Donuts Inc. ("Donuts") is committed to the stable and secure operation of its top-level domains (“TLDs”). Abusive use of domain names creates security and stability issues for registries, registrars and registrants - as well as for users of the Internet in general. Accordingly, Donuts requires that domain names in its TLDs adhere to this Acceptable Use and Anti-Abuse Policy (“AUP”).
Donuts will address abusive behavior in its TLDs consistent with this AUP. Donuts provides an abuse point of contact through an e-mail address posted on the Donuts website found at www.donuts.domains (currently: ). This e-mail address will allow multiple staff members to monitor and address abuse reports. Donuts also provides a web form for complaints on the Donuts website.
Donuts reserves the right, at its sole discretion and at any time and without limitation, to deny, suspend, cancel, redirect, or transfer any registration or transaction, or place any domain name(s) on registry lock, hold, or similar status as it determines necessary for any of the following reasons:
- to protect the integrity and stability of one of its registries;
- to comply with any applicable laws, government rules or requirements, requests of law enforcement, or any dispute resolution process;
- to avoid any liability, civil or criminal, on the part of Donuts, its affiliates, subsidiaries, officers, directors, contracted parties, agents, or employees;
- to comply with the terms of the applicable registration agreement and Donuts’ policies;
- where registrant fails to keep Whois information accurate or up-to-date;
- domain name use is abusive or violates this AUP, or a third partyʹs rights or acceptable use policies, including but not limited to the infringement of any copyright or trademark;
- to correct mistakes made by a registry operator or any registrar in connection with a domain name registration; or
- as needed during resolution of a dispute.
Abusive use of a domain is described as an illegal, disruptive, malicious, or fraudulent action and includes, without limitation, the following:
- distribution of malware;
- dissemination of software designed to infiltrate or damage a computer system without the owners informed consent, including, without limitation, computer viruses, worms, keyloggers, trojans, and fake antivirus products;
- phishing, or any attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication;
- DNS hijacking or poisoning;
- spam, including using electronic messaging systems to send unsolicited bulk messages, including but not limited to e-mail spam, instant messaging spam, mobile messaging spam, and the spamming of Internet forums;
- botnets, including malicious fast-flux hosting;
- denial-of-service attacks;
- child pornography or any images of child abuse;
- promotion, encouragement, sale, or distribution of prescription medication without a valid prescription in violation of applicable law;
- illegal access of computers or networks; and
- cyber-bullying or harassment.