<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p>Hi Mark,</p>
    <p>one per minute still sounds reasonable to me as it allows you
      1440 queries per day, which should be sufficient for most
      legitimate purposes (with most registrars), especially given that
      each request will have to be reviewed. I can tell you right now
      that if our registrars would get the full quota of such a rate
      limit, requests would get backed up pretty quickly. <br>
    </p>
    <p>And I guess no one will want a response like this:</p>
    <p>"Thank you for sending a disclosure request. Your request is
      currently number 356.152.425 in the queue, which means you can
      expect a response on or before December 21, 2119. "</p>
    <p>So setting realistic limitations will be essential for this
      system to work.<br>
    </p>
    <p>Harvesting and mining to me is any activity that is designed to
      indiscriminately access registration records either with the
      purpose of finding records that match a specific search parameters
      (mining) or is designed to create a duplicate copy of the
      registration base (or parts thereof).</p>
    <p>So harvesting is basically the preparatory activity of actors
      such as spear phishers, spammers, DomainTools, autocrat
      governments, etc, e.g. everyone who has an interest in obtaining a
      (partial) copy of the database for whatever purpose. <br>
    </p>
    <p>And mining is digging in the database with the hope of finding
      specific "gems".</p>
    <p>Others may have other or broader definitions, and these
      definitions may need more work, but these are my assiociations
      with these terms. <br>
    </p>
    <p>Best,</p>
    <p>Volker<br>
    </p>
    <div class="moz-cite-prefix">Am 09.10.2019 um 17:31 schrieb Mark
      Svancarek (CELA):<br>
    </div>
    <blockquote type="cite"
cite="mid:MWHPR21MB0512A2D651C1C06CF217FAF4D1950@MWHPR21MB0512.namprd21.prod.outlook.com">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <meta name="Generator" content="Microsoft Word 15 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
        {font-family:Helvetica;
        panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:"Yu Gothic";
        panose-1:2 11 4 0 0 0 0 0 0 0;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Consolas;
        panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
        {font-family:"\@Yu Gothic";
        panose-1:2 11 4 0 0 0 0 0 0 0;}
@font-face
        {font-family:"Helvetica Neue";}
@font-face
        {font-family:"Helvetica Neue Light";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Calibri",sans-serif;
        color:black;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:#0563C1;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:#954F72;
        text-decoration:underline;}
pre
        {mso-style-priority:99;
        mso-style-link:"HTML Preformatted Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:10.0pt;
        font-family:"Courier New";
        color:black;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
        {mso-style-priority:34;
        margin-top:0in;
        margin-right:0in;
        margin-bottom:0in;
        margin-left:.5in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Calibri",sans-serif;
        color:black;}
p.msonormal0, li.msonormal0, div.msonormal0
        {mso-style-name:msonormal;
        mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;
        color:black;}
p.p1, li.p1, div.p1
        {mso-style-name:p1;
        margin:0in;
        margin-bottom:.0001pt;
        font-size:9.0pt;
        font-family:"Helvetica Neue",serif;
        color:black;}
p.p2, li.p2, div.p2
        {mso-style-name:p2;
        margin:0in;
        margin-bottom:.0001pt;
        font-size:9.0pt;
        font-family:"Helvetica Neue",serif;
        color:black;}
p.li1, li.li1, div.li1
        {mso-style-name:li1;
        margin:0in;
        margin-bottom:.0001pt;
        font-size:9.0pt;
        font-family:"Helvetica Neue",serif;
        color:black;}
span.EmailStyle23
        {mso-style-type:personal;
        font-family:"Helvetica Neue",serif;
        color:windowtext;}
span.apple-converted-space
        {mso-style-name:apple-converted-space;}
span.EmailStyle25
        {mso-style-type:personal;
        font-family:"Calibri",sans-serif;
        color:windowtext;}
span.HTMLPreformattedChar
        {mso-style-name:"HTML Preformatted Char";
        mso-style-priority:99;
        mso-style-link:"HTML Preformatted";
        font-family:Consolas;
        color:black;}
span.EmailStyle29
        {mso-style-type:personal-reply;
        font-family:"Calibri",sans-serif;
        color:windowtext;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:948396141;
        mso-list-type:hybrid;
        mso-list-template-ids:469802438 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level2
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level3
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
@list l0:level4
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level5
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level6
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
@list l0:level7
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level8
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level9
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
@list l1
        {mso-list-id:1546215700;
        mso-list-template-ids:-221058036;}
@list l1:level1
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l1:level2
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:1.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:"Courier New";
        mso-bidi-font-family:"Times New Roman";}
@list l1:level3
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:1.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l1:level4
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:2.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l1:level5
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:2.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l1:level6
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:3.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l1:level7
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:3.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l1:level8
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:4.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l1:level9
        {mso-level-number-format:bullet;
        mso-level-text:;
        mso-level-tab-stop:4.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
ol
        {margin-bottom:0in;}
ul
        {margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
            style="font-size:11.0pt;color:windowtext;mso-fareast-language:JA">As
            we have not defined high volume, I think it is premature to
            say that its utility has passed.  Recall, a few days ago you
            said that 1 request per minute would be an acceptable rate
            limit.  That tells me we have a long way to go.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
            style="font-size:11.0pt;color:windowtext;mso-fareast-language:JA"><o:p> </o:p></span></p>
        <p class="MsoNormal"><span
            style="font-size:11.0pt;color:windowtext;mso-fareast-language:JA">Harvesting
            and mining are similarly undefined.  What detectible
            behavior would you prohibit?<o:p></o:p></span></p>
        <p class="MsoNormal"><span
            style="font-size:11.0pt;color:windowtext;mso-fareast-language:JA"><o:p> </o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #E1E1E1
            1.0pt;padding:3.0pt 0in 0in 0in">
            <p class="MsoNormal"><b><span
                  style="font-size:11.0pt;color:windowtext">From:</span></b><span
                style="font-size:11.0pt;color:windowtext">
                Gnso-epdp-team <a class="moz-txt-link-rfc2396E" href="mailto:gnso-epdp-team-bounces@icann.org"><gnso-epdp-team-bounces@icann.org></a>
                <b>On Behalf Of </b>Volker Greimann<br>
                <b>Sent:</b> Wednesday, October 9, 2019 1:53 AM<br>
                <b>To:</b> <a class="moz-txt-link-abbreviated" href="mailto:gnso-epdp-team@icann.org">gnso-epdp-team@icann.org</a><br>
                <b>Subject:</b> Re: [Gnso-epdp-team] "Abusive" use of
                SSAD<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p> </o:p></p>
        <p>Hi Mark,<span style="font-size:11.0pt"><o:p></o:p></span></p>
        <p>I think the times of legitimate high volume requests have
          passed. There are now less invasive methods of confirming
          domain ownership - such as modifications to the DNS records -
          that do not require knowing the personal data whom the domain
          belongs to. High volume requests are almost always an
          indicator for abuse.<o:p></o:p></p>
        <p>You have a point about request formats and we should allow
          some leeway for formats that have been accurate recently.<o:p></o:p></p>
        <p>If the data has actually changed, then that would not be a
          request for the same data anymore. But I I think we need to
          have some form of cap for requests for the dame domain by the
          same requestor.  Two to three requests over the course of as
          many months probably would not count as abusive.<o:p></o:p></p>
        <p>Circumventing legitimate rate limits is abusive use of the
          system as those limits are there for a reason. If multiple
          vendors are used that access the data, each of those vendors
          would have to be accredited seperately and therefore not fall
          under the circumvention rule. If those vendors are however
          affiliated entities, this would be different. Which brings me
          to another affiliation requirement: Provide list of all
          affiliated entities that are already accredited, or have
          applied for accreditetion, similar to the obligation of
          registrars to provide lists of all affiliated registrars to
          ICANN.<o:p></o:p></p>
        <p>I think the terms harvesting and mining speak for themselves
          but I assume we can find a commonly acceptable definition.
          <o:p></o:p></p>
        <p>Best,<o:p></o:p></p>
        <p>Volker<o:p></o:p></p>
        <div>
          <p class="MsoNormal">Am 09.10.2019 um 04:25 schrieb Mark
            Svancarek (CELA) via Gnso-epdp-team:<o:p></o:p></p>
        </div>
        <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
          <p class="MsoNormal"><span
              style="font-size:11.0pt;mso-fareast-language:JA">Thanks,
              James.  Here are my concerns:</span><o:p></o:p></p>
          <p class="MsoNormal"><span
              style="font-size:11.0pt;mso-fareast-language:JA"> </span><o:p></o:p></p>
          <ul style="margin-top:0in" type="disc">
            <li class="MsoListParagraph"
              style="margin-left:0in;mso-list:l0 level1 lfo3"><span
                style="font-size:11.0pt;mso-fareast-language:JA">Some
                abuse may be high-volume, but high volume is not
                inherently abusive.  If there are industry-standard
                methods for distinguishing denial-of-service attacks
                from other high-volume activity, we should adopt them
                here.</span><o:p></o:p></li>
            <li class="MsoListParagraph"
              style="margin-left:0in;mso-list:l0 level1 lfo3"><span
                style="font-size:11.0pt;mso-fareast-language:JA">Request
                formats may change over time.  Use of outdated formats
                during a transition period is not abusive.</span><o:p></o:p></li>
            <li class="MsoListParagraph"
              style="margin-left:0in;mso-list:l0 level1 lfo3"><span
                style="font-size:11.0pt;mso-fareast-language:JA">Subsequent
                requests for data where the format has been improved
                (e.g. missing fields have been populated; more
                appropriate basis has been submitted; more information
                that has been discovered during an ongoing investigation
                is added; etc.) is acceptable.</span><o:p></o:p></li>
            <li class="MsoListParagraph"
              style="margin-left:0in;mso-list:l0 level1 lfo3"><span
                style="font-size:11.0pt;mso-fareast-language:JA">Repeated
                requests for a domain name record over are justifiable
                when it is reasonable to assume that domain name
                registration data is likely to have changed during an
                investigation.  </span><o:p></o:p></li>
            <li class="MsoListParagraph"
              style="margin-left:0in;mso-list:l0 level1 lfo3"><span
                style="font-size:11.0pt;mso-fareast-language:JA">In the
                Port 43 public WhoIs system some requestors used
                multiple and/or spoofed IP addresses to avoid rate
                limits imposed by registrars.  Until issues of SLAs and
                funding are resolved, we cannot assume that rate
                limiting, or quota systems, will apply to SSAD. 
                Whatever systems are ultimately put in place, the
                following observations about IP addresses and
                distributed requests should be considered: </span><o:p></o:p></li>
          </ul>
          <ul style="margin-top:0in" type="disc">
            <ul style="margin-top:0in" type="circle">
              <li class="MsoListParagraph"
                style="margin-left:0in;mso-list:l0 level2 lfo3"><span
                  style="font-size:11.0pt;mso-fareast-language:JA">It is
                  not unusual to have a case worked on by multiple
                  vendors/attorneys/platforms (e.g. one organization for
                  initial take down requests, another to handle
                  escalations, outside counsel for follow-up and/or
                  suit).</span><o:p></o:p></li>
              <li class="MsoListParagraph"
                style="margin-left:0in;mso-list:l0 level2 lfo3"><span
                  style="font-size:11.0pt;mso-fareast-language:JA">It is
                  not unusual to have a case worked on from multiple
                  geographies.</span><o:p></o:p></li>
              <li class="MsoListParagraph"
                style="margin-left:0in;mso-list:l0 level2 lfo3"><span
                  style="font-size:11.0pt;mso-fareast-language:JA">It is
                  not unusual for a requestor to use a VPN.</span><o:p></o:p></li>
              <li class="MsoListParagraph"
                style="margin-left:0in;mso-list:l0 level2 lfo3"><span
                  style="font-size:11.0pt;mso-fareast-language:JA">Credentialed
                  access should be based on credentials and be neutral
                  to IP addresses - so mitigations based on IP addresses
                  are only applicable for the noncredentialled users of
                  SSAD, if at all.</span><o:p></o:p></li>
            </ul>
          </ul>
          <ul style="margin-top:0in" type="disc">
            <li class="MsoListParagraph"
              style="margin-left:0in;mso-list:l0 level1 lfo3"><span
                style="font-size:11.0pt;mso-fareast-language:JA">I am
                very concerned about the undefined terms “harvesting”
                and “mining”, which seem to me to be more about intent
                than any specific activity.  Until we specifically
                describe the behavior to be blocked, we should remove
                the last bullet.</span><o:p></o:p></li>
          </ul>
          <p class="MsoNormal"><span
              style="font-size:11.0pt;mso-fareast-language:JA"> </span><o:p></o:p></p>
          <p class="MsoNormal"><span
              style="font-size:11.0pt;mso-fareast-language:JA">/marksv</span><o:p></o:p></p>
          <p class="MsoNormal"><span
              style="font-size:11.0pt;mso-fareast-language:JA"> </span><o:p></o:p></p>
          <div>
            <div style="border:none;border-top:solid #E1E1E1
              1.0pt;padding:3.0pt 0in 0in 0in">
              <p class="MsoNormal"><b><span style="font-size:11.0pt">From:</span></b><span
                  style="font-size:11.0pt"> Gnso-epdp-team
                  <a href="mailto:gnso-epdp-team-bounces@icann.org"
                    moz-do-not-send="true"><gnso-epdp-team-bounces@icann.org></a>
                  <b>On Behalf Of </b>James M. Bladel<br>
                  <b>Sent:</b> Tuesday, October 8, 2019 7:15 PM<br>
                  <b>To:</b> <a href="mailto:gnso-epdp-team@icann.org"
                    moz-do-not-send="true">gnso-epdp-team@icann.org</a><br>
                  <b>Subject:</b> [Gnso-epdp-team] "Abusive" use of SSAD</span><o:p></o:p></p>
            </div>
          </div>
          <p class="MsoNormal"> <o:p></o:p></p>
          <p class="MsoNormal"><span style="font-family:"Helvetica
              Neue",serif">Colleagues –
            </span><o:p></o:p></p>
          <p class="MsoNormal"><span style="font-family:"Helvetica
              Neue",serif"> </span><o:p></o:p></p>
          <p class="MsoNormal"><span style="font-family:"Helvetica
              Neue",serif">Following up with my homework from last
              Thursday, here is the non-exhaustive list of “abusive”
              SSAD behaviors. 
            </span><o:p></o:p></p>
          <p class="MsoNormal"><span style="font-family:"Helvetica
              Neue",serif"> </span><o:p></o:p></p>
          <p class="MsoNormal"><span style="font-family:"Helvetica
              Neue",serif">I’ve been in discussions with Mark SV,
              and note that he has some concerns.  Expect his
              comments/edits in a separate message that will be a
              fast-follow to this post.</span><o:p></o:p></p>
          <p class="MsoNormal"><span style="font-family:"Helvetica
              Neue",serif"><br>
              Thanks—</span><o:p></o:p></p>
          <p class="MsoNormal"><span style="font-family:"Helvetica
              Neue",serif"> </span><o:p></o:p></p>
          <p class="MsoNormal"><span style="font-family:"Helvetica
              Neue",serif">J.</span><o:p></o:p></p>
          <p class="MsoNormal"><span
              style="font-size:11.0pt;font-family:"Helvetica Neue
              Light",serif">-------------</span><o:p></o:p></p>
          <p class="MsoNormal"><b><span style="font-size:11.0pt">James
                Bladel</span></b><o:p></o:p></p>
          <p class="MsoNormal"><span
              style="font-size:11.0pt;font-family:"Helvetica Neue
              Light",serif">GoDaddy</span><o:p></o:p></p>
          <p class="MsoNormal"> <o:p></o:p></p>
          <p class="MsoNormal"> <o:p></o:p></p>
          <p class="MsoNormal" style="margin-left:.5in"><span
              style="font-family:"Helvetica",sans-serif">“Abusive”
              use of SSAD may include (but is not limited to) the
              following behaviors/practices:</span><o:p></o:p></p>
          <p class="MsoNormal" style="margin-left:.5in"><span
              style="font-family:"Helvetica",sans-serif"> </span><o:p></o:p></p>
          <p class="MsoNormal"
            style="margin-left:1.25in;text-indent:-.25in"><span
              style="font-family:"Helvetica",sans-serif">1.     High
              volume submissions of malformed or incomplete requests.</span><o:p></o:p></p>
          <p class="MsoNormal"
            style="margin-left:1.25in;text-indent:-.25in"><span
              style="font-family:"Helvetica",sans-serif">2.     Frequent
              duplicate requests that were previously fulfilled or
              denied.</span><o:p></o:p></p>
          <p class="MsoNormal"
            style="margin-left:1.25in;text-indent:-.25in"><span
              style="font-family:"Helvetica",sans-serif">3.     Use
              of distributed or spoofed source addresses or platforms to
              circumvent quotas or rate limits.</span><o:p></o:p></p>
          <p class="MsoNormal"
            style="margin-left:1.25in;text-indent:-.25in"><span
              style="font-family:"Helvetica",sans-serif">4.      Use
              of false or counterfeit credentials to access the system.</span><o:p></o:p></p>
          <p class="MsoNormal"
            style="margin-left:1.25in;text-indent:-.25in"><span
              style="font-family:"Helvetica",sans-serif">5.      Storing/delaying
              and sending high volume requests with the intention of
              causing SSAD or other parties to fail SLA performance.</span><o:p></o:p></p>
          <p class="MsoNormal"
            style="margin-left:1.25in;text-indent:-.25in"><span
              style="font-family:"Helvetica",sans-serif">6.      Attempts
              or efforts to mine or harvest the data protected by SSAD.</span><o:p></o:p></p>
          <p class="MsoNormal"
            style="margin-left:1.25in;text-indent:-.25in"><span
              style="font-family:"Helvetica",sans-serif"> </span><o:p></o:p></p>
          <p class="MsoNormal"
            style="margin-left:1.25in;text-indent:-.25in"><span
              style="font-family:"Helvetica",sans-serif">As
              with other access policy violations, abusive behavior can
              result in suspension or termination of access to the SSAD.</span><o:p></o:p></p>
          <p class="MsoNormal"
            style="margin-left:1.25in;text-indent:-.25in"> <o:p></o:p></p>
          <p class="MsoNormal"><span
              style="font-family:"Helvetica",sans-serif"> </span><o:p></o:p></p>
          <p class="MsoNormal"><span style="font-size:11.0pt"><br>
              <br>
              <o:p></o:p></span></p>
          <pre>_______________________________________________<o:p></o:p></pre>
          <pre>Gnso-epdp-team mailing list<o:p></o:p></pre>
          <pre><a href="mailto:Gnso-epdp-team@icann.org" moz-do-not-send="true">Gnso-epdp-team@icann.org</a><o:p></o:p></pre>
          <pre><a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmm.icann.org%2Fmailman%2Flistinfo%2Fgnso-epdp-team&data=02%7C01%7Cmarksv%40microsoft.com%7C6fe6b369215d4571e29308d74c962a1b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637062080173371482&sdata=nOmc%2FWqL60oRFuQhVO3TpO2ouAC1IaR9UiH%2FC7c2ikA%3D&reserved=0" moz-do-not-send="true">https://mm.icann.org/mailman/listinfo/gnso-epdp-team</a><o:p></o:p></pre>
          <pre>_______________________________________________<o:p></o:p></pre>
          <pre>By submitting your personal data, you consent to the processing of your personal data for purposes of subscribing to this mailing list accordance with the ICANN Privacy Policy (<a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.icann.org%2Fprivacy%2Fpolicy&data=02%7C01%7Cmarksv%40microsoft.com%7C6fe6b369215d4571e29308d74c962a1b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637062080173381474&sdata=mSDHsjP0d2yXRRLHu4P2tn6C71sx2LuAyWGoHFF%2Bctw%3D&reserved=0" moz-do-not-send="true">https://www.icann.org/privacy/policy</a>) and the website Terms of Service (<a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.icann.org%2Fprivacy%2Ftos&data=02%7C01%7Cmarksv%40microsoft.com%7C6fe6b369215d4571e29308d74c962a1b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637062080173381474&sdata=lbzdh8TsBpO6z1hKGLB6jMkc3nbHDLU2ls7xhiIH3go%3D&reserved=0" moz-do-not-send="true">https://www.icann.org/privacy/tos</a>). You can visit the Mailman link above to change your membership status or configuration, including unsubscribing, setting digest-style delivery or disabling delivery altogether (e.g., for a vacation), and so on.<o:p></o:p></pre>
        </blockquote>
        <div>
          <p class="MsoNormal"><span style="font-size:11.0pt">-- <br>
              Volker A. Greimann<br>
              General Counsel and Policy Manager<br>
              <strong><span
                  style="font-family:"Calibri",sans-serif">KEY-SYSTEMS
                  GMBH</span></strong><br>
              <br>
              T: +49 6894 9396901<br>
              M: +49 6894 9396851<br>
              F: +49 6894 9396851<br>
              W: <a
href="https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.key-systems.net&data=02%7C01%7Cmarksv%40microsoft.com%7C6fe6b369215d4571e29308d74c962a1b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637062080173391473&sdata=lkK436LGIpapz9luOOP4MVVJXcudjhDbJOHbxz4yG0w%3D&reserved=0"
                moz-do-not-send="true">
                www.key-systems.net</a><br>
              <br>
              Key-Systems GmbH is a company registered at the local
              court of Saarbruecken, Germany with the registration no.
              HR B 18835<br>
              CEO: Alexander Siffrin<br>
              <br>
              Part of the CentralNic Group PLC (LON: CNIC) a company
              registered in England and Wales with company number
              8576358.<o:p></o:p></span></p>
        </div>
      </div>
    </blockquote>
    <div class="moz-signature">-- <br>
      Volker A. Greimann<br>
      General Counsel and Policy Manager<br>
      <strong style="border-bottom: 3px solid #5C46B5">KEY-SYSTEMS GMBH</strong><br>
      <br>
      T: +49 6894 9396901<br>
      M: +49 6894 9396851<br>
      F: +49 6894 9396851<br>
      W: <a class="moz-txt-link-abbreviated" href="http://www.key-systems.net">www.key-systems.net</a><br>
      <br>
      Key-Systems GmbH is a company registered at the local court of
      Saarbruecken, Germany with the registration no. HR B 18835<br>
      CEO: Alexander Siffrin<br>
      <br>
      Part of the CentralNic Group PLC (LON: CNIC) a company registered
      in England and Wales with company number 8576358.</div>
  </body>
</html>