<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<meta http-equiv="CONTENT-TYPE" content="text/html;
charset=ISO-8859-1">
<p style="margin-bottom: 0in; line-height: 150%">Hi All,<br>
The Background information to Category D, Questions 2 and <b>3,
does not seem to reflect the fairly starting conclusion that
arose from it, that truly legitimate business use proxy/privacy
in high levels, including banks. <br>
</b></p>
<p style="margin-bottom: 0in; line-height: 150%"><b>So a few quick
edits to Questions 2 and 3 (with two discussed by way of
example). And also a correction to the study link that links to
the call for the study, and that I have revised to be the study
itself...</b></p>
<p style="margin-bottom: 0in; line-height: 150%"><b><br>
Edits in caps...<br>
</b></p>
<p style="margin-bottom: 0in; line-height: 150%"><b>Best,<br>
Kathy<br>
-------------------------------------------------------------------------------------------<br>
</b></p>
<p style="margin-bottom: 0in; line-height: 150%"><font
face="Calibri"><font style="font-size: 11pt" size="2"><b><br>
Background
information relevant to this question:</b></font></font></p>
<p style="margin-bottom: 0in; widows: 0; orphans: 0"><font
face="Calibri"><font style="font-size: 11pt" size="2"><b>Information
from
the Whois Studies</b></font></font></p>
<p style="margin-bottom: 0in; widows: 0; orphans: 0"><br>
</p>
<p style="margin-bottom: 0in; widows: 0; orphans: 0"><strong><a
href="http://www.icann.org/en/announcements/announcement-2-18may10-en.htm"><font
color="#0000ff"><font face="Calibri"><font style="font-size:
11pt" size="2"><u>Whois
Privacy and Proxy Services Abuse Study</u></font></font></font></a></strong><font
face="Calibri"><font style="font-size: 11pt" size="2">
[</font></font><font face="Calibri"><font style="font-size:
11pt" size="2"><b>LINK TO REPORT AT
<a class="moz-txt-link-freetext" href="https://www.icann.org/public-comments/whois-pp-abuse-study-2013-09-24-en">https://www.icann.org/public-comments/whois-pp-abuse-study-2013-09-24-en</a>]</b></font></font><font
face="Calibri"><font style="font-size: 11pt" size="2">-
</font></font>
</p>
<p style="margin-bottom: 0in; widows: 0; orphans: 0"><font
face="Calibri"><font style="font-size: 11pt" size="2">Our
study shows that it IS TRUE that: "A significant percentage of
the domain names used to conduct illegal or harmful Internet
activities are registered via privacy or proxy services to
obscure
the perpetrator's identity".</font></font></p>
<p style="margin-bottom: 0in; widows: 0; orphans: 0"><font
face="Calibri"><font style="font-size: 11pt" size="2">Our
study shows that it is PARTLY TRUE that: "The percentage of
domain names used to conduct illegal or harmful Internet
activities
that are registered via privacy or proxy services is
significantly
greater than the percentage of domain names used for lawful
Internet
activities that employ privacy or proxy services."</font></font></p>
<p style="margin-bottom: 0in; widows: 0; orphans: 0"><font
face="Calibri"><font style="font-size: 11pt" size="2">OUR
STUDY ALSO SHOWS THAT IS IS TRUE THAT: <font
face="ArialNarrow, sans-serif">BANKS
WHO HAVE NOT MALICIOUSLY REGISTERED DOMAIN NAMES HAVE A
HIGHER THAN
AVERAGE RATE OF USE OF PROXY/PRIVACY REGISTRATION. </font></font></font>
</p>
<p style="margin-bottom: 0in"><font face="Calibri"><font
style="font-size: 11pt" size="2">STUDY LIMITATIONS: THE STUDY
NOTES; <font face="Arial, sans-serif"><font size="3">“it
is important to understand</font></font></font></font><font
face="Arial, sans-serif"><font size="3"> that
the selection we have made is not necessarily representative
of the
overall usage of domain
names for lawful and harmless reasons.” </font></font>
</p>
<p style="margin-bottom: 0in"><font face="Arial, sans-serif"><font
size="3"><font face="Calibri"><font style="font-size: 11pt"
size="2">More
helpfully, we can say: "When domain names are registered
with
the intent of conducting illegal or harmful Internet
activities then
a range of different methods are used to avoid providing
viable
contact information – with a consistent outcome no matter
which
method is used.</font></font></font></font></p>
<p style="margin-bottom: 0in; widows: 0; orphans: 0"><font
face="Calibri"><font style="font-size: 11pt" size="2">However,
although many more domains registered for entirely lawful
Internet
activities have viable telephone contact information recorded
within
the Whois system, a great percentage of them do not."</font></font></p>
<p style="margin-bottom: 0in; widows: 0; orphans: 0"><br>
</p>
<title></title>
<meta name="GENERATOR" content="OpenOffice.org 3.3 (Win32)">
<style type="text/css">
        <!--
                @page { margin: 0.79in }
                P { margin-bottom: 0.08in }
                A:link { so-language: zxx }
        -->
        </style>
<br /><br />
<hr style='border:none; color:#909090; background-color:#B0B0B0; height: 1px; width: 99%;' />
<table style='border-collapse:collapse;border:none;'>
        <tr>
                <td style='border:none;padding:0px 15px 0px 8px'>
                        <a href="http://www.avast.com/">
                                <img border=0 src="http://static.avast.com/emails/avast-mail-stamp.png" />
                        </a>
                </td>
                <td>
                        <p style='color:#3d4d5a; font-family:"Calibri","Verdana","Arial","Helvetica"; font-size:12pt;'>
                                This email is free from viruses and malware because <a href="http://www.avast.com/">avast! Antivirus</a> protection is active.
                        </p>
                </td>
        </tr>
</table>
<br />
</body>
</html>