.GODADDY - Anti-Abuse Policy
The .GODADDY top-level domain (the “TLD”) is a .BRAND TLD as defined by the Specification 13 attached to the Registration Agreement between the Registry Operator and ICANN. Registry Operator intends to operate in such a way that only the Registry Operator, its Affiliates or Trademark Licensees are registrants of domain names in the TLD and control the DNS records associated with domain names at any level in the TLD. Registry Operator will not sell, distribute or transfer control of domain name registrations to any party that is not an Affiliate or a Trademark Licensee of the Registry Operator. As such, the Registry Operator anticipates that any abuse activities will be at a minimum and should not present a threat for the TLD.
Registry Operator will make commercially reasonable efforts to protect its space from abusive uses of its domain names. Registry Operator defines abusive use as the wrong or excessive use of power, position or ability, and includes, without limitation, the following:
Illegal or fraudulent actions; Spam: The use of electronic messaging systems to send unsolicited bulk messages. The term applies to e-mail spam and similar abuses such as instant messaging spam, mobile messaging spam, and the spamming of Websites and Internet forums. An example, for purposes of illustration, would be the use of email in denial-of-service attacks; Phishing: The use of counterfeit Web pages that are designed to trick recipients into divulging sensitive data such as usernames, passwords, or financial data; Pharming: The redirecting of unknowing users to fraudulent sites or services, typically through DNS hijacking or poisoning; Willful distribution of malware: The dissemination of software designed to infiltrate or damage a computer system without the owner's informed consent. Examples include, without limitation, computer viruses, worms, keyloggers, and trojan horses; Fast flux hosting: Use of fast-flux techniques to disguise the location of Websites or other Internet services, or to avoid detection and mitigation efforts, or to host illegal activities. Fast-flux techniques use DNS to frequently change the location on the Internet to which the domain name of an Internet host or name server resolves. Fast flux hosting may be used only with prior permission of GoDaddy; Botnet command and control: Services run on a domain name that are used to control a collection of compromised computers or "zombies," or to direct denial-of-service attacks (DDoS attacks); Distribution of child pornography; and Illegal Access to Other Computers or Networks: Illegally accessing computers, accounts, or networks belonging to another party, or attempting to penetrate security measures of another individual's system (often known as "hacking"). Also, any activity that might be used as a precursor to an attempted system penetration (e.g., port scan, stealth scan, or other information gat