The domain landscape is ever-changing.
Consider how far it’s come since the 1980s when the first domain names were registered. These were of the .net and .com variety. Fast-forward 25 years, and businesses are registering innovative .Brand extensions... for reasons that range from marketing promotions to protective online protection of IP.
The industry has been shaped by the launch of generic top level domains (gTLDs), ongoing legal and political changes, as well as the encroachment of cyber threats — all factors which make the management of your domain portfolio that much more important, yet complex. There are many factors to consider,...Read More
In a market characterised by intense competition and change, domains are key to establishing brand identity. They also form the core of a broader business strategy and therefore must be protected at all costs.
But what are the best ways to approach d...omain management and security? How does this fit into the broader brand protection strategy? And how do different elements, such as dealing with infringement, fraud and brand abuse, affect one another?
We sought these answers in our latest Global Business Survey by speaking to 700 marketing, legal and IT decision makers about the state of brand protection, domain and cyber...Read More
Last week, more than 1,700 individuals from around the globe attended the first ICANN meeting of the year, hosted in Kobe, Japan. Members of our Domain, Sales, Marketing and GRM teams actively participated in the ICANN policy development and informat...ional working sessions and held important meetings with valued Japanese clients and business partners.
As has been the case for the last year, the most important discussions at ICANN last week involved the work of the Expedited Policy Development Process (EPDP) and the working group tasked with developing a new policy for the collection, storage, transfer, and display of registrant data, commonly...Read More
Last October, we posted an article describing the impacts of redacted registration data (“WHOIS”) on its domain name protection, anti-counterfeit, anti-piracy, and anti-fraud services.
As explained in that post, MarkMonitor uses WHOIS data for severa...l legitimate purposes, including investigating infringing domain names, identifying the source of phishing attacks, and issuing cease & desist letters to cybercriminals, counterfeiters, and infringers. When GDPR became effective, ICANN issued a Temporary Specification for the collection, storage and display of registration data and, since that time, MarkMonitor has been working with registrars and registries to obtain WHOIS data needed to stop infringement and other forms of...Read More
For Lauren Dienes-Middlen, protecting fans from counterfeit product and removing unauthorized sharing of video content has proven no small feat. Challenging, yes. But, she says, a real impact can be made.
Seventeen years in to her stint with World Wr...estling Entertainment, the now senior vice president and assistant general counsel, intellectual property, finds herself worlds away from her beginnings at boutique law firms. Her watchful eye helps protect more than 9,000 trademark applications and registrations worldwide as well as the content of globally-renowned entertainment programming that reaches more than 800 million homes worldwide.
With International Women’s Day on the horizon, we...Read More