Home For the Industry Public Policy

Public Policy Comments

M3AAWG actively seeks to provide the necessary technical and strategic guidance to protect end-users’ online experience as government, Internet and public policy agencies worldwide develop new Internet policies and legislation. Working to reduce the spread of spam, bots and malware, M3AAWG has submitted comments on these proposals:

1
1
0
March 23, 2020

M3AAWG Comments on the Initial Report of the Temporary Specification for gTLD Registration Data Phase 2 Expedited Policy Development Process

M3AAWG, the Messaging, Malware and Mobile Anti-Abuse Working Group, appreciates this opportunity to comment on the Initial Report of the Temporary Specification for gTLD Registration Data Phase 2 Expedited Policy Development Process (https://gnso.icann.org/en/issues/epdp-phase-2-initial-07feb20-en.pdf). 

March 20, 2020

M3AAWG Response for ICANN Security Stability and Resiliency Review Team (Two)

The Messaging, Malware, and Mobile Anti Abuse Working Group (M3AAWG) welcomes the opportunity to review the draft report from ICANN’s Security Stability and Resiliency Review Team (Two).

April 05, 2019

Comments Pertaining to the Domain Abuse Activity Reporting (DAAR) System

M3AAWG submitted comments to ICANN on April 5, 2019 asking that additional actionable information be included in the DAAR system.  The comments are listed on the ICANN correspondence website at https://www.icann.org/resources/pages/correspondence.

October 18, 2018

ICANN GDPR and WHOIS Users Survey

A joint survey conducted by the Anti-Phishing Working Group (APWG) and M3AAWG looks at how cyber investigators use WHOIS data and how the European Union’s General Data Protection Regulation (GDPR) has affected their anti-abuse efforts. The letter from M3AAWG and survey are also available on the ICANN site at https://www.icann.org/en/system/files/correspondence/upton-to-marby-et-a...

April 25, 2018

Temporary Access Method for Non-Public Whois Data, and accompanying accreditation policy points

Submitted jointly by the Anti-Phishing Working Group (APWG), M3aawg and First, this document describes a short-term method for authorized parties to access non-public WHOIS data via designated IP addresses.

Pages