charge The sum paid by the Supplier to CCS being an amount of up to 1% but currently set at 0.75% of all Charges for the Services invoiced to Buyers (net of VAT) in each month throughout the duration of the Framework Agreement and thereafter, until the expiry or End of any Call-Off Contract. Management Information The management information specified in Framework Agreement Schedule 6. Material Breach Those breaches which have been expressly set out as a Material Breach and any other single serious breach or persistent failure to perform as required under this Call-Off Contract.