All,
You may recall that when the GNSO Council decided last October in LA to
terminate the pending PDP on WHOIS, you also decided to solicit public opinions
about the types of future studies that might be conducted on WHOIS, to inform
future policy development. You may also recall that the 31 October resolution
asks staff to prepare a summary of the submissions received (amended to request
by February 25), and the Council would then provide
additional definition regarding potential data gathering and study requirements.
Staff would then provide the Council with rough cost estimates for various
components of data gathering and studies as requested by the Council.
Based on those cost estimates, the Council will decide what data gathering and
studies would be pursued; and 4) staff will perform the resulting data
gathering and studies and report the results back to the Council.
The public comment period closed on 15 February, and
attached is a summary and analysis of the public comments we received (25
total) that I’ve compiled with the considerable help of an expert
consultant, Lorrie Faith Cranor. Dr. Cranor is a professor of computer
science at Carnegie Mellon U. and an expert researcher on Internet privacy,
security and related issues, and we are fortunate to have her expertise to
review and collate study suggestions.
As you consider next steps, I do
want to point out that in the attached summary, we have grouped proposed
studies according to the following topic areas:
1.
WHOIS misuse
2.
Compliance with data protection laws
and registrar accreditation agreements
3.
Availability of privacy services
4.
Demand and motivation for use of
privacy services
5.
Impact of WHOIS data protection on
crime and abuse
6.
Proxy registrar compliance with law
enforcement and dispute resolution requests
7.
WHOIS data accuracy
You may find it useful to first
consider which of the groupings address questions you think that having data about
would inform the debate. Once you have identified which questions you want to
answer, then you could focus on only those particular groupings and consider
which study approach (or combination of approaches) will best answer your
questions. In some cases Lorrie has indicated that the different studies answer
slightly different questions. In some cases she indicates that some of the
approaches are likely to give better data, or that some of the approaches are
likely to be less expensive. When you think about the fundamental
questions asked by each grouping, you may find it more useful to consider the
questions asked by each grouping as follows:
1.
How big is the WHOIS misuse problem
that may need to be solved?
2.
Is there a non-compliance with data
protection laws problem that needs to be solved?
3.
Are there already market-driven
solutions available?
4.
Is there demand for market-driven
solutions, and are they being used for legitimate or illegitimate purposes?
5.
Do WHOIS data protections lead to
abuse and misuse?
6.
Are provisions for providing
protected WHOIS data to law enforcement for investigation of crime and abuse
effective?
7.
Is WHOIS data accurate?
I note also that several of the proposed
studies are being recommended to address questions of WHOIS accuracy and compliance
and I have also shared this summary with ICANN’s compliance director and
deputy general counsel. They may have further views that we will share as appropriate.
Lastly, if you would find it useful, Dr. Cranor can be available to participate
in an upcoming call to discuss the report and answer questions.
Thanks, Liz