Abuse Policy

.Club Anti Spam and Abuse Policies

.Club Domains is committed to the stable and secure operation of its top-level domains (“TLDs”). Abusive use of domain names creates security and stability issues for registries, registrars and registrants – as well as for users of the Internet in general. Accordingly, .Club Domains requires that domain names in its TLDs adhere to this Acceptable Use and Anti-Abuse .Club Domains will address abusive behavior in its TLDs consistent with this AUP.

.Club Domains provides an abuse point of contact through an e-mail address posted on the .Club Domains website found at www.nic.club (currently: abuse@nic.club). This e-mail address will allow multiple staff members to monitor and address abuse reports. .Club Domains reserves the right, at its sole discretion and at any time and without limitation, to deny, suspend, cancel, redirect, or transfer any registration or transaction, or place any domain name(s) on registry lock, hold, or similar status as it determines necessary for any of the following reasons

  • to protect the integrity and stability of one of its registries;
  • to comply with any applicable laws, government rules or requirements, requests of law enforcement, or any dispute resolution process;
  •  to avoid any liability, civil or criminal, on the part of .Club Domains, its affiliates, subsidiaries, officers, directors, contracted parties, agents, or employees;
  • to comply with the terms of the applicable registration agreement and .Club Domains’
  • where registrant fails to keep Whois information accurate or up-to-date;
  • domain name use is abusive or violates the AUP, or a third party’s rights or acceptable use policies, including but not limited to the infringement of any copyright or trademark;
  •  to correct mistakes made by a registry operator or any registrar in connection with a domain name registration; or as needed during resolution of a dispute.

Abusive use of a domain is described as an illegal, disruptive, malicious, or fraudulent action and includes, without limitation, the following:

  • distribution of malware;
  • dissemination of software designed to infiltrate or damage a computer system without the owners informed consent, including, without limitation, computer viruses, worms, keyloggers, trojans, and fake antivirus products;
  • phishing, or any attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic
  • DNS hijacking or poisoning;
  • spam, including using electronic messaging systems to send unsolicited bulk messages, including but not limited to e-mail spam, instant messaging spam, mobile messaging spam, and the spamming of Internet forums;
  • botnets, including malicious fast-flux hosting;
  • denial-of-service attacks;
  • child pornography or any images of child abuse;
  •  promotion, encouragement, sale, or distribution of prescription medication without a valid prescription in violation of applicable law; and
  • illegal access of computers or networks.