NiceNIC Abuse Handling Manual
NiceNIC Abuse Handling Manual

1. Purpose
NiceNIC maintains this Abuse Handling Manual to ensure that abuse complaints involving domain names sponsored by NiceNIC are received, assessed, tracked, investigated, and addressed in a consistent, documented, and risk-based manner.
This manual is designed to achieve four outcomes at the same time:
 1.protect Internet users and affected parties from ongoing harm; 
 2.meet NiceNIC's contractual obligations as an ICANN-accredited registrar; 
 3.provide fair, predictable, and documented handling for registrants and resellers; 
 4.demonstrate a clear, defensible, and auditable abuse response process. 
NiceNIC will investigate abuse reports promptly and will take mitigation actions that are reasonably necessary based on the quality of the evidence, the nature of the reported activity, the likelihood of ongoing harm, and the risk of collateral damage to legitimate services. This approach is aligned with Section 3.18 of the 2013 RAA and ICANN's 2024 DNS Abuse Advisory. 

2. Scope
This manual applies to:
This manual does not mean that every complaint will result in suspension. NiceNIC will act according to the applicable contractual framework, registry rules, NiceNIC's Acceptable Use / Abuse Policy, and the evidence available in each case.


3. Definitions
3.1 ICANN Contractual DNS Abuse
For NiceNIC's contractual compliance purposes, DNS Abuse means:
spam only when used as a delivery mechanism for one of the four categories above. 

3.2 NiceNIC Expanded High-Risk Abuse Categories
NiceNIC may also classify certain matters as Expanded High-Risk Abuse Categories under its own abuse and risk rules, even where they are not automatically ICANN-defined DNS Abuse. These may include:
These categories must be assessed carefully. They are not automatically treated as ICANN DNS Abuse unless the evidence also shows phishing, malware, botnet activity, pharming, or qualifying spam. Tucows publicly describes a similar distinction between core DNS Abuse and broader content abuses it may act on at the DNS level. 

3.3 Non-DNS Abuse / Other Complaints
These commonly include:
These complaints may still be investigated and handled, but they do not automatically justify DNS-level suspension.


4. Guiding Principles
NiceNIC handles abuse reports according to the following principles:
This risk-based and collateral-damage-aware model matches ICANN's advisory, which states that the appropriate mitigation action may vary by circumstances and that suspension is not the only possible response. 


5. Reporting Channels
NiceNIC shall maintain:
NiceNIC may accept abuse reports through:


6. Minimum Information Required in a Complaint
To be processed efficiently, a complaint should include:
This matches both ICANN's recent complaint guidance and market practice published by registrars such as Namecheap. 


7. Evidence Standards
7.1 Actionable Evidence
Evidence is actionable when the information reasonably available to NiceNIC is sufficient to determine that the sponsored domain name is being used for DNS Abuse or other enforceable abuse activity.
Examples include:
ICANN's current guidance uses this same "actionable evidence" standard and makes clear that registrars may also consider information they can reasonably access themselves. 

7.2 Insufficient Evidence
Evidence is insufficient where the complaint contains only:
When evidence is insufficient, NiceNIC will request more information rather than taking immediate DNS-level action, unless independent internal review or trusted-source data supplies the missing basis.

7.3 Third-Party Intelligence
NiceNIC may consider third-party signals such as:
Such signals are supporting factors, not a substitute for judgment. ICANN's enforcement materials expressly note that screenshots, RBL information, prior case history, EPP status changes, MX records, and the registrar's own investigation can all be relevant to compliance review. 


8. Case Priority and Internal SLA
NiceNIC adopts the following internal operating targets. These are NiceNIC internal SLAs, not statements of ICANN-mandated fixed deadlines.
Priority 0 - Emergency / Active Harm
Examples:
Target:

Priority 1 - High-Risk Actionable Abuse
Examples:
Target:

Priority 2 - Non-DNS Abuse with Sufficient Evidence
Examples:
Target:

Priority 3 - Incomplete / Low-Quality Reports
Target:
For reports from law enforcement or similar authorities covered by RAA 3.18.2, NiceNIC must ensure review within 24 hours by empowered personnel. 


9. Workflow
9.1 Intake
Every report receives:
If the domain is already on clientHold, serverHold, or on an approved pending-hold list, the system should automatically return a status notice to the complainant and suppress duplicate manual handling.

9.2 Triage
The case is classified by:

9.3 Investigation
The reviewer checks:

9.4 Decision
Possible outcomes:

9.5 Notifications
For clear, actionable, ongoing DNS Abuse, NiceNIC may suspend first and notify after action.
For likely compromise scenarios or non-DNS matters, NiceNIC may notify first where that is consistent with risk control and does not materially increase harm.
This distinction is consistent with ICANN's position that mitigation may vary depending on the harm and the risk of collateral damage. 


10. Category-Specific Rules
10.1 Drugs / kra / slon / mega Keywords
Keyword presence alone is not enough for DNS-Abuse classification.
Treat as:

10.2 Crypto Scam
Treat as:

10.3 CSAM / Child Exploitation
Treat as immediate high-risk abuse. Escalate internally without delay. Preserve records, avoid unnecessary customer back-and-forth, and escalate to the appropriate authority or registry if required.

10.4 DMCA / Copyright
Do not auto-suspend purely on large content lists or unsupported bulk allegations.
Forward proper notices where appropriate, require a compliant notice format, and allow the domain holder to address the claim unless a court order, registry rule, or other stronger basis requires more immediate action.
This is also broadly consistent with how major registrars separate copyright/trademark processing from phishing/malware handling. 

10.5 Trademark / Brand Complaints
Trademark disputes are not automatically DNS Abuse.
Where the issue is a domain-name rights dispute, complainants should generally be directed toward UDRP, URS, or court process as appropriate, unless the evidence also shows phishing, impersonation, or other abuse. Namecheap publicly distinguishes abuse handling from UDRP/URS handling in the same way. 


11. Registrant / Reseller Communication Rules
11.1 Retail Customers
For clear DNS Abuse with sufficient evidence:

11.2 Resellers
NiceNIC may choose to notify the reseller rather than any downstream sub-user.
However, reseller status does not delay urgent mitigation where actionable evidence exists.

11.3 Reconsideration / Reactivation
NiceNIC will not lift a hold based on unsupported denials such as "content removed" or "it was already deleted" alone.
Reconsideration requires new, verifiable evidence such as:
If reliable third-party security sources still show the domain as actively risky, NiceNIC may keep the hold in place pending further validation.


12. Complainant Communication Rules
NiceNIC should always send:
This reflects common registrar practice. GoDaddy offers formal claim submission and status checking, while Tucows explicitly states it responds with a case number and tracks category, date, and resolution internally. 


13. Trusted Reporter Program
NiceNIC may maintain a trusted-reporter list for sources that consistently provide accurate, well-formed, and actionable reports.
Trusted-reporter status may provide:
Trusted status does not eliminate independent review. Namecheap publicly operates this kind of trusted-provider phishing API model. 


14. Recordkeeping and Audit Readiness
NiceNIC must document:
Records should be retained for the shorter of two years or the longest period allowed by applicable law, and be available for ICANN upon reasonable notice. 


15. Compliance Controls
NiceNIC should perform:
This is practical and important because ICANN has already reported remediation plans tied to broken abuse contacts, weak intake confirmations, and insufficient staff knowledge, and has noted that repeated failures can trigger expedited compliance action. 


16. Metrics
NiceNIC should track at least:


17. External-Facing Positioning
NiceNIC should describe its abuse system publicly in language like this: