Download presentation
Presentation is loading. Please wait.
Published byAmice O’Connor’ Modified over 8 years ago
1
APTLD MEETING Manila 23 – 24 February 2009
2
ccTLD Role in Its Community RFC 1591 Introduction Foresaw a few TLDs (edu, com, net, org, gov, etc.) and ccTLDs It is extremely unlikely that any other TLDs will be created Country code domains are each organised by an adminstrator for that country. May further delegate management of portions of domain naming trees These administrators are performing public service on behalf of the Internet community Principles for Selecting Designated Manager Ability to carry out responsibilities and do an equitable, just, honest and competent job Requirements and Roles Internet presence IP Connectivity to name servers and email connectivity to management & staff Administrative (residing in country) and Technical Contacts Trustee of TLD for the nation and global Internet community
3
ccTLD Role in Its Community RFC 1591 Introduction Requirements and Roles (Cont’d) Be equitable to all groups in the domain that request domain names Support from significantly interested parties IANA tries to have contending parties reach agreement IANA takes no action to change things unless all parties agree IANA steps in where designated manager has substantially mis-behaved Satisfactory operation of DNS service for the domain Primary and secondary nameservers Transfer of designated manager must be mutually agreed and approved by IANA Where there is a dispute on rights to a name, ccTLD has no role or responsibility other than to provide contact information to both parties Country codes do not determine country status
4
ccTLD Role in Its Community RFC 1591 Introduction Concerns of ccTLDs Internet Code of Practice in lieu of regulations Morality Issues such as vulgar or offensive names, or hosting of contents against the law such as porn material or advertising sale of controlled medical products Image and reputation of country name internationally. Avoid being associated with dangerous website names, such as names used for spamming or phishing
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.