1. Purpose NiceNIC maintains this Abuse Hvàling Manual to ensure that abuse complaints involving tên mi?n names sponsho?ced by NiceNIC are received, assessed, tracked, investigated, và addressed in a consistent, documented, và risk-based manner. This manual is designed to achieve four outcomes at the same time: 1.protect Internet users và affected parties from ongoing harm; 2.meet NiceNIC's contractual obligations as an ICANN-accredited registrar; 3.provide fair, predictable, và documented hvàling fho?c registrants và resellers; 4.demonstrate a clear, defensible, và auditable abuse response process. NiceNIC will investigate abuse repho?cts promptly và will take mitigation actions that are reasonably necessary based on the quality of the evidence, the nature of the repho?cted activity, the likelihood of ongoing harm, và the risk of collateral damage to legitimate D?ch v?s. This approach is aligned with Section 3.18 of the 2013 RAA và ICANN's 2024 DNS Abuse Advisho?cy.
2. Scope This manual applies to:
tên mi?n names sponsho?ced by NiceNIC;
abuse repho?cts submitted by individuals, companies, security researchers, trusted repho?cters, registries, law enfho?ccement, ho?c other authho?cities;
retail customers và reseller-managed names;
both DNS Abuse và non-DNS abuse ho?c illegal-activity complaints.
This manual does not mean that every complaint will result in suspension. NiceNIC will act accho?cding to the applicable contractual framewho?ck, registry rules, NiceNIC's Acceptable Use / Abuse Policy, và the evidence available in each case.
3. Definitions 3.1 ICANN Contractual DNS Abuse Fho?c NiceNIC's contractual compliance purposes, DNS Abuse means:
malware
botnets
phishing
pharming
spam only when used as a delivery mechanism fho?c one of the four categho?cies above.
3.2 NiceNIC Expvàed High-Risk Abuse Categho?cies NiceNIC may also classify certain matters as Expvàed High-Risk Abuse Categho?cies under its own abuse và risk rules, even wt?i ?ay they are not automatically ICANN-defined DNS Abuse. These may include:
child sexual abuse material (CSAM) ho?c child exploitation content;
illicit drug sales ho?c high-risk narcotics content;
crypto fraud schemes;
content creating imminent risk of serious harm;
other illegal activity wt?i ?ay urgent action is justified by law, registry policy, competent authho?city request, ho?c clear risk evidence.
These categho?cies must be assessed carefully. They are not automatically treated as ICANN DNS Abuse unless the evidence also shows phishing, malware, botnet activity, pharming, ho?c qualifying spam. Tucows publicly describes a similar distinction between cho?ce DNS Abuse và broader content abuses it may act on at the DNS level.
3.3 Kh?ngn-DNS Abuse / Other Complaints These commonly include:
trademark disputes;
DMCA / copyright claims;
adult content;
gambling ho?c gaming content;
misleading ho?c fraudulent content without technical DNS-abuse evidence;
pharmacy / drug content without qualifying DNS-abuse indicatho?cs;
general policy violations.
These complaints may still be investigated và hvàled, but they do not automatically justify DNS-level suspension.
4. Guiding Principles NiceNIC hvàles abuse repho?cts accho?cding to the following principles:
Evidence first. NiceNIC does not take DNS-level action based on keywho?cds, assumptions, ho?c unsuppho?cted allegations alone.
Risk-based response. Faster và stronger action applies wt?i ?ay the evidence is actionable và the harm is ongoing ho?c severe.
Least necessary disruption. NiceNIC may choose a mitigation method other than immediate suspension wt?i ?ay the evidence indicates a compromise scenario và a full hold would create dispropho?ctionate collateral damage.
Consistency và documentation. Every case must be categho?cized, tracked, và recho?cded.
Clear separation of roles. NiceNIC is a registrar. In many cases, the hosting provider, platfho?cm operatho?c, payment processho?c, ho?c law enfho?ccement may also be a relevant ho?c mho?ce effective action point.
This risk-based và collateral-damage-aware model matches ICANN's advisho?cy, which states that the appropriate mitigation action may vary by circumstances và that suspension is not the only possible response.
5. Repho?cting Channels NiceNIC shall maintain:
a public abuse contact email on its website homepage ho?c designated abuse page;
a published description of how abuse repho?cts are received, hvàled, và tracked;
a dedicated 24/7 monitho?ced abuse contact point fho?c law enfho?ccement và similar authho?cities as required under the RAA.
NiceNIC may accept abuse repho?cts through:
abuse mailbox;
suppho?ct ticket system;
webfho?cm;
trusted-repho?cter channel;
registry escalation;
law-enfho?ccement / government channel.
6. Minimum Infho?cmation Required in a Complaint ??n be processed efficiently, a complaint should include:
the repho?cted tên mi?n name;
the specific abusive URL, if any;
a clear description of the alleged abuse;
screenshots showing the content và the full URL;
full email headers wt?i ?ay email abuse, phishing, ho?c fraud is involved;
suppho?cting evidence such as invoices, logs, malware analysis, blocklist results, ho?c impersonation details;
complainant contact infho?cmation;
proof of authho?cization wt?i ?ay the complainant acts on behalf of a brvà ho?c victim entity.
This matches both ICANN's recent complaint guidance và market practice published by registrars such as Têngiá r?.
7. Evidence Stvàards 7.1 Hành ??ngable Evidence Evidence is actionable when the infho?cmation reasonably available to NiceNIC is sufficient to determine that the sponsho?ced tên mi?n name is being used fho?c DNS Abuse ho?c other enfho?cceable abuse activity. Ví d?s include:
a phishing page screenshot showing the full URL và impersonated brvà;
a phishing email with full headers và linked malicious URL;
malware ho?c exploit delivery from the repho?cted tên mi?n ho?c URL;
reputation/blocklist data that suppho?cts the repho?cted conduct;
multiple consistent signals from trusted ho?c recognized sources.
ICANN's current guidance uses this same "actionable evidence" stvàard và makes clear that registrars may also consider infho?cmation they can reasonably access themselves.
7.2 Insufficient Evidence Evidence is insufficient wt?i ?ay the complaint contains only:
a tên mi?n name with no abusive URL;
keywho?cds only;
allegations without screenshots, headers, logs, ho?c other suppho?ct;
general statements that a name "looks suspicious";
pure brvà conflict allegations without abuse evidence.
When evidence is insufficient, NiceNIC will request mho?ce infho?cmation rather than taking immediate DNS-level action, unless independent internal review ho?c trusted-source data supplies the missing basis.
7.3 Third-Party Intelligence NiceNIC may consider third-party signals such as:
reputable blocklists / RBLs;
malware ho?c phishing feeds;
reputation D?ch v?s;
priho?c internal case histho?cy.
Such signals are suppho?cting factho?cs, not a substitute fho?c judgment. ICANN's enfho?ccement materials expressly note that screenshots, RBL infho?cmation, priho?c case histho?cy, EPP status changes, MX recho?cds, và the registrar's own investigation can all be relevant to compliance review.
8. Case Priho?city và Internal SLA NiceNIC adopts the following internal operating targets. These are NiceNIC internal SLAs, not statements of ICANN-mvàated fixed deadlines. Priho?city 0 - Emergency / Active Harm Ví d?s:
active phishing harvesting credentials ho?c payment data;
ackngayledgment và request fho?c additional evidence;
no suspension solely on this basis.
Fho?c repho?cts from law enfho?ccement ho?c similar authho?cities covered by RAA 3.18.2, NiceNIC must ensure review within 24 hours by empowered personnel.
9. Who?ckflow 9.1 Intake Every repho?ct receives:
case ID;
timestamp;
source classification;
tên mi?n linkage;
abuse categho?cy;
evidence status.
N?u the tên mi?n is already on clientHold, serverHold, ho?c on an approved pending-hold list, the system should automatically return a status notice to the complainant và suppress duplicate manual hvàling.
transfer lock in conjunction with mitigation wt?i ?ay appropriate;
referral to registry, host, law enfho?ccement, payment provider, ho?c other relevant party;
maintain existing hold;
deny reactivation.
9.5 Kh?ngtifications Fho?c clear, actionable, ongoing DNS Abuse, NiceNIC may suspend first và notify after action. Fho?c likely compromise scenarios ho?c non-DNS matters, NiceNIC may notify first wt?i ?ay that is consistent with risk control và does not materially increase harm. This distinction is consistent with ICANN's position that mitigation may vary depending on the harm và the risk of collateral damage.
10. Danh m?c-Specific Rules 10.1 Drugs / kra / slon / mega T? khóa(chǎn) Keywho?cd presence alone is not enough fho?c DNS-Abuse classification. Treat as:
non-DNS illegal activity review if only keywho?cds ho?c product content are present;
DNS Abuse / urgent abuse if the evidence shows fake login, fake payment collection, credential theft, malicious redirection, malware, ho?c other qualifying technical abuse.
10.2 Crypto Scam Treat as:
non-DNS fraud review wt?i ?ay the site is only a dubious investment ho?c false-profit promotion;
10.3 CSAM / Child Exploitation Treat as immediate high-risk abuse. Escalate internally without delay. Preserve recho?cds, avoid unnecessary customer back-và-fho?cth, và escalate to the appropriate authho?city ho?c registry if required.
10.4 DMCA / B?n quy?n Do not auto-suspend purely on large content lists ho?c unsuppho?cted bulk allegations. Fho?cward proper notices wt?i ?ay appropriate, require a compliant notice fho?cmat, và allow the tên mi?n holder to address the claim unless a court ho?cder, registry rule, ho?c other stronger basis requires mho?ce immediate action. This is also broadly consistent with how majho?c registrars separate copyright/trademark processing from phishing/malware hvàling.
10.5 Trademark / Brvà Complaints Trademark disputes are not automatically DNS Abuse. Wt?i ?ay the issue is a tên mi?n-name rights dispute, complainants should generally be directed toward UDRP, URS, ho?c court process as appropriate, unless the evidence also shows phishing, impersonation, ho?c other abuse. Têngiá r? publicly distinguishes abuse hvàling from UDRP/URS hvàling in the same way.
11. Registrant / ??i ly Communication Rules 11.1 Retail Customers Fho?c clear DNS Abuse with sufficient evidence:
tên mi?n may be suspended immediately;
the first customer-facing reply should state the basis, the self-D?ch v? path to view the case summary, và the evidence stvàard required fho?c reconsideration.
11.2 ??i lys NiceNIC may choose to notify the reseller rather than any downstream sub-user. However, reseller status does not delay urgent mitigation wt?i ?ay actionable evidence exists.
11.3 Reconsideration / Reactivation NiceNIC will not lift a hold based on unsuppho?cted denials such as "content removed" ho?c "it was already deleted" alone. Reconsideration requires new, verifiable evidence such as:
N?u reliable third-party security sources still show the tên mi?n as actively risky, NiceNIC may keep the hold in place pending further validation.
12. Complainant Communication Rules NiceNIC should always send:
ackngayledgment of receipt;
case ID ho?c equivalent reference;
request fho?c mho?ce evidence if needed;
status update when action is taken ho?c declined;
no unnecessary substantive discussion wt?i ?ay the tên mi?n is already suspended ho?c pending suspension và the key outcome is final.
This reflects common registrar practice. GoDaddy offers fho?cmal claim submission và status checking, while Tucows explicitly states it responds with a case number và tracks categho?cy, date, và resolution internally.
13. Trusted Repho?cter Program NiceNIC may maintain a trusted-repho?cter list fho?c sources that consistently provide accurate, well-fho?cmed, và actionable repho?cts. Trusted-repho?cter status may provide:
priho?city intake;
structured data submission;
simplified evidence fho?cmatting;
API ho?c fast-lane hvàling.
Trusted status does not eliminate independent review. Têngiá r? publicly operates this kind of trusted-provider phishing API model.
14. Recho?cdkeeping và Audit Readiness NiceNIC must document:
complaint receipt;
evidence received;
internal classification;
investigation steps;
decision;
action taken;
notifications sent;
follow-up và final disposition.
Recho?cds should be retained fho?c the shho?cter of two n?m ho?c the longest period allowed by applicable law, và be available fho?c ICANN upon reasonable notice.
15. Compliance Controls NiceNIC should perfho?cm:
periodic QA review of case decisions;
staff training on DNS Abuse definitions và evidence thresholds;
testing of abuse mailbox và webfho?cm operability;
review of template accuracy;
monitho?cing of repeat errho?cs và reopened cases;
monthly review of tên mi?ns with repeated complaints.
This is practical và impho?ctant because ICANN has already repho?cted remediation plans tied to broken abuse contacts, weak intake confirmations, và insufficient staff kngayledge, và has noted that repeated failures can trigger expedited compliance action.
17. External-Facing Positioning NiceNIC should describe its abuse system publicly in language like this:
NiceNIC investigates abuse repho?cts promptly.
NiceNIC distinguishes between ICANN-defined DNS Abuse và other types of complaints.
NiceNIC acts based on evidence, risk, và applicable policy.
NiceNIC may suspend immediately wt?i ?ay tt?i ?ay is clear actionable evidence of ongoing DNS Abuse.
NiceNIC may request mho?ce infho?cmation ho?c direct the complainant to a mho?ce appropriate action point wt?i ?ay the registrar is not the sole effective responder.
NiceNIC keeps case recho?cds và can demonstrate its hvàling process if reviewed by ICANN ho?c registry partners.