Abuse
This document outlines the procedure for the receipt, handling, and tracking of abuse reports concerning domain names under one.com’s management and compliance with the 2013 ICANN Registrar Accreditation Agreement about generic domain names.
How to report an abuse case?
1. Report abuse via email
Complaints can be emailed to us at abuse@one.com for any alleged issue of abuse related to any domain name registered with one.com or contents hosted on our servers.
Incoming abuse emails are received and tracked in our abuse handling system, and valid requests will be addressed and answered by an abuse desk representative as quickly as possible. We proceed on a case-by-case basis and perform the actions that we deem necessary within the framework of currently applicable law. Emails are answered based on their issue, concern or inquiry and may involve communication with the domain registrant. Please make sure to send along any useful evidence as outlined in the below list of most common types of abuse.
2. Report Abuse via telephone
We do not handle abuse reports via phone. When calling us on the dedicated line at +45 44451220, an answering machine will redirect you to our abuse email address.
Most common types of abuse handled in our abuse desk
The following list explains the most common types of abuse we investigate and the required evidence we expect from you to support our investigation:
Type of abuse and description | Useful evidence | Notes and advice |
---|---|---|
Child Abuse – is adult content depicting minors (someone under the age of 18 years) |
|
|
Copyright – is the content that is protected by copyright being published online with no authorisation rights |
|
|
Email Abuse/Spam – is an unsolicited commercial bulk email. |
|
Regular FP/FN re-classifications are handled through our normal support queue |
Fraud – is the wrongful deception with the intent to gain a monetary benefit (also known as a scam) or other benefits (i.e. access to personal data) |
|
|
Phishing – is a type of fraud with the intent to acquire sensitive information (usernames, passwords, PINs, credit card or bank account details) using fake websites that are almost identical to legitimate ones |
|
|
Malware – is software used to disrupt computer operations, gather sensitive data or gain access to private computer systems |
|
If you clicked any links, please make sure to scan your machine with an up-to-date anti-virus program thoroughly |
Hacking Activity – is networking attacks such as port scanning, brute force, denial of service attacks etc., with the intent to infect or exploit the victim’s resources or for other illegal purposes |
|
|
Trademark Infringement – the unauthorised use of a trademark or service mark on or in connection with goods and/or services in a manner that is likely to cause confusion, deception or mistake about the source of the goods and/or services |
|
|
Whois Inaccuracy – implies inaccurate, outdated or false contact details listed in Whois |
|
|
Abuse Reports – stand for any other inappropriate content, including but not limited to: identity theft, unauthorised redirection/frame/IP pointing, defamation, terrorism propaganda, warez etc. |
|