Access Logging and Obligations

  • A pseudonymized, auditable log of designated activity may be shared.
  • This includes Requestor (except “do not track”) or Registrant activity (e.g., domain transfers).
  • Requests to unmask requests may follow a process similar to requests for registration data.

Personal data for all verified parties would be retained for appropriate designated retention periods.