<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <p><font size="+1"><font face="Lucida Grande">+1</font></font></p>
    <p><font size="+1"><font face="Lucida Grande">Stephanie</font></font><br>
    </p>
    <br>
    <div class="moz-cite-prefix">On 2017-05-17 17:38, Greg Shatan wrote:<br>
    </div>
    <blockquote
cite="mid:CA+aOHUQAfFkaH7P-tYcPgNtvGKWdEUmNGAGLWWqoXnW_NzK7kg@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=windows-1252">
      <div dir="ltr">
        <div class="gmail_default"
          style="font-family:verdana,sans-serif">One way to deal with
          harvesters is through a licensing set-up.  There are
          legitimate reasons to have the full dataset, and these should
          be accommodated in a controlled environment.  Preventing bad
          harvesters is worthwhile, prevent all harvesting is another
          issue entirely....</div>
      </div>
      <div class="gmail_extra"><br clear="all">
        <div>
          <div class="gmail_signature" data-smartmail="gmail_signature">
            <div dir="ltr">
              <div>
                <div dir="ltr">
                  <div>
                    <div dir="ltr">
                      <div dir="ltr">
                        <div dir="ltr">
                          <div dir="ltr">
                            <div dir="ltr">
                              <div dir="ltr">
                                <div dir="ltr">
                                  <div>
                                    <p style="text-indent:0in"><span
                                        style="font-size:12.8px"><a
                                          moz-do-not-send="true"
name="UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter__GoBack"></a></span><b
                                        style="font-size:12.8px"><span
style="font-size:10.0pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#002e62">Greg
                                          Shatan<br>
                                        </span></b><span
                                        style="font-size:10pt;font-family:Arial,sans-serif;color:black">C:
                                        917-816-6428<br>
                                        S: gsshatan</span><font
                                        face="Arial, sans-serif"
                                        color="#000000"><span
                                          style="font-size:13.3333px"><br>
                                        </span></font><a
                                        moz-do-not-send="true"
                                        href="mailto:gregshatanipc@gmail.com"
style="font-family:Arial,sans-serif;font-size:10pt;text-indent:0in"
                                        target="_blank"><span
                                          style="color:#1155cc">gregshatanipc@gmail.com</span></a></p>
                                    <p
                                      style="font-size:12.8px;text-indent:0in"><span
style="font-size:10.0pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;"></span></p>
                                  </div>
                                </div>
                              </div>
                            </div>
                          </div>
                        </div>
                      </div>
                    </div>
                  </div>
                </div>
              </div>
            </div>
          </div>
        </div>
        <br>
        <div class="gmail_quote">On Wed, May 17, 2017 at 3:00 PM,
          Michael Peddemors <span dir="ltr">&lt;<a
              moz-do-not-send="true"
              href="mailto:michael@linuxmagic.com" target="_blank">michael@linuxmagic.com</a>&gt;</span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex"><span
              class="">On 17-05-17 10:46 AM, Jeremy Malcolm wrote:<br>
              <blockquote class="gmail_quote" style="margin:0 0 0
                .8ex;border-left:1px #ccc solid;padding-left:1ex">
                On 17/5/17 9:40 am, Michael Peddemors wrote:<br>
                <blockquote class="gmail_quote" style="margin:0 0 0
                  .8ex;border-left:1px #ccc solid;padding-left:1ex">
                  Yes, this is the common argument, however IMHO this is
                  a red herring..<br>
                  There are more efficient ways for 'harvesters' to gain
                  data, and<br>
                  others way to prevent such abuse..<br>
                  <br>
                  Again, IMHO this argument is another case of impacting
                  the many<br>
                  legitimate users, for the sake of a few bad apples..<br>
                  <br>
                  And I havent' seen any arguments yet, of a case
                  scenario which can't<br>
                  be addressed by other means..<br>
                </blockquote>
                <br>
                So to reverse this, what are the *legitimate* purposes
                of harvesting?<br>
              </blockquote>
              <br>
            </span>
            Who said anything about arguing for 'harvesting' as a
            legitimate purpose?  I didn't, and even pointed out that
            there are way(s) to target harvesters..<br>
            <br>
            I was pointing out the legitimate purposes of accessing the
            data..<br>
            <br>
            And many of those cases have already been stated, I could
            re-iterate those arguments, and give examples of why 'we'
            need to access the data, but again, 'harvesting' is
            different than access.<br>
            <br>
            Arguing that we 'have to stop harvesters' by denying access
            to the data for legitimate purposes was the original point. 
            There are other means to target those perpetrators..  But it
            shouldn't be used as a 'scary boogeyman' exists, so everyone
            lock your doors.<br>
            <br>
            To paraphrase.. "Just because criminals exist, doesn't mean
            that civilians can't walk the street".  That is a 'gut
            reaction' of fear, and not a solution.  Better policing,
            targeting criminals, or carry a big stick solves that :)<br>
            <br>
            Nuff said.. as I said, lets' place case scenario's and
            argument each on their merits.. and not react to a
            'undefinable' threat..
            <div class="HOEnZb">
              <div class="h5"><br>
                <br>
                <br>
                <br>
                <br>
                <br>
                <br>
                -- <br>
                "Catch the Magic of Linux..."<br>
                ------------------------------<wbr>------------------------------<wbr>------------<br>
                Michael Peddemors, President/CEO LinuxMagic Inc.<br>
                Visit us at <a moz-do-not-send="true"
                  href="http://www.linuxmagic.com" rel="noreferrer"
                  target="_blank">http://www.linuxmagic.com</a>
                @linuxmagic<br>
                ------------------------------<wbr>------------------------------<wbr>------------<br>
                A Wizard IT Company - For More Info <a
                  moz-do-not-send="true" href="http://www.wizard.ca"
                  rel="noreferrer" target="_blank">http://www.wizard.ca</a><br>
                "LinuxMagic" a Registered TradeMark of Wizard Tower
                TechnoServices Ltd.<br>
                ------------------------------<wbr>------------------------------<wbr>------------<br>
                <a moz-do-not-send="true" href="tel:604-682-0300"
                  value="+16046820300" target="_blank">604-682-0300</a> Beautiful
                British Columbia, Canada<br>
                <br>
                This email and any electronic data contained are
                confidential and intended<br>
                solely for the use of the individual or entity to which
                they are addressed.<br>
                Please note that any views or opinions presented in this
                email are solely<br>
                those of the author and are not intended to represent
                those of the company.<br>
                ______________________________<wbr>_________________<br>
                gnso-rds-pdp-wg mailing list<br>
                <a moz-do-not-send="true"
                  href="mailto:gnso-rds-pdp-wg@icann.org"
                  target="_blank">gnso-rds-pdp-wg@icann.org</a><br>
                <a moz-do-not-send="true"
                  href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg"
                  rel="noreferrer" target="_blank">https://mm.icann.org/mailman/l<wbr>istinfo/gnso-rds-pdp-wg</a><br>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
gnso-rds-pdp-wg mailing list
<a class="moz-txt-link-abbreviated" href="mailto:gnso-rds-pdp-wg@icann.org">gnso-rds-pdp-wg@icann.org</a>
<a class="moz-txt-link-freetext" href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg</a></pre>
    </blockquote>
    <br>
  </body>
</html>