<div dir="ltr">Hello Susan, <div>I opted to review the EWG Final report as it seemed most relevant to our discussion.  I kept to the strict perspective of purpose only, not delving into access, justification, methodology, etc as that will be discussed in the group.  If this needs expansion, please let me know. </div><div><br></div><div><div><a href="https://www.icann.org/en/system/files/files/final-report-06jun14-en.pdf">EWG Recommendations for a Next-Generation RDS</a>, especially</div><div><br></div><div>- Section 3, Users and Purposes</div><div><div><p class="MsoNormal"><i><span style="font-family:Calibri">“</span></i><i><span style="font-family:Calibri">Although the EWG did not attempt to identify all possible use cases, it endeavoured to explore a representative sample in hopes of rigorously identifying kinds of users and their purposes in wanting access to gTLD registration data. However, the RDS must be designed with the ability to accommodate new users and permissible purposes that are likely to emerge over time.” </span></i><i><span style="font-family:Calibri">(Page 26)</span></i><i><span style="font-family:Calibri"></span></i></p><p class="MsoNormal"><span style="font-family:Calibri"> </span></p><p class="MsoNormal"><font face="Calibri">Th</font><font face="arial, helvetica, sans-serif">e EWG’s did  summarize &quot;permissible&quot; purposes the EWG identified at the time.  The purposes identified are listed below. For brevity of email, I did not include the full definitions.  They can be found in Section III, Table 2 Purpose Definitions, Pages 26-27.   </font></p><p class="" style="margin-left:0in"><font face="arial, helvetica, sans-serif"><u>Purpose</u>:</font></p><p class="MsoNormal" style="margin-left:0.5in"><font face="arial, helvetica, sans-serif">Domain Name Control</font></p><p class="MsoNormal" style="margin-left:0.5in"><font face="arial, helvetica, sans-serif">Personal Data Protection</font></p><p class="MsoNormal" style="margin-left:0.5in"><font face="arial, helvetica, sans-serif">Technical Issue Resolution</font></p><p class="MsoNormal" style="margin-left:0.5in"><font face="arial, helvetica, sans-serif">Domain Name Certification</font></p><p class="MsoNormal" style="margin-left:0.5in"><font face="arial, helvetica, sans-serif">Individual Internet Use</font></p><p class="MsoNormal" style="margin-left:0.5in"><font face="arial, helvetica, sans-serif">Business Domain Name Purchase or Sale</font></p><p class="MsoNormal" style="margin-left:0.5in"><font face="arial, helvetica, sans-serif">Academic / Public Interest DNS Research</font></p><p class="MsoNormal" style="margin-left:0.5in"><font face="arial, helvetica, sans-serif">Legal Actions</font></p><p class="MsoNormal" style="margin-left:0.5in"><font face="arial, helvetica, sans-serif">Regulatory and Contractual Enforcement</font></p><p class="MsoNormal" style="margin-left:0.5in"><font face="arial, helvetica, sans-serif">Criminal Investigation &amp; DNS Abuse Mitigation</font></p><p class="MsoNormal" style="margin-left:0.5in"><font face="arial, helvetica, sans-serif">DNS Transparency</font></p></div></div><div><font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif">It should be noted the EWG identified an additional purpose, Malicious
Internet Activities, which it did not further include in the &quot;permissible&quot; purposes. </font></div>


















<div><font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif">- Annex C, Example Use Cases</font></div><div><font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif">Using the same permissible purpose listing provided in Section III, Annex C included examples of specific uses for clarity.  For example Domain Name Control is required in registration and transfer, among other purposes OR Regulatory and Contractual
Enforcement for UDRP proceeding and Tax investigations.  The full list of example use cases along with a specific example of Technical Issue Resolution purpose is available on Pages 126-128.</font></div><div><font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif">- Annex A, Board Questions</font></div></div><div><font face="arial, helvetica, sans-serif"><br></font></div><div>
















<p class="MsoNormal"><font face="arial, helvetica, sans-serif">Annex A, Board Questions,
Pages 123-124</font></p>

<p class="MsoNormal"><i><font face="arial, helvetica, sans-serif">“The Board resolution that directed the
EWG’s work included a series of specific questions to be answered as it
conducted its analysis. This Annex references the sections of this Report that
address the Board’s concerns.”</font></i></p>

<p class="MsoNormal"><span style="font-family:arial,helvetica,sans-serif"><br></span></p><p class="MsoNormal"><span style="font-family:arial,helvetica,sans-serif">The initial question presented to EWG was by the Board was: </span><br></p>

<p class="MsoNormal" style="margin-left:0.25in"><font face="arial, helvetica, sans-serif">EWG
to redefine the purpose of: </font></p>

<p class="MsoNormal" style="margin-left:0.25in"><font face="arial, helvetica, sans-serif">•
collecting, </font></p>

<p class="MsoNormal" style="margin-left:0.25in"><font face="arial, helvetica, sans-serif">•
maintaining, and </font></p>

<p class="MsoNormal" style="margin-left:0.25in"><font face="arial, helvetica, sans-serif">•
providing access to gTLD registration data, and </font></p>

<p class="MsoNormal" style="margin-left:0.25in"><font face="arial, helvetica, sans-serif">•
consider safeguards for protecting data </font></p>

<p class="MsoNormal"><font face="arial, helvetica, sans-serif"><br></font></p><p class="MsoNormal"><font face="arial, helvetica, sans-serif">This was addressed in Section III,
Users &amp; Purposes and Section VI, Improving Accountability (presented above in email)</font></p>

<p class="MsoNormal"><font face="arial, helvetica, sans-serif"> </font></p><div><p class="MsoNormal"><font face="arial, helvetica, sans-serif">In addition, Section III addressed the following Board Questions that were around use and purpose of data.  I included them as a reference point to raise awareness of Board concerns in clarifying various use cases and purposes:</font></p></div><p class="MsoNormal"><font face="arial, helvetica, sans-serif"><span style="font-stretch:normal"></span></font></p><ul><li><font face="arial, helvetica, sans-serif"><span style="text-indent: -0.25in;">Why are data collected?</span><br></font></li><li><font face="arial, helvetica, sans-serif"><span style="text-indent: -0.25in;">Who needs the data and why?</span><br></font></li><li><font face="arial, helvetica, sans-serif"><span style="text-indent: -0.25in;">Law enforcement access to details about a domain name registration?</span><br></font></li><li><font face="arial, helvetica, sans-serif"><span style="text-indent: -0.25in;">Intellectual property owner access to details about a domain name registration?</span><br></font></li><li><font face="arial, helvetica, sans-serif"><span style="text-indent: -0.25in;">Security practitioner access to details about a domain name registration?</span><br></font></li><li><font face="arial, helvetica, sans-serif"><span style="text-indent: -0.25in;">What value does the public realize with access to registration data?</span><br></font></li><li><font face="arial, helvetica, sans-serif"><span style="text-indent: -0.25in;">What comprises a legitimate law enforcement need?</span><br></font></li><li><font face="arial, helvetica, sans-serif"><span style="text-indent: -0.25in;">What registration data and to what level of accuracy comprises valuable information to a law enforcement agent that is looking for the real identity of the responsible party?</span><br></font></li><li><font face="arial, helvetica, sans-serif"><span style="text-indent: -0.25in;">Is the desired domain name registration data access consistent with access that intellectual property owners have to similar types of data in other industries?</span><br></font></li><li><span style="text-indent: -0.25in;"><font face="arial, helvetica, sans-serif">Of all the registration data available, what does an intellectual property owner need access to?</font></span></li></ul>

<p class="MsoNormal"><font face="arial, helvetica, sans-serif">A separate question:  What purpose will the data serve?  Was addressed in ANNEX D: PURPOSES AND DATA NEEDS, Pages
129-132  </font></p><p class="MsoNormal"><font face="arial, helvetica, sans-serif">Annex D defined
the registration data element and mapped it to Purposes defined by EWG in Section III, Table 2 with Section VI(a) Data Elements.  This reference is useful for specific currently defined registration data elements purposes.  </font></p><p class="MsoNormal"><font face="arial, helvetica, sans-serif"><br></font></p><p class="MsoNormal"><font face="arial, helvetica, sans-serif">Please let me know if you need clarity on my review. </font></p><p class="MsoNormal"><font face="arial, helvetica, sans-serif">-Susan </font></p>

<p class="MsoNormal"><font face="arial, helvetica, sans-serif"> </font></p>

</div><span style="font-stretch:normal"><ul><li><font face="arial, helvetica, sans-serif"><br></font></li></ul></span><div><div>
















<p class="MsoNormal"><br></p></div></div></div><div class="gmail_extra"><br clear="all"><div><div class="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><font size="1" face="verdana, sans-serif">~~~~<br>Susan Prosser<br>VP, Client Services</font><div><font size="1" face="verdana, sans-serif">DomainTools, LLC<br><br>T: (206) 838-9060<br>E: <a href="mailto:susan@domaintools.com" target="_blank">susan@domaintools.com</a></font></div><div><font size="1" face="verdana, sans-serif">PGP:  A2C4D2A4 </font></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
<br><div class="gmail_quote">On Wed, Mar 30, 2016 at 3:27 PM, Susan Kawaguchi via gnso-rds-pdp-purpose <span dir="ltr">&lt;<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a>&gt;</span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">



<div style="word-wrap:break-word">
<div>
<div>
<div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">
Hi Kathy, </div>
<div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">
<br>
</div>
<div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">
Absolutely NOT saying that we are bound to purposes created for the OLD system as a full working group.  I am saying that Chuck has asked us as a sub team to look at the purposes identified in all the resources on the wiki and summarize what the FULL working
 group should look at and review.  His direction was in hopes that we can help the full working group to come up to speed with the history and as you have said it is “instructive&quot;.  If you have new ideas or other sources previously unidentified  we can note
 those and add those to the summary but we cannot debate these issues as a sub team.  We need to reserve that discussion for the full working group.  </div>
<div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">
<br>
</div>
<div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">
<br>
</div>
<div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">
I will add the following to list to summarize.  </div>
<div><span style="background-color:rgb(255,255,0)"><span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">Accordingly, I would like to submit the following principles from the website above to this subgroup and to the WG as
 a whole: <br>
that our domain name registration data must be:<br>
&quot;collected for explicit and legitimate purposes and used accordingly&quot; AND <br>
&quot;adequate, relevant and not excessive in relation to the purposes for which it is collected and/or further processed.<br>
There are of course other principles, but these are foundation ones directly related to our current work finding what we need to evaluate &quot;purpose.</span><font face="Calibri,sans-serif">”</font></span></div>
<div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">
<span style="background-color:rgb(255,255,0)">Source: <i>Obligations of data controllers, </i><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_data-2Dprotection_data-2Dcollection_obligations_index-5Fen.htm&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=m13S24LECLXPtj_swjcYuaRrfN0Ivm7n-iesQzQTd7k&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_data-2Dprotection_data-2Dcollection_obligations_index-5Fen.htm&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=pJC9zAyofGwRYg6TVhm52nY-WzvsNAkMUrOgYeimNtE&amp;e=" target="_blank">http://ec.europa.eu/justice/data-protection/data-collection/obligations/index_en.htm</a></span></div>
<div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">
Best, </div>
<div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">
<div>
<div>Susan Kawaguchi</div>
<div>Domain Name Manager </div>
<div>Facebook Legal Dept. </div>
</div>
<div><br>
</div>
</div>
</div>
</div>
<div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">
<br>
</div>
<span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">
<div style="font-family:Calibri;font-size:11pt;text-align:left;color:black;BORDER-BOTTOM:medium none;BORDER-LEFT:medium none;PADDING-BOTTOM:0in;PADDING-LEFT:0in;PADDING-RIGHT:0in;BORDER-TOP:#b5c4df 1pt solid;BORDER-RIGHT:medium none;PADDING-TOP:3pt">
<span style="font-weight:bold">From: </span>Kathy Kleiman &lt;<a href="mailto:kathy@kathykleiman.com" target="_blank">kathy@kathykleiman.com</a>&gt;<br>
<span style="font-weight:bold">Date: </span>Wednesday, March 30, 2016 at 3:06 PM<br>
<span style="font-weight:bold">To: </span>Susan kawaguchi &lt;<a href="mailto:susank@fb.com" target="_blank">susank@fb.com</a>&gt;, &quot;<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a>&quot; &lt;<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a>&gt;<br>
<span style="font-weight:bold">Subject: </span>Re: [gnso-rds-pdp-purpose] Purpose sub team<br>
</div>
<div><br>
</div>
<div>
<div bgcolor="#FFFFFF" text="#000000">Susan,  <br>
Let me understand what you are saying. Although we are designing a NEW system (the &quot;RDS&quot;) we are bound in our evaluation and outlook by purposes created (reverse engineered really) for the OLD system?  I am not sure that makes sense.<br>
<br>
I respectfully submit again: <span>We are the very first PDP WG in the history of ICANN to work together to rethink and redesign the Whois system -- the new &quot;RDS.&quot;
<b>Thus, it falls to <i>us </i>to ask and answer the question of <u>what is th</u><u>e
</u><u>purpose for whi</u><u>ch the registra</u><u>tion data is collection?</u><br>
<br>
</b>Drawing from principles on the European Commission&#39;s website, specifically <i>
&quot;Obligation of data controllers,&quot; </i>for this evaluation, it seems clear we need to understand
<i>the </i><i>purpose </i>for which the data is collected -- in 2016, not necessarily 2002, 2006 or 2012. Earlier discussions may be instructive or persuasive, but this is a new evaluation for a new system, right?
<br>
<br>
Accordingly, I would like to submit the following principles from the website above to this subgroup and to the WG as a whole:
<br>
that our domain name registration data must be:<br>
&quot;collected for explicit and legitimate purposes and used accordingly&quot; AND <br>
&quot;adequate, relevant and not excessive in relation to the purposes for which it is collected and/or further processed.<br>
There are of course other principles, but these are foundation ones directly related to our current work finding what we need to evaluate &quot;purpose.&quot;<br>
<br>
I look forward to discussing with all. <br>
Source: <i>Obligations of data controllers, </i><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_data-2Dprotection_data-2Dcollection_obligations_index-5Fen.htm&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=m13S24LECLXPtj_swjcYuaRrfN0Ivm7n-iesQzQTd7k&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_data-2Dprotection_data-2Dcollection_obligations_index-5Fen.htm&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=pJC9zAyofGwRYg6TVhm52nY-WzvsNAkMUrOgYeimNtE&amp;e=" target="_blank">http://ec.europa.eu/justice/data-protection/data-collection/obligations/index_en.htm</a><br>
</span><br>
Best,<br>
Kathy<br>
<br>
<br>
<div>On 3/30/2016 12:30 PM, Susan Kawaguchi wrote:<br>
</div>
<blockquote type="cite">
<div>
<div>
<div>Thanks Kathy,  our work in the sub team is to summarize the existing identified purposes for the whole WG to discuss and debate.  Some of your email below will be useful in that full debate.  </div>
<div><br>
</div>
<div>Please identify any data you would like to include in the summary by pasting relevant sections and highlighting.  That way staff and I can put it into the template document.  </div>
<div><br>
</div>
<div>Once this sub team has collected all the information that we determine is relevant then we will work on summarizing the data for the full WG.  </div>
<div>
<div>
<div>Susan Kawaguchi</div>
<div>Domain Name Manager </div>
<div>Facebook Legal Dept. </div>
</div>
<div><br>
</div>
</div>
</div>
</div>
<div><br>
</div>
<span>
<div style="font-family:Calibri;font-size:11pt;text-align:left;color:black;BORDER-BOTTOM:medium none;BORDER-LEFT:medium none;PADDING-BOTTOM:0in;PADDING-LEFT:0in;PADDING-RIGHT:0in;BORDER-TOP:#b5c4df 1pt solid;BORDER-RIGHT:medium none;PADDING-TOP:3pt">
<span style="font-weight:bold">From: </span>&lt;<a href="mailto:gnso-rds-pdp-purpose-bounces@icann.org" target="_blank"></a><a href="mailto:gnso-rds-pdp-purpose-bounces@icann.org" target="_blank">gnso-rds-pdp-purpose-bounces@icann.org</a>&gt;
 on behalf of Kathy Kleiman via gnso-rds-pdp-purpose &lt;<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank"></a><a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a>&gt;<br>
<span style="font-weight:bold">Reply-To: </span>Kathy Kleiman &lt;<a href="mailto:kathy@kathykleiman.com" target="_blank">kathy@kathykleiman.com</a>&gt;<br>
<span style="font-weight:bold">Date: </span>Tuesday, March 29, 2016 at 8:44 PM<br>
<span style="font-weight:bold">To: </span>&quot;<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank"></a><a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a>&quot; &lt;<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a>&gt;<br>
<span style="font-weight:bold">Subject: </span>Re: [gnso-rds-pdp-purpose] Purpose sub team<br>
</div>
<div><br>
</div>
<div>
<div bgcolor="#FFFFFF" text="#000000">Hi Susan and All,<br>
I appreciate the goal of this sub-group - to delve into the &quot;purpose&quot; of the registration data being collected by the registrars when a gTLD domain name is registered. Unfortunately, few of the documents below shed much light on this question. The reason why
 is ICANN inherited the WHOIS/domain name registration system from the US Government and National Science Foundation. WHOIS was created in the 1980s when all of the information included (except the name of the person) was business information - a business address
 (e.g., at Harvard IT), a business phone, a business fax.<br>
<br>
We are the very first PDP WG in the history of ICANN to work together to rethink and redesign the Whois system -- the new &quot;RDS.&quot; Thus it falls to
<b>us </b>to answer the question of what is the primary purpose for which the registration data is collected, and what data we collect for this new system is
<b>&quot;adequate, relevant and not excessive in relation to the purposes for which it is collected and/or further processed.&quot;
</b><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_data-2Dprotection_data-2Dcollection_obligations_index-5Fen.htm&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=m13S24LECLXPtj_swjcYuaRrfN0Ivm7n-iesQzQTd7k&amp;e=" target="_blank">http://ec.europa.eu/justice/data-protection/data-collection/obligations/index_en.htm</a><br>
<br>
That&#39;s the hard work for us ahead.  I would suggest that the purpose of domain name registration data is to register a domain name technically and operationally within the global DNS. 
<br>
<br>
Further, I note that secondary uses of the data, no matter how valuable, cannot drive or change the primary purpose of the data collection. In one of the letters in our repository below, sent by Peter Schaar (then Data Protection commission of German and Chair
 of the Article 29 Working Party of Data Protection Commissioners created under the EU Privacy Directive) warned ICANN that consideration of purpose for this data is &quot;an extremely delicate matter&quot; and &quot;can not  be  extended  to  other  purposes  just because
 they are considered useful by some potential users of the directories.&quot;  2006 - <a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_schaar-2Dto-2Dcerf-2D22jun06-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=0R4CugyJ25EC8jg23u6f83R-SzcWVUrRuyVhGhPLAeQ&amp;e=" target="_blank">
https://www.icann.org/en/system/files/files/schaar-to-cerf-22jun06-en.pdf</a><br>
<br>
In light of this warning,I submit that the sentence in the materials below is mislabeled: &quot;<span><span style="font-size:7pt;font-family:&#39;Times New Roman&#39;"></span></span><i>Purpose:
</i><i><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__community.icann.org_x_YIxlAw&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=4ulwlJb7ZYRvUQUY6A9v6rncMkmX6lLaN77w9-8MaNU&amp;e=" target="_blank">https://community.icann.org/x/YIxlAw</a></i>&quot;.
 When I access this link, it leads to the question “Who should have access to gTLD registration data and why?” (not &quot;what is the primary purpose for which the data is collected.&quot;) This is a key confusion - and  I would ask that it be re-labeled.<br>
<br>
But in the process, it raises the key question before us: <i>what is the primary purpose for which the registration data is collected
</i><i>and used </i>versus <i>what are the secondary purposes to which the registration data might also be applied</i>?  I am not saying we have to answer this question, but I am saying that Commissioner Schaar&#39;s letter as well as other letters and materials
 below indicate that there are key &quot;purpose&quot; questions, raise issues that lie at the heart of the work of this sub-group, and, if discussed, will allow us to provide important clarity and guidance to our larger WG.
<br>
<br>
I note that there are people with far more experience than I have, with data protection laws generally and in drafting national data protection laws, in particular. I look forward to their guidance - and that of our subgroup overall.<br>
<br>
Best,<br>
Kathy<br>
<br>
<div>On 3/28/2016 6:49 PM, Susan Kawaguchi via gnso-rds-pdp-purpose wrote:<br>
</div>
<blockquote type="cite">






<div>
<div>Thanks all for beginning the work of digging into the resource materials helping to summarize the data.   ICANN staff has prepared a template and reference document for our review of all the sources that have identified purposes of registration data. </div>
<div><br>
</div>
<div>Please take a look at the document. </div>
<div><br>
</div>
<div>They have defined our first task below.  We simply want to identify sections of these documents that our subteam recommends all the WG members read.    </div>
<div><br>
</div>
<div>
<p class="MsoNormal"><b><u>Synopsis of Key Input Documents:<br>
</u></b><i>[For each document identified by the small team as most helpful, a single paragraph to help educate the full WG. For example, highlighting sections that this small team recommends every WG member read in order to better understand the Question and/or
 dependencies with between Questions. While this is NOT intended to limit the WG’s consideration of additional or future inputs, it should serve as an indexed a starting point for all WG members to familiarize themselves with each Question and its history.]<u></u><u></u></i></p>
</div>
<div><br>
</div>
<div>In the attached template is a link to all the documents on the wiki that may be relevant.  (if there are others not on the wiki please send to the group)   It would be helpful to have each sub team member pick one or two of the resources to identify the
 sections that useful.  After we have done that the next step will be to summarize this information but I would like to focus on identification of the resource material first. </div>
<div><br>
</div>
<div>For ease of reference list of the resource documents below. </div>
<div><br>
</div>
<div>
<p class="MsoNormal"><b><u>Input Documents that the WG should at minimum consider when addressing this Question:
<br>
</u></b><i>[Hyper-linked list of all key input documents for this Question, noting which of these documents were considered most helpful by the small team when creating the concise summary below. Small teams may identify both existing and additional inputs.
 However, to minimize duplication of effort, small teams should be sure to include the key inputs already posted on the WG&#39;s wiki:
<u></u><u></u></i></p>
<p style="margin-left:.5in">
<span>·<span>      
</span></span><i>Purpose: </i><i><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__community.icann.org_x_YIxlAw&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=4ulwlJb7ZYRvUQUY6A9v6rncMkmX6lLaN77w9-8MaNU&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__community.icann.org_x_YIxlAw&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=lmxaHDV04ZIQXkRcbCy4aDZxNn4OYCTA1sBQ6fVET0E&amp;e=" target="_blank">https://community.icann.org/x/YIxlAw</a></i><i><u></u><u></u></i></p>
<p style="margin-left:.5in">
<span>·<span>      
</span></span><i>All: </i><i><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__community.icann.org_pages_viewpage.action-3FpageId-3D56986688&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=mj7I2ex8lomam8IRoF4KsKfrYBsO7MSLUjStS1iXX5A&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__community.icann.org_pages_viewpage.action-3FpageId-3D56986688&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=JlOCe__cfGH4QyebCuwGw1mj7ByVN_7nmkVeGzM43-Q&amp;e=" target="_blank">https://community.icann.org/pages/viewpage.action?pageId=56986688</a></i><u></u><u></u></p>
<p><i><br>
A starter list is provided below from the WG’s wiki to be reviewed and refined by this small team]<u></u><u></u></i></p>
<p><u></u> <u></u></p>
<p style="margin-left:.5in">
<span><span style="font-size:10pt;color:windowtext;text-decoration:none">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span></span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__archive.icann.org_en_gnso_whois-2Dtf_report-2D19feb03.htm&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=UJCWyjf_Yj9h-mXfKQh407JGBn-HqOfn636Cw9YQM6w&amp;e=" target="_blank">WHOIS
 Task Force Final Report</a><span> (2007)</span><span><span style="color:windowtext;text-decoration:none"><u></u><u></u></span></span></p>
<p style="margin-left:.5in">
<span><span style="font-size:10pt;color:windowtext;text-decoration:none">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span></span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_final-2Dreport-2D11may12-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=eQ5JfWGOQ-Z6O6SGReYiS_UZOAzOmzhLjNEMkLNgfLI&amp;e=" target="_blank">WHOIS
 Policy Review Team Final Report</a> (2012)<span><span style="color:windowtext;text-decoration:none"><u></u><u></u></span></span></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_sac-2D055-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=eTfuTPJhmBPZjmCEXHxsYUNZr7X1zelC_b96HcJCyew&amp;e=" target="_blank">SAC055,
 WHOIS: Blind Men and an Elephant</a> (September 2012)<u></u><u></u></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__gacweb.icann.org_display_GACADV_WHOIS&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=DoW-zpdoAowBLMPKQWpTRd4nZYYZ-fRYaRmQN9bEHWg&amp;e=" target="_blank">GAC
 Communiqués</a> regarding WHOIS (2007-2015), especially<u></u><u></u></p>
<p class="MsoNormal" style="margin-left:1.0in;line-height:normal">
-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">       
</span><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__whois.icann.org_en_link_gac-2Dprinciples-2Dregarding-2Dgtld-2Dwhois-2Dservices&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=aC_LrNHKioGSOJxMXBDrDd7C-DucXN-5h2-h9_ebgdM&amp;e=" target="_blank">GAC
 Principles Regarding gTLD WHOIS Services</a> (2007)<u></u><u></u></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span><i>[Note: All Article 29 inputs identified thus far are listed below, but
<b>this team may wish to focus on purpose aspects</b> since data protection inputs will be summarized by privacy team.]<u></u><u></u></i></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span>Article 29 WP statement on the data protection impact of the ICANN RAA (2013-2014)<br>
<span style="font-size:10.0pt">- </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_namazi-2Dto-2Dkohnstamm-2D25mar14-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=5RRxN0-RdEUiFt3XqtVY5TzXTcL4y-sakmtBEWGihmU&amp;e=" target="_blank"><span style="font-size:10.0pt"></span></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_namazi-2Dto-2Dkohnstamm-2D25mar14-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=5RRxN0-RdEUiFt3XqtVY5TzXTcL4y-sakmtBEWGihmU&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_namazi-2Dto-2Dkohnstamm-2D25mar14-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=kSl-Q_4MhNsTkh_-C_t_NSivlbqx5_7XxEEST5JTyho&amp;e=" target="_blank">https://www.icann.org/en/system/files/correspondence/namazi-to-kohnstamm-25mar14-en.pdf</a><br>
<span style="font-size:10.0pt">- </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_kohnstamm-2Dto-2Djeffrey-2D08jan14-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=H18mSAohmQbQPmCWpikaNyLvVCAMr2EfAvy5MA6qQJE&amp;e=" target="_blank"><span style="font-size:10.0pt"></span></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_kohnstamm-2Dto-2Djeffrey-2D08jan14-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=H18mSAohmQbQPmCWpikaNyLvVCAMr2EfAvy5MA6qQJE&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_kohnstamm-2Dto-2Djeffrey-2D08jan14-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=kBO7q4lISrzwz9uIhjmx-bf0Q-VHMBXux6BnJHEiBcs&amp;e=" target="_blank">https://www.icann.org/en/system/files/correspondence/kohnstamm-to-jeffrey-08jan14-en.pdf</a><span style="font-size:10.0pt;color:windowtext;text-decoration:none"><br>
</span><span style="font-size:10.0pt">- </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_jeffrey-2Dto-2Dkohnstamm-2D20sep13-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=G356IMFyx_Rn1-5K8z8NjujBfxPTJ2EEdAquWhKQefU&amp;e=" target="_blank"><span style="font-size:10.0pt"></span></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_jeffrey-2Dto-2Dkohnstamm-2D20sep13&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=8wsE_gKCCxnQv1EyPLooOZYr3Kn_Ax9p54aIqV-jJgQ&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_jeffrey-2Dto-2Dkohnstamm-2D20sep13&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=Mw7pIliHdAOYV8ZMpRPCixRBGEXuLeqnHzD6e1JSbus&amp;e=" target="_blank">https://www.icann.org/en/system/files/correspondence/jeffrey-to-kohnstamm-20sep13</a>-<span style="font-size:10.0pt;color:windowtext;text-decoration:none">-
</span><span style="font-size:10.0pt">en.pdf</span><span style="font-size:10.0pt;color:windowtext;text-decoration:none"><br>
</span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_kohnstamm-2Dto-2Dcrocker-2Dchehade-2D06jun13-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=bcijkw8yRr1e01E0-ormlwD724Es_fkLWgGtVPlHYjQ&amp;e=" target="_blank"><span style="font-size:10.0pt">https://www.icann.org/en/system/files/correspondence/kohnstamm-to-crocker-chehade-06jun13-en.pdf</span></a><u></u><u></u></p>
<p style="margin-left:.5in">
<span><span style="font-size:10pt;text-decoration:none">·<span>      
</span></span></span>Article 29 WP comments on the data protection impact of the revision of the ICANN RAA concerning accuracy and data retention of WHOIS (2012)<br>
<span style="font-size:10.0pt">- </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_kohnstamm-2Dto-2Dcrocker-2Datallah-2D26sep12-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=8CndAF0t6FVqxNraLxjISDAlc8Dv_rcAgEMd0ZhspDA&amp;e=" target="_blank"><span style="font-size:10.0pt"></span></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_kohnstamm-2Dto-2Dcrocker-2Datallah-2D26sep12-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=8CndAF0t6FVqxNraLxjISDAlc8Dv_rcAgEMd0ZhspDA&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_correspondence_kohnstamm-2Dto-2Dcrocker-2Datallah-2D26sep12-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=nAxWZCHz7_a7_C7rEuaLYm3eoElY7c7aZjTfdD1vC8Y&amp;e=" target="_blank">https://www.icann.org/en/system/files/correspondence/kohnstamm-to-crocker-atallah-26sep12-en.pdf</a><span style="font-size:10.0pt"><br>
- </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_news_correspondence_chehade-2Dto-2Dkohnstamm-2D09oct12-2Den&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=6tjOrd4mABV9A5_-HrvnHlz0QmOxMieF3MvYlp8y1uc&amp;e=" target="_blank"><span style="font-size:10.0pt">https://www.icann.org/en/news/correspondence/chehade-to-kohnstamm-09oct12-en</span></a><span><u></u><u></u></span></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span>Article 29 WP on ICANN Procedure for Handling WHOIS Conflicts with Privacy Law (2007)<br>
<span style="font-size:10.0pt">- </span><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__gnso.icann.org_en_correspondence_cerf-2Dto-2Dschaar-2D24oct07.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=9cX2v3zHwdN5ExylckE7ocnTc0WvVMKUoXrYJghNN1s&amp;e=" target="_blank"><span style="font-size:10.0pt"></span></a><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__gnso.icann.org_en_correspondence_cerf-2Dto-2Dschaar-2D24oct07.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=9cX2v3zHwdN5ExylckE7ocnTc0WvVMKUoXrYJghNN1s&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__gnso.icann.org_en_correspondence_cerf-2Dto-2Dschaar-2D24oct07.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=lQ9Rc5pOvF0W8zu4asgCdWxMA5Ej5j0PmX3F7RlQTig&amp;e=" target="_blank">http://gnso.icann.org/en/correspondence/cerf-to-schaar-24oct07.pdf</a><span style="font-size:10.0pt;color:windowtext;text-decoration:none"><br>
</span><span style="font-size:10.0pt">- </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_cerf-2Dto-2Dschaar-2D15mar07-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=qwfbbjP1HtPN7fozQz170fyDS2BMcsZ9gtbgq7olm3M&amp;e=" target="_blank"><span style="font-size:10.0pt"></span></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_cerf-2Dto-2Dschaar-2D15mar07-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=qwfbbjP1HtPN7fozQz170fyDS2BMcsZ9gtbgq7olm3M&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_cerf-2Dto-2Dschaar-2D15mar07-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=kRDU9sbdBIB8vXZvahu8Czpj7OAc1mFXX68UAVRJf7k&amp;e=" target="_blank">https://www.icann.org/en/system/files/files/cerf-to-schaar-15mar07-en.pdf</a><span style="font-size:10.0pt"><br>
- </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_correspondence_schaar-2Dto-2Dcerf-2D12mar07.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=WlZq4i6cH7wQwxH7a55uiLWhrPQk-Fp6zpwn2mVuqnU&amp;e=" target="_blank"><span style="font-size:10.0pt">https://www.icann.org/en/correspondence/schaar-to-cerf-12mar07.pdf</span></a><span style="font-size:12.0pt"><u></u><u></u></span></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span>Article 29 WP on ICANN’s WHOIS Database Policy (2006)<br>
<span style="font-size:10.0pt">- </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_schaar-2Dto-2Dcerf-2D22jun06-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=0R4CugyJ25EC8jg23u6f83R-SzcWVUrRuyVhGhPLAeQ&amp;e=" target="_blank"><span style="font-size:10.0pt"></span></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_schaar-2Dto-2Dcerf-2D22jun06-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=0R4CugyJ25EC8jg23u6f83R-SzcWVUrRuyVhGhPLAeQ&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_schaar-2Dto-2Dcerf-2D22jun06-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=aE7SwRdj359pjt5pCdSveYyTaTA4299PAIh4A2DH1oI&amp;e=" target="_blank">https://www.icann.org/en/system/files/files/schaar-to-cerf-22jun06-en.pdf</a><span style="font-size:10.0pt;color:windowtext;text-decoration:none"><br>
</span><span style="font-size:10.0pt">- </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_correspondence_lawson-2Dto-2Dcerf-2D22jun06.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=ByhD5fgI-NZozcC_aUmxuJDuiLZ3pQO_CpVev9Dg3kk&amp;e=" target="_blank"><span style="font-size:10.0pt"></span></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_correspondence_lawson-2Dto-2Dcerf-2D22jun06.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=ByhD5fgI-NZozcC_aUmxuJDuiLZ3pQO_CpVev9Dg3kk&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_correspondence_lawson-2Dto-2Dcerf-2D22jun06.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=bIfUMOYsNN9aESOnohBg6qEXmxm3VaIdkdHpK9Gl_2k&amp;e=" target="_blank">https://www.icann.org/en/correspondence/lawson-to-cerf-22jun06.pdf</a><span style="font-size:10.0pt;color:windowtext;text-decoration:none"><br>
</span><span style="font-size:10.0pt">- </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_correspondence_parisse-2Dto-2Dicann-2D22jun06.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=Eg5vQ0-fjdyvM70TMY7vCaELvs_gYDm2DvW14IpaRbY&amp;e=" target="_blank"><span style="font-size:10.0pt"></span></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_correspondence_parisse-2Dto-2Dicann-2D22jun06.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=Eg5vQ0-fjdyvM70TMY7vCaELvs_gYDm2DvW14IpaRbY&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_correspondence_parisse-2Dto-2Dicann-2D22jun06.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=R-2FZz1H1Dqt8ESnB5TwF_qyvnK-suBWdXJhcH91IUk&amp;e=" target="_blank">https://www.icann.org/en/correspondence/parisse-to-icann-22jun06.pdf</a><span style="font-size:10.0pt;color:windowtext;text-decoration:none"><br>
</span><span style="font-size:10.0pt">- </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_fingleton-2Dto-2Dcerf-2D20jun06-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=kv4LGfw3lG9R7egJM7Mk6PuKfDLEeDFGuCy5-CIr2fQ&amp;e=" target="_blank"><span style="font-size:10.0pt"></span></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_fingleton-2Dto-2Dcerf-2D20jun06-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=kv4LGfw3lG9R7egJM7Mk6PuKfDLEeDFGuCy5-CIr2fQ&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_fingleton-2Dto-2Dcerf-2D20jun06-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=Y2M1nqZWKQ6xMSXCHo7qVV7WHX06Bk3XVQctMznRFwY&amp;e=" target="_blank">https://www.icann.org/en/system/files/files/fingleton-to-cerf-20jun06-en.pdf</a><span style="font-size:12.0pt"><u></u><u></u></span></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span>Article 29 WP Opinion on the application of the data protection principles to WHOIS directories
<br>
<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_policies_privacy_docs_wpdocs_2003_wp76-5Fen.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=F1r1QhCy3vX83VjPu0hK_sioGdkBX_5kYphDXpA7l0Q&amp;e=" target="_blank">Article
 29 WP 76 Opinion 2/2003</a> <span style="font-size:12.0pt"><u></u><u></u></span></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span>Additional Article 29 WP documents that may be of interest to this PDP WG<u></u><u></u></p>
<p style="margin-left:1.0in"><span><span style="text-decoration:none">-       
</span></span><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_data-2Dprotection_article-2D29_documentation_opinion-2Drecommendation_files_1997_wp5-5Fen.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=exXWLPNeD0JJDBS3po5Eqp2wiiDkDfO2IPMoQZwon1E&amp;e=" target="_blank">Article
 29 WP 5 Recommendation 2/97</a><span> <u></u><u></u></span></p>
<p style="margin-left:1.0in"><span><span style="text-decoration:none">-       
</span></span><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_data-2Dprotection_article-2D29_documentation_opinion-2Drecommendation_files_2000_wp33-5Fen.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=WcRHBEEerx9M9q_QYYItLTRW3JhXBlHQ8H5sSJiQpvs&amp;e=" target="_blank">Article
 29 WP 33 Opinion 5/2000</a><span> <u></u><u></u></span></p>
<p style="margin-left:1.0in"><span><span style="text-decoration:none">-       
</span></span><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_data-2Dprotection_article-2D29_documentation_opinion-2Drecommendation_files_2001_wp41-5Fen.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=02SfVeH8RqQY24RaZY7B8XpuAFHUFPLoj3QI8_XaKGs&amp;e=" target="_blank">Article
 29 WP 41</a><span> </span><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_data-2Dprotection_article-2D29_documentation_opinion-2Drecommendation_files_2001_wp41-5Fen.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=02SfVeH8RqQY24RaZY7B8XpuAFHUFPLoj3QI8_XaKGs&amp;e=" target="_blank">Opinion
 4/2001 </a><span><u></u><u></u></span></p>
<p style="margin-left:1.0in"><span><span style="text-decoration:none">-       
</span></span><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_data-2Dprotection_article-2D29_documentation_opinion-2Drecommendation_files_2002_wp56-5Fen.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=X9Bw10En2LV0oPDAhdxCPL6I7d1gEbSX6hxErm1Esto&amp;e=" target="_blank">Article
 29 WP 56 Working Document 5/2002</a><span><u></u><u></u></span></p>
<p style="margin-left:1.0in"><span><span style="text-decoration:none">-       
</span></span><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__ec.europa.eu_justice_data-2Dprotection_article-2D29_documentation_opinion-2Drecommendation_files_2014_wp217-5Fen.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=YfVNcHS7vB5dNzSX9RM2FPKssGJMmRnv4Jd55L3yqSI&amp;e=" target="_blank">Article
 29 WP 217 Opinion 4/2014</a><u></u><u></u></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span>Council of Europe Declaration<u></u><u></u></p>
<p style="margin-left:1.0in">
-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">       
</span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__wcd.coe.int_ViewDoc.jsp-3FRef-3DDecl-252803.06.2015-25292&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=bx0o1CZBlk2neLLBrx14hplKaQkSEAoQeWkWG5EFIyA&amp;e=" target="_blank">Declaration
 of the Committee of Ministers on ICANN, human rights and the rule of law</a> (3 June 2015)<u></u><u></u></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span>EDPS Correspondence regarding Registration Data<u></u><u></u></p>
<p style="margin-left:1.0in">
<span><span style="text-decoration:none">-<span>       
</span></span></span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__secure.edps.europa.eu_EDPSWEB_webdav_site_mySite_shared_Documents_Consultation_Opinions_2014_14-2D06-2D23-5FInternet-5FGovernance-5FEN.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=AUPuK_NYOQqZHqOoYEH2SQFbYSYY8Rea1c5dP-f2KaA&amp;e=" target="_blank">Opinion
 of the European Data Protection Supervisor: Europe&#39;s role in shaping the future of Internet Governance</a><span> (23 June 2014)<u></u><u></u></span></p>
<p style="margin-left:1.0in">
<span><span style="text-decoration:none">-<span>       
</span></span></span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__secure.edps.europa.eu_EDPSWEB_webdav_site_mySite_shared_Documents_Consultation_Comments_2014_14-2D04-2D17-5FEDPS-5Fletter-5Fto-5FICANN-5FEN.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=c4mOTCJa_IWm1vL653Z92s249bvTJxJelBLzWP5EVVI&amp;e=" target="_blank">ICANN&#39;s
 public consultation on 2013 RAA Data Retention Specification Data Elements and - Legitimate Purposes for Collection and Retention</a><span> (17 April 2014)<u></u><u></u></span></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span>International Working Group on Data Protection in Telecommunications and Media Documents<u></u><u></u></p>
<p style="margin-left:1.0in">
-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">       
</span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__datenschutz-2Dberlin.de_attachments_176_rever-5Fen.pdf-3F1201099194&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=djnlHZumj-preTvWxgvUS9ugoRuoHNh5b87d7yksy9w&amp;e=" target="_blank">Common
 Position relating to Reverse Directories</a> (Hong Kong, 15.04.1998)<u></u><u></u></p>
<p style="margin-left:1.0in">
-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">       
</span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__datenschutz-2Dberlin.de_attachments_222_dns-5Fen.pdf-3F1200656953&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=zVDHrz3aQSp2cMnwZKTwDD3UbiABV6J-ukke3MnFmiU&amp;e=" target="_blank">Common
 Position on Privacy and Data Protection aspects of the Registration of Domain Names on the Internet</a> (Crete, 4./5.05.2000)<u></u><u></u></p>
<p style="margin-left:1.0in">
-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">       
</span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__datenschutz-2Dberlin.de_attachments_220_pd-5Fen.pdf-3F1201099774&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=45Izx42o0mTuSd6Nt88stuPPJhemyRfg2NgD-1nD-gc&amp;e=" target="_blank">Common
 Position on Privacy and Data Protection aspects of the Publication of Personal Data contained in publicly available documents on the Internet</a> (Crete, 4./5.05.2000)<u></u><u></u></p>
<p style="margin-left:1.0in">
-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">       
</span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__datenschutz-2Dberlin.de_attachments_216_tc-5Fen.pdf-3F1200658742&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=roY0SNiodoQNgvjU1SwZz-FTVERYApYCThgQ5AENiBY&amp;e=" target="_blank">Common
 Position on Incorporation of telecommunications-specific principles in multilateral privacy agreements: Ten Commandments to protect Privacy in the Internet World</a> (Berlin, 13/14.09.2000)<u></u><u></u></p>
<p style="margin-left:1.0in">
<span><span style="text-decoration:none">-<span>       
</span></span></span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__datenschutz-2Dberlin.de_attachments_218_cy-5Fen.pdf-3F1200656876&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=KfVfRAw3W5H3LF4dXL7mtXnB-9Luy_G_NAtdArNp4gU&amp;e=" target="_blank">Common
 Position on data protection aspects in the Draft Convention on cyber-crime of the Council of Europe</a> (Berlin, 13/14.09.2000)<span><u></u><u></u></span></p>
<p style="margin-left:.5in">
<span><span style="font-size:10pt;color:windowtext;text-decoration:none">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span></span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_final-2Dreport-2D06jun14-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=081_TAJEBYybphQqfoPE6BaY0syYr8TX8mOaCvBUlKI&amp;e=" target="_blank">EWG
 Recommendations for a Next-Generation RDS</a><span>, especially</span><span><span style="color:windowtext;text-decoration:none"><u></u><u></u></span></span></p>
<p style="margin-left:1.0in">
-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">       
</span>Section 3, Users and Purposes<u></u><u></u></p>
<p style="margin-left:1.0in">
-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">       
</span>Annex C, Example Use Cases<u></u><u></u></p>
<p style="margin-left:1.0in">
-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">       
</span>Annex A, Board Questions<u></u><u></u></p>
<p style="margin-left:.5in">
<span style="font-size:10pt">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">      
</span></span><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__london50.icann.org_en_schedule_mon-2Dewg-2Dfinal-2Doverview_presentation-2Dewg-2Dfinal-2Doverview-2D23jun14-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=G5q1dQLGpxVVN_zNOjYsut-v5Cq65X1C1SDW-tf_hmw&amp;e=" target="_blank">EWG
 Tutorial </a>Pages 17-20, 37-41and <a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__community.icann.org_display_EWG_EWG-2BFAQs&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=mbe7PZ4gDoicRWqaH8rXPIo4GZ921Hai6KaJx4uCu8Q&amp;e=" target="_blank">
EWG FAQs</a> 9-12, 67<u></u><u></u></p>
<p style="margin-left:.5in">
<strong><span style="font-size:10pt;font-weight:normal">·<span>      
</span></span></strong>Video FAQ “<a href="https://www.youtube.com/watch?v=YzPkxNNfDY4&amp;list=UUl7rV9qJaQEx3GKhtSLx4QA" target="_blank">Is my purpose supported by the RDS?</a><strong>”</strong><strong><span style="font-weight:normal"><u></u><u></u></span></strong></p>
<p style="margin-left:.5in">
<span>·<span>      
</span></span>Statements/Blogs by <a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_en_system_files_files_perrin-2Dstatement-2D24jun14-2Den.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=kUujOSmulQ5qahX6mQLU7OsJLPAwaaVQHZZ6bY9-Z6M&amp;e=" target="_blank">
Perrin</a> and<a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__www.circleid.com_posts_20141011-5Fbuilding-5Fa-5Fbetter-5Fwhois-5Ffor-5Fthe-5Findividual-5Fregistrant_&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=jWs3wR8mHFYW-I49h1MP5t9VJAzx-bMyUXS87I6QZpU&amp;e=" target="_blank">
 Samuels</a><u></u><u></u></p>
<p style="margin-left:.5in">
<span>·<span>      
</span></span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__community.icann.org_display_gTLDRDS_Process-2BFramework&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=En6TdFMyuxd7pFs-ZGYPVZWOFhutKC_KObgzky4JtAA&amp;e=" target="_blank">Process
 Framework</a> for a PDP on Next-Generation RDS, especially Page 9, Row 1<u></u><u></u></p>
</div>
<div><br>
</div>
<div>
<div>
<div>Please let me know which documents you each of you have chosen to review.    </div>
<div><br>
</div>
<div>Thank you all for volunteering.  </div>
<div>Susan Kawaguchi</div>
<div>Domain Name Manager </div>
<div>Facebook Legal Dept. </div>
</div>
<div><br>
</div>
</div>
</div>
<div><br>
</div>
<span>
<div style="font-family:Calibri;font-size:11pt;text-align:left;color:black;BORDER-BOTTOM:medium none;BORDER-LEFT:medium none;PADDING-BOTTOM:0in;PADDING-LEFT:0in;PADDING-RIGHT:0in;BORDER-TOP:#b5c4df 1pt solid;BORDER-RIGHT:medium none;PADDING-TOP:3pt">
<span style="font-weight:bold">From: </span>&lt;<a href="mailto:gnso-rds-pdp-purpose-bounces@icann.org" target="_blank"></a><a href="mailto:gnso-rds-pdp-purpose-bounces@icann.org" target="_blank">gnso-rds-pdp-purpose-bounces@icann.org</a>&gt;
 on behalf of Kiran Malancharuvil via gnso-rds-pdp-purpose &lt;<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a>&gt;<br>
<span style="font-weight:bold">Reply-To: </span>Kiran Malancharuvil &lt;<a href="mailto:Kiran.Malancharuvil@markmonitor.com" target="_blank">Kiran.Malancharuvil@markmonitor.com</a>&gt;<br>
<span style="font-weight:bold">Date: </span>Monday, March 28, 2016 at 11:57 AM<br>
<span style="font-weight:bold">To: </span>&quot;<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank"></a><a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a>&quot;
 &lt;<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a>&gt;<br>
<span style="font-weight:bold">Subject: </span>Re: [gnso-rds-pdp-purpose] Purpose sub team<br>
</div>
<div><br>
</div>
<div>


<div link="blue" vlink="purple" lang="EN-US">
<div>
<p class="MsoNormal"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">If we are going to table a recent ICANN expert group report on Registration Directory Services, why don’t we start with the Expert Working Group on
 Registration Directory Services rather than SSAC?  It’s much more recent and was subjected to several public comment periods. 
<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Thanks,<br>
<br>
Kiran<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p class="MsoNormal"><b><span style="font-size:10pt;font-family:Tahoma,sans-serif">From:</span></b><span style="font-size:10pt;font-family:Tahoma,sans-serif"><a href="mailto:gnso-rds-pdp-purpose-bounces@icann.org" target="_blank">gnso-rds-pdp-purpose-bounces@icann.org</a>
 [<a href="mailto:gnso-rds-pdp-purpose-bounces@icann.org" target="_blank">mailto:gnso-rds-pdp-purpose-bounces@icann.org</a>]
<b>On Behalf Of </b>Greg Shatan via gnso-rds-pdp-purpose<br>
<b>Sent:</b> Monday, March 28, 2016 11:53 AM<br>
<b>To:</b> Ayden Fabien Férdeline<br>
<b>Cc:</b> <a href="mailto:Gnso-rds-pdp-purpose@icann.org" target="_blank">
Gnso-rds-pdp-purpose@icann.org</a><br>
<b>Subject:</b> Re: [gnso-rds-pdp-purpose] Purpose sub team<u></u><u></u></span></p>
<p class="MsoNormal"><u></u> <u></u></p>
<div>
<div>
<p class="MsoNormal"><span style="font-family:Verdana,sans-serif">Edited below.<u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:Verdana,sans-serif"><u></u> <u></u></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:Verdana,sans-serif">Greg<u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal"><br clear="all">
<u></u><u></u></p>
<div>
<div>
<div>
<div>
<p style="margin:0in;margin-bottom:.0001pt"><span style="font-size:11pt;font-family:Calibri,sans-serif"><u></u> <u></u></span></p>
</div>
</div>
</div>
</div>
<p class="MsoNormal"><u></u> <u></u></p>
<div>
<p class="MsoNormal">On Mon, Mar 28, 2016 at 12:46 PM, Ayden Fabien Férdeline &lt;<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank"></a><a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a>&gt;
 wrote:<u></u><u></u></p>
<div>
<table style="width:100.0%" border="0" width="100%" cellpadding="0" cellspacing="0">
<tbody>
<tr>
<td style="padding:0in 0in 0in 0in" valign="top">
<div>
<p class="MsoNormal" style="margin-top:4.5pt"><span style="font-size:10pt;font-family:Arial,sans-serif;color:rgb(34,34,34)">Hello all,</span><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal" style="margin-top:4.5pt"><span style="font-size:10pt;font-family:Arial,sans-serif;color:rgb(34,34,34)"><br>
Thank you to Susan for setting out the approach we will take in our sub-team. I will begin this exercise by tabling “<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__links5.mixmaxusercontent.com_aMjjKHWxnLSD3SEwj_l_JHXwtM1x9354tdJND-3Frn-3DIyZy9mLu5WYjlGQlN3bwJXdw1CckBXLzRmct82cudkI-26re-3DIyZy9mLu5WYjlGQlN3bwJXdw1CckBXLzRmct82cudkI&amp;d=CwMGaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=mDMhW9B--jmtTN0Mneg8s2Aa-wco-YonCU1kdHYXoFQ&amp;s=yIpnt7pEScNoV0T60C9yTIJ9Ga0fXAwdStrsm2mmtgk&amp;e=" target="_blank">WHOIS:
 Blind Men and an Elephant</a>”, a report from the Security and Stability Advisory Committee (SSAC) in September 2012. </span><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal" style="margin-top:4.5pt"><span style="font-size:10pt;font-family:Arial,sans-serif;color:rgb(34,34,34)"><br>
The gist of their report is that there are four current uses of the WHOIS service, two of which the SSAC says are legitimate (law enforcement access to data; security practitioner access to data), and two where it is silent on the question of legitimacy (public
 access to data; intellectual property owner access to data). I have bullet pointed below the main arguments they raise in relation to the purpose of collecting and maintaining this data:</span><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><u></u><u></u></span></p>
</div>
<ul type="disc">
<li class="MsoNormal" style="color:#222222">
<b><u><span style="font-size:10pt;font-family:Arial,sans-serif">Terminology:</span></u></b><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">SSAC disagrees with the term “WHOIS” - prefers three specific terms be used: domain name “registration data,” “access protocol,” and “directory services”.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<b><u><span style="font-size:10pt;font-family:Arial,sans-serif">Data Elements:</span></u></b><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">The appearance of email addresses guarantees that spam will be delivered to those email addresses.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<b><u><span style="font-size:10pt;font-family:Arial,sans-serif">Purpose:</span></u></b><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">WHOIS was created to provide a means to make contact information available for what was then a very small (and essentially homogeneous in terms of user community) Internet compared to what exists
 today.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">Today there are four main uses of WHOIS:</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span>
<ul type="circle">
<li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">Public access to details about a domain name registration.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span>
<ul type="square">
<li class="MsoNormal">
SSAC <u></u><u></u> </li></ul>
</li></ul>
</li></ul>
<div>
<p class="MsoNormal" style="margin-left:1.5in">
<span style="font-family:Arial,sans-serif">​</span><span style="font-family:Verdana,sans-serif">notes that &quot;It is a widely held belief that the public Internet should have access to domain name registration data.&quot;<br>
</span><span style="font-family:Arial,sans-serif">​</span><u></u><u></u></p>
</div>
<ul type="disc">
<ul type="circle">
<li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">Law enforcement access to details about a domain name registration.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span>
<ul type="square">
<li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">SSAC says this is a legitimate use case.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li></ul>
</li><li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">Intellectual property owner access to details about a domain name registration.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span>
<ul type="square">
<li class="MsoNormal">
SSAC <u></u><u></u></li></ul>
</li></ul>
</ul>
<div>
<p class="MsoNormal" style="margin-left:1.5in">
<span style="font-family:Arial,sans-serif">​</span><span style="font-family:Verdana,sans-serif">notes that &quot;It is a widely held belief that intellectual property owners should have access to domain name registration data.&quot;<br>
</span><span style="font-family:Arial,sans-serif">​</span><u></u><u></u></p>
</div>
<p class="MsoNormal" style="margin-left:1.5in">
.<u></u><u></u></p>
<ul type="disc">
<ul type="circle">
<li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">Security practitioner access to details about a domain name registration.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span>
<ul type="square">
<li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">SSAC says this is a legitimate use case.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li></ul>
</li></ul>
<li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">SSAC would like to see research into why users purchase privacy-proxy services. It has heard that some people do so to hide from law enforcement, but would like to see more research/evidence to
 validate this point. Privacy-proxy services should not hinder the ability to trace the identity of a domain name registrant.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<b><u><span style="font-size:10pt;font-family:Arial,sans-serif">Access Levels:</span></u></b><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">SSAC says we need to distinguish between what information is collected and what information is published in an open database. Does not comment any further.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<b><u><span style="font-size:10pt;font-family:Arial,sans-serif">Universality:</span></u></b><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">Whatever policy is adopted it should be applied universally across all gTLDs.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<b><u><span style="font-size:10pt;font-family:Arial,sans-serif">Accuracy:</span></u></b><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="color:#222222">
<span style="font-size:10pt;font-family:Arial,sans-serif">Whatever data is collected must be accurate and there must be enforcement and compliance mechanisms in place to support this.</span><span style="font-family:Arial,sans-serif"><u></u><u></u></span></li></ul>
<div>
<p class="MsoNormal"><span style="font-size:10pt;font-family:Arial,sans-serif;color:rgb(34,34,34)">I hope this summary is useful. Please let me know if you would prefer that I summarise reports in a different way as we move forward with the review
 of past literature.</span><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><u></u> <u></u></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:10pt;font-family:Arial,sans-serif;color:rgb(34,34,34)">Best wishes,</span><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:10pt;font-family:Arial,sans-serif;color:rgb(34,34,34)"><br>
Ayden Férdeline</span><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><u></u> <u></u></span></p>
<div>
<p class="MsoNormal"><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)">On Fri, Mar 25, 2016 at 11:28 PM, Susan Kawaguchi via gnso-rds-pdp-purpose &lt;<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank"></a><a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a>&gt;
 wrote:<u></u><u></u></span></p>
<div>
<div>
<div>
<div>
<div>
<p><span style="font-size:11pt;font-family:Calibri,sans-serif;color:black">Hello All, </span><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black"><u></u><u></u></span></p>
<p><span style="font-size:11pt;font-family:Calibri,sans-serif;color:black">Thank you for volunteering for the Purpose </span><span style="font-size:11.5pt;font-family:Calibri,sans-serif;color:black">sub team.  </span><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black"><u></u><u></u></span></p>
<p><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black">This is a list of all that have volunteered -  Carlton Samuels, Fabricio Vayra, Susan Prosser, Beth Allegretti, Jim Galvin, Kiran Malancharuvil, Lori Schulman, Vlad Dinculescu,
 Richard Leaning, Amr Elsadr, Donna Austin, Stephanie Perrin, Tjabbe Bos, Sana Ali, Ayden Ferdeline, Greg Aaron, Jody Kolker, Adrian Cheek, Kathy Kleiman, Chuck Gomes, Maryan Rizinski, Nathalie Coupet, Roger Carney<br>
 <u></u><u></u></span></p>
<p><span style="font-size:11.5pt;font-family:Calibri,sans-serif;color:black">I look forward to working with you all over the next couple of weeks </span><span style="font-size:11pt;font-family:Calibri,sans-serif;color:black">to collect, consolidate,
 concisely summarize, and then present inputs and information about the purpose of registration data.  </span><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black"><u></u><u></u></span></p>
<p><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black">This is a link to the RDS PDP WG document that describes the approach the WG agreed upon  <a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__community.icann.org_download_attachments_58730879_RDS-2DPDP-2DProposed-2DSummary-2DApproach.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=jj7FzBqU1aFCmtm6xGYZ_ul-tjcUKBbUb3B0xOqiVdY&amp;e=" target="_blank"></a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__community.icann.org_download_attachments_58730879_RDS-2DPDP-2DProposed-2DSummary-2DApproach.pdf&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=JkCwjTKahcdizdmtWegMGvSax9n4000LkdQ1V1b_80A&amp;s=OXmX24xRRfQOe2uNKC2gvceBYO2V8_OlZP08LbRJ-Lg&amp;e=" target="_blank">https://community.icann.org/download/attachments/58730879/RDS-PDP-Proposed-Summary-Approach.pdf</a> <u></u><u></u></span></p>
<p><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black">Would any one like to volunteer to start collecting information on purpose of registration data?  I am sure that the RDS PDP WG wiki has resources to start this collection and
 then we should think of what else should be included.    Once we have started collecting the information I think a sub team conference call to discuss what we are collecting would be helpful. <u></u><u></u></span></p>
<p><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black">Any other ideas on how to approach our work?  <u></u><u></u></span></p>
<p><span style="font-size:11pt;font-family:Calibri,sans-serif;color:black">Looking forward to the discussion.  </span><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black"><u></u><u></u></span></p>
</div>
</div>
</div>
</div>
<div>
<div>
<div>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black">Susan Kawaguchi<u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black">Domain Name Manager <u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black">Facebook Legal Dept. <u></u><u></u></span></p>
</div>
</div>
<div>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:Calibri,sans-serif;color:black"><u></u> <u></u></span></p>
</div>
</div>
</div>
<p class="MsoNormal"><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><br>
_______________________________________________<br>
gnso-rds-pdp-purpose mailing list<br>
<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a><br>
<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__mm.icann.org_mailman_listinfo_gnso-2Drds-2Dpdp-2Dpurpose&amp;d=CwMGaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=mDMhW9B--jmtTN0Mneg8s2Aa-wco-YonCU1kdHYXoFQ&amp;s=E5d7OSngK_MJQ_XYYyZ__P5oY7YGk_RxVxKurwEV69I&amp;e=" target="_blank">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-purpose</a><u></u><u></u></span></p>
</div>
<p class="MsoNormal"><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><u></u> <u></u></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><u></u> <u></u></span></p>
</div>
<div>
<div>
<p class="MsoNormal" style="line-height:12.75pt"><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)">Ayden Férdeline<u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal" style="line-height:12.75pt"><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><a href="tel:%2B44.77.8018.7421" target="_blank">+44.77.8018.7421</a><u></u><u></u></span></p>
</div>
</div>
<p class="MsoNormal" style="line-height:12.75pt"><img alt="Image removed by sender." align="left"><span style="font-family:Arial,sans-serif;color:rgb(34,34,34)"><u></u><u></u></span></p>
</td>
</tr>
</tbody>
</table>
</div>
<p class="MsoNormal"><br>
_______________________________________________<br>
gnso-rds-pdp-purpose mailing list<br>
<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a><br>
<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__mm.icann.org_mailman_listinfo_gnso-2Drds-2Dpdp-2Dpurpose&amp;d=CwMGaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=mDMhW9B--jmtTN0Mneg8s2Aa-wco-YonCU1kdHYXoFQ&amp;s=E5d7OSngK_MJQ_XYYyZ__P5oY7YGk_RxVxKurwEV69I&amp;e=" target="_blank">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-purpose</a><u></u><u></u></p>
</div>
<p class="MsoNormal"><u></u> <u></u></p>
</div>
</div>
</div>
</div>
</div>
</span><br>
<fieldset></fieldset> <br>
<pre>_______________________________________________
gnso-rds-pdp-purpose mailing list
<a href="mailto:gnso-rds-pdp-purpose@icann.org" target="_blank">gnso-rds-pdp-purpose@icann.org</a><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__mm.icann.org_mailman_listinfo_gnso-2Drds-2Dpdp-2Dpurpose&amp;d=CwMDaQ&amp;c=5VD0RTtNlTh3ycd41b3MUw&amp;r=gvEx8xF7ynrYQ7wShqEr-w&amp;m=rGFzr0y8W-A7r959HLcPL7LkQv1AKxyfnEQ3l9poXoM&amp;s=JxBIbick34wImXplHinKxNXDAajYwR_0rDX246Q1YMY&amp;e=" target="_blank">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-purpose</a></pre>
</blockquote>
<br>
</div>
</div>
</span></blockquote>
<br>
</div>
</div>
</span>
</div>

<br>_______________________________________________<br>
gnso-rds-pdp-purpose mailing list<br>
<a href="mailto:gnso-rds-pdp-purpose@icann.org">gnso-rds-pdp-purpose@icann.org</a><br>
<a href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-purpose" rel="noreferrer" target="_blank">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-purpose</a><br></blockquote></div><br></div>