<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <meta http-equiv="CONTENT-TYPE" content="text/html;
      charset=ISO-8859-1">
    <p style="margin-bottom: 0in; line-height: 150%">Hi All,<br>
      The Background information to Category D, Questions 2 and <b>3,
        does not seem to reflect the fairly starting conclusion that
        arose from it, that truly legitimate business use proxy/privacy
        in high levels, including banks.&nbsp; <br>
      </b></p>
    <p style="margin-bottom: 0in; line-height: 150%"><b>So a few quick
        edits to Questions 2 and 3 (with two discussed by way of
        example). And also a correction to the study link that links to
        the call for the study, and that I have revised to be the study
        itself...</b></p>
    <p style="margin-bottom: 0in; line-height: 150%"><b><br>
        Edits in caps...<br>
      </b></p>
    <p style="margin-bottom: 0in; line-height: 150%"><b>Best,<br>
        Kathy<br>
-------------------------------------------------------------------------------------------<br>
      </b></p>
    <p style="margin-bottom: 0in; line-height: 150%"><font
        face="Calibri"><font style="font-size: 11pt" size="2"><b><br>
            Background
            information relevant to this question:</b></font></font></p>
    <p style="margin-bottom: 0in; widows: 0; orphans: 0"><font
        face="Calibri"><font style="font-size: 11pt" size="2"><b>Information
from
            the Whois Studies</b></font></font></p>
    <p style="margin-bottom: 0in; widows: 0; orphans: 0"><br>
    </p>
    <p style="margin-bottom: 0in; widows: 0; orphans: 0"><strong><a
href="http://www.icann.org/en/announcements/announcement-2-18may10-en.htm"><font
            color="#0000ff"><font face="Calibri"><font style="font-size:
                11pt" size="2"><u>Whois
                  Privacy and Proxy Services Abuse Study</u></font></font></font></a></strong><font
        face="Calibri"><font style="font-size: 11pt" size="2">
          [</font></font><font face="Calibri"><font style="font-size:
          11pt" size="2"><b>LINK TO REPORT AT
<a class="moz-txt-link-freetext" href="https://www.icann.org/public-comments/whois-pp-abuse-study-2013-09-24-en">https://www.icann.org/public-comments/whois-pp-abuse-study-2013-09-24-en</a>]</b></font></font><font
        face="Calibri"><font style="font-size: 11pt" size="2">-
        </font></font>
    </p>
    <p style="margin-bottom: 0in; widows: 0; orphans: 0"><font
        face="Calibri"><font style="font-size: 11pt" size="2">Our
          study shows that it IS TRUE that: "A significant percentage of
          the domain names used to conduct illegal or harmful Internet
          activities are registered via privacy or proxy services to
          obscure
          the perpetrator's identity".</font></font></p>
    <p style="margin-bottom: 0in; widows: 0; orphans: 0"><font
        face="Calibri"><font style="font-size: 11pt" size="2">Our
          study shows that it is PARTLY TRUE that: "The percentage of
          domain names used to conduct illegal or harmful Internet
          activities
          that are registered via privacy or proxy services is
          significantly
          greater than the percentage of domain names used for lawful
          Internet
          activities that employ privacy or proxy services."</font></font></p>
    <p style="margin-bottom: 0in; widows: 0; orphans: 0"><font
        face="Calibri"><font style="font-size: 11pt" size="2">OUR
          STUDY ALSO SHOWS THAT IS IS TRUE THAT: <font
            face="ArialNarrow, sans-serif">BANKS
            WHO HAVE NOT MALICIOUSLY REGISTERED DOMAIN NAMES HAVE A
            HIGHER THAN
            AVERAGE RATE OF USE OF PROXY/PRIVACY REGISTRATION. </font></font></font>
    </p>
    <p style="margin-bottom: 0in"><font face="Calibri"><font
          style="font-size: 11pt" size="2">STUDY LIMITATIONS: THE STUDY
          NOTES; <font face="Arial, sans-serif"><font size="3">&#8220;it
              is important to understand</font></font></font></font><font
        face="Arial, sans-serif"><font size="3"> that
          the selection we have made is not necessarily representative
          of the
          overall usage of domain
          names for lawful and harmless reasons.&#8221; </font></font>
    </p>
    <p style="margin-bottom: 0in"><font face="Arial, sans-serif"><font
          size="3"><font face="Calibri"><font style="font-size: 11pt"
              size="2">More
              helpfully, we can say: "When domain names are registered
              with
              the intent of conducting illegal or harmful Internet
              activities then
              a range of different methods are used to avoid providing
              viable
              contact information &#8211; with a consistent outcome no matter
              which
              method is used.</font></font></font></font></p>
    <p style="margin-bottom: 0in; widows: 0; orphans: 0"><font
        face="Calibri"><font style="font-size: 11pt" size="2">However,
          although many more domains registered for entirely lawful
          Internet
          activities have viable telephone contact information recorded
          within
          the Whois system, a great percentage of them do not."</font></font></p>
    <p style="margin-bottom: 0in; widows: 0; orphans: 0"><br>
    </p>
    <title></title>
    <meta name="GENERATOR" content="OpenOffice.org 3.3 (Win32)">
    <style type="text/css">
        <!--
                @page { margin: 0.79in }
                P { margin-bottom: 0.08in }
                A:link { so-language: zxx }
        -->
        </style>
  
<br /><br />
<hr style='border:none; color:#909090; background-color:#B0B0B0; height: 1px; width: 99%;' />
<table style='border-collapse:collapse;border:none;'>
        <tr>
                <td style='border:none;padding:0px 15px 0px 8px'>
                        <a href="http://www.avast.com/">
                                <img border=0 src="http://static.avast.com/emails/avast-mail-stamp.png" />
                        </a>
                </td>
                <td>
                        <p style='color:#3d4d5a; font-family:"Calibri","Verdana","Arial","Helvetica"; font-size:12pt;'>
                                This email is free from viruses and malware because <a href="http://www.avast.com/">avast! Antivirus</a> protection is active.
                        </p>
                </td>
        </tr>
</table>
<br />
</body>
</html>