.REALTOR Acceptable Use Policy (AUP)
Real Estate Domains LLC (RED) provides an abuse point of contact through an e-mail address (such as: firstname.lastname@example.org). This e-mail address will allow multiple staff members to monitor and address abuse reports.
RED reserves the right, at its sole discretion and at any time and without limitation, to deny, suspend, cancel, redirect, or transfer any registration or transaction, or place any domain name(s) on registry lock, hold, or similar status as it determines necessary for any of the following reasons:
- to protect the integrity and stability of .REALTOR;
- to enforce the .REALTOR end user licensing agreement as may be amended from time to time;
- to comply with any applicable laws, government rules or requirements, requests of law enforcement, or any dispute resolution process;
- to avoid any liability, civil or criminal, on the part of NAR, RED, its affiliates, subsidiaries, officers, directors, contracted parties, agents, or employees;
- to comply with the terms of the applicable registration agreement and/or .REALTOR policies;
- where registrant fails to keep Whois information accurate or up-to-date;
- domain name use is abusive or violates this AUP, or a third partyʹs rights or acceptable use policies, including but not limited to the infringement of any copyright or trademark;
- to correct mistakes made by a registry operator or any registrar in connection with a domain name registration; or
- as needed during resolution of a dispute.
Abusive use of a domain is described as an illegal, disruptive, malicious, or fraudulent action and includes, without limitation, the following:distribution of malware;
- distribution of malware;
- dissemination of software designed to infiltrate or damage a computer system without the owners informed consent, including, without limitation, computer viruses, worms, keyloggers, trojans, and fake antivirus products;
- phishing, or any attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication;
- DNS hijacking or poisoning;
- spam, including using electronic messaging systems to send unsolicited bulk messages, including but not limited to e-mail spam, instant messaging spam, mobile messaging spam, and the spamming of Internet forums;
- botnets, including malicious fast-flux hosting;
- denial-of-service attacks;
- child pornography or any images of child abuse;
- promotion, encouragement, sale, or distribution of prescription medication without a valid prescription in violation of applicable law; and
- illegal access of computers or networks.