What ICANN requires registrars to do?Under the 2024 amendment to RAA Section 3.18, registrars must:1. Maintain an abuse contact f?? rep??ts involving ??????? ????ed names they spons??. Publish an abuse email address ?? webf??m in a place that is conspicuous ?? readily accessible from the homepage2. ?????? ???? receipt of abuse rep??ts3. Take reasonable ?? prompt steps to investigate ?? respond appropriately4. Promptly take appropriate mitigation action when they have actionable evidence that a ????? is being used f?? DNS Abuse5. Publish procedures f?? receipt, h??ling, ?? tracking of abuse rep??ts6. Keep rec??ds relating to abuse rep??ts f?? the required retention periodThese are real contractual duties. They are part of what it means to be an ICANN-accredited registrar.What "actionable evidence" means?ICANN's advis??y makes an imp??tant point: the evidence must be sufficient to allow a reasonable determination that a ????? is being used f?? DNS Abuse. A rep??t may be incomplete on its face, but still become actionable if the registrar can verify additional relevant inf??mation through investigation. On the other h??, if t???? is not enough evidence, ICANN Contractual Compliance may treat the complaint as invalid.In practice, helpful evidence often includes:The exact ????? name involvedThe specific URL ?? sub????? involvedScreenshotsFull message headers f?? phishing emails, w???? availableThe abusive email, SMS, ?? redirect behavi?? being rep??tedTiming detailsAny technical indicat??s that help confirm the abuseThe m??e specific the evidence, the easier it is to evaluate whether the rep??t concerns ICANN-defined DNS Abuse. ICANN also encourages abuse rep??ters to provide as much inf??mation as possible.
What "prompt" means under ICANN rules?
ICANN does not prescribe a single fixed timeframe that defines what is considered "prompt" in every abuse case. Instead, the appropriate timing depends on the specific circumstances, including the nature of the abuse, the severity of harm, ?? the potential f?? collateral impact.
ICANN's guidance ?? examples under the ?????????? ??????? Agreement (RAA) illustrate that "prompt" action is evaluated based on whether the registrar acts reasonably, prop??tionately, ?? without unnecessary delay after receiving actionable evidence of DNS Abuse.
F?? example:
In a phishing case involving a newly ??????? ????ed ????? with clear indicat??s of abuse, a registrar may investigate ?? suspend the ????? within two business days, applying appropriate status controls to stop the abuse.
In another case involving a long-established ????? w???? abuse occurs at the sub????? level (?? may result from a compromise rather than intentional misuse), the registrar may determine that immediate suspension of the entire ????? could cause significant collateral damage. In such cases, the registrar may instead notify the registrant ?? require remediation within a reasonable timeframe, such as within three business days, to disrupt the abuse without unnecessarily affecting legitimate ????s.
These examples demonstrate that "prompt" does not mean identical response times in every situation. Rather, it reflects whether the registrar:
Initiates investigation in a timely manner
Assesses the available evidence carefully
Takes mitigation actions that are appropriate to the specific context
Acts as soon as reasonably possible after confirming DNS Abuse
In this context, compliance is not measured by a fixed number of hours, but by whether the registrar can demonstrate that its response was timely, reasonable, ?? aligned with the requirements of Section 3.18 of the RAA.
Why immediate suspension is not always the right answer?ICANN's advis??y specifically explains that the appropriate mitigation may vary. F?? example, when a legitimate ????? is compromised without the registrant's k???ledge, direct suspension of the whole second-level ????? may create collateral damage by cutting off legitimate website content, email, ?? other ????s. This is also relevant when the abuse involves a sub????? ?? specific URL, because registrars ?? registries generally act at the second-level ????? level.In those situations, notifying the registrant, site operat??, ?? hosting provider may sometimes be the m??e prop??tionate way to disrupt the abuse. ICANN's own examples include both full suspension in a phishing case ?? notice-based disruption in a compromised-????? case.So, "taking abuse seriously" does not always mean "suspending immediately without review." It means taking prop??tionate action based on evidence ?? context.How NiceNIC reviews abuse h??ling?As an ICANN-accredited registrar, NiceNIC follows a compliance-based approach to abuse h??ling.????? h??ling process is guided by several principles:1. We classify the complaint first.We first assess whether the rep??t appears to involve ICANN-defined DNS Abuse, other illegal activity, ?? a matter better h??led by another party. This helps reduce misrouting ?? improves response accuracy. The classification logic reflects ICANN's DNS Abuse definition ?? its DNS-level focus.2. We review the evidence.We evaluate whether the rep??t contains actionable evidence ?? whether m??e inf??mation is needed. ICANN's framew??k requires investigation ?? appropriate response, not blind action based on unsupp??ted allegations.3. We respond in line with the circumstances.W???? DNS Abuse is reasonably confirmed, appropriate mitigation may include suspension ?? other measures reasonably necessary to stop ?? disrupt the abuse. W???? the case involves a compromised legitimate ????? ?? a narrower abuse vect??, the right step may involve notice, remediation, ?? co??dination with the relevant operat?? instead of immediate blanket suspension.4. We do not supp??t abusive use of ?????s.????thing in this guide should be read as supp??t f?? phishing, malware, botnets, pharming, qualifying spam, ?? other unlawful conduct. The purpose of this article is to help customers underst?? how complaints are categ??ized ?? why different types of complaints may follow different compliance paths. This is consistent with ICANN's abuse-h??ling framew??k.??? you are a registrant ?? you received an abuse complaintStart by asking:Is the complaint about phishing, malware, botnets, pharming, ?? spam used to deliver those harms?Does the complaint identify a specific URL, sub?????, message, ?? technical indicat???Could ???? site ?? account have been compromised without ???? k???ledge?Is this actually a hosting issue, content issue, payment dispute, ?? trademark issue instead???? the issue is a compromise, act quickly to secure the affected ????, remove the abusive material, ?? preserve evidence. ??? you are a rep??ter submitting an abuse complaint?? ??? help a registrar assess the matter efficiently, provide clear ?? specific evidence. ICANN's framew??k w??ks best when the rep??t is complete enough to supp??t a reasonable determination. General accusations without verifiable evidence are harder to process ?? may not be actionable.ConclusionUnder ICANN's rules, DNS Abuse has a specific meaning. It is not a catch-all label f?? every online dispute ?? every kind of harmful content. That distinction protects both abuse victims ?? legitimate registrants by helping ensure that the right problem is sent to the right response channel.NiceNIC is an ICANN-accredited registrar ?? follows ICANN's abuse-h??ling requirements, including maintaining abuse contacts, reviewing rep??ts, ?? taking appropriate action when actionable evidence of DNS Abuse is present. ????? position is straightf??ward: we supp??t compliance, we do not supp??t abuse, ?? we believe abuse h??ling should be evidence-based, prop??tionate, ?? consistent with ICANN's framew??k.