[arin-ppml] Use of the specified transfer policy (was: "Leasing" of space via non-connectivity providers)
On Tue, Feb 15, 2011 at 2:16 PM, Owen DeLong <owen at delong.com> wrote:
> I suggest that the term fraud is detracting from the purpose of the report.
> Perhaps an ARIN policy violation report would be more useful.
> Sent from my iPad
> On Feb 15, 2011, at 12:30 PM, Martin Hannigan <hannigan at gmail.com> wrote:
>> On Tue, Feb 15, 2011 at 1:24 PM, John Curran <jcurran at arin.net> wrote:
>>> On Feb 15, 2011, at 11:04 AM, Martin Hannigan wrote:
>>>> I didn't answer this question since I wanted to think about it. The
>>>> unfortunate answer here is that transfer policy already doesn't apply
>>>> to legacy holders from their perspective so hoping that they will sign
>>>> an agreement seems less than efficient.
>>> The transfer policy applies to all resources in ARIN's Whois Database.
>>> If you are aware of an attempt to contravene number resource policy,
>>> please submit a fraud report here: <https://www.arin.net/resources/fraud/index.html>
>>> and we'll take care of it.
>> I would, but it appears that we're all disconnected as to what fraud
>> with respect to legacy resources actually is:
>> You are receiving this message because you are subscribed to
>> the ARIN Public Policy Mailing List (ARIN-PPML at arin.net).
>> Unsubscribe or manage your mailing list subscription at:
>> Please contact info at arin.net if you experience any issues.
> You are receiving this message because you are subscribed to
> the ARIN Public Policy Mailing List (ARIN-PPML at arin.net).
> Unsubscribe or manage your mailing list subscription at:
> Please contact info at arin.net if you experience any issues.
I think that would ultimately depend on whether the term "fraud" is
being used to refer to deceit (eg. sending false and misleading data
to ARIN) or to simple failures to follow prescribed procedure.
Jeffrey Lyon, Leadership Team
jeffrey.lyon at blacklotus.net | http://www.blacklotus.net
Black Lotus Communications - AS32421
First and Leading in DDoS Protection Solutions