{"id":8647,"date":"2020-02-04T08:24:53","date_gmt":"2020-02-04T13:24:53","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=8647"},"modified":"2020-02-05T08:08:54","modified_gmt":"2020-02-05T13:08:54","slug":"domain-monitoring-for-policy-compliance","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/","title":{"rendered":"The Three-Pronged Defense for Brand Owners Part IV:"},"content":{"rendered":"\n<h2 class=\"has-text-color wp-block-heading\" style=\"color:#003b5c\"><strong>Domain monitoring for policy compliance <\/strong><\/h2>\n\n\n\n<i><br \/> By Ken Linscott, product director, Domains and Security<\/i> <span style=\"padding-left:50px\">Share this post \n<a class=\"social\" id=\"linkedinShare\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/LinkedIn18x20.png\" style=\"padding-left:5px\"\/><\/a>\n<a class=\"social\" id=\"twitterShare\" href=\"https:\/\/twitter.com\/intent\/tweet?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Twitter18x20.png\"\/><\/a>\n<a class=\"social\" id=\"facebookShare\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Facebook18x20.png\"\/><\/a>\n<\/span>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/02\/DBS_Part_IV_img-1024x536.jpg\" alt=\"\" class=\"wp-image-8649\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/02\/DBS_Part_IV_img-1024x536.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/02\/DBS_Part_IV_img-300x157.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/02\/DBS_Part_IV_img-768x402.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/02\/DBS_Part_IV_img.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In our three previous posts, we\u2019ve discussed how brand owners can defend their domains by using defensive registrations, blocks, and monitoring, with a focus on brand protection and third-party infringements.<\/p>\n\n\n\n<p>Domain monitoring is a known and commonly used tool for focusing on how others are misusing a brand in new domain name registrations. But this is only half the value provided by domain name monitoring. It also serves as a valuable cyber security tool that can help enforce centralized domain name policy so that brands remain compliant, both internally and externally, with initiatives like the General Data Protection Regulation (GDPR).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">WHOIS, RDAP, and ownership data<\/h2>\n\n\n\n<p>If you\u2019ve been following the developments in the world of WHOIS records for domains following the implementation of GDPR, you\u2019ll know there\u2019s been a lot of change.<\/p>\n\n\n\n<p>The WHOIS, a protocol that lists contact information for anyone requesting it, has increasingly been unable to meet the accuracy, accessibility, compliance, privacy, and other needs of domain name registrants, law enforcement agents, intellectual property and trademark owners, and individual users. This is hardly surprising given its birth in 1982 and the unimaginable way in which the internet and domain names have scaled up.<\/p>\n\n\n\n<p>With the implementation of GDPR in May 2018, the WHOIS needed to be replaced. GDPR is the most extensive privacy act globally, as it gives control to EU and European Economic Area (EEA) individuals over their personal data, with the aim of protecting their privacy. Its implementation led to companies scrambling to make compliant their internal processes and systems and place more significance on information security departments since violators of the GDPR may be fined up to \u20ac20 million or 4% of their annual worldwide earning of the preceding financial year in case of an enterprise, whichever is greater. This has implicated not only European companies, but all companies globally that engage with EU or EEA individuals.<\/p>\n\n\n\n<p>Unfortunately, the WHOIS simply did not meet these requirements. We needed a more secure and standardized format, with different access to data to ensure compliance with GDPR to protect the privacy of individual registrants, yet serve its original intent to provide clear ownership data to relevant organizations and authorities where warranted. In August 2019 The Registration Data Access Protocol (RDAP), which does just this, replaced the WHOIS as we knew it for some 30 plus years.<\/p>\n\n\n\n<p>With this change, <strong>now is the time<\/strong> to review your domain monitoring needs, and increase your investment in this vital data feed for security and compliance. <\/p>\n\n\n\n<p>And here lies the first really important point from a compliance perspective: <strong><em>You need to police your centralized domain name management policy. Policy without controls is worthless. Your control is domain name monitoring.<\/em><\/strong> Within the identified domains, you\u2019ll find those registered in good faith (however misguided) by your employees and perhaps even outside agencies. You need these under your centralized management not only to be compliant with your policy but for a host of security reasons.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Monitoring digital assets for domain security<\/h2>\n\n\n\n<p>Digital assets including domains, domain name systems (DNS), and\ndigital certificates, are fundamental building blocks for your business. They\u2019re\nthe means with which you communicate with clients, each other, and your\ninternal networks. Sadly, digital assets are vulnerable to the risks of poor\nmanagement and are increasingly targeted by cyber criminals who hijack online\npresence and web traffic, and impersonate businesses, duping clients and staff\ninto sharing valuable and confidential information.<\/p>\n\n\n\n<p>The generally accepted security approach is to consolidate under as few enterprise-class providers as possible for easy, more secure management. This should be done by surveying your organization (including marketing, legal, and IT) to understand their business needs from these assets, what they already own, and who has access. You will also need to ask your providers and registrars to undertake external audits for you.<\/p>\n\n\n\n<p>These security reasons become clear when you realize that an important aspect of auditing and consolidating your portfolio\u2014which is often overlooked\u2014is understanding your company\u2019s business critical domains. That is, domains that underpin the successful operation of your business via the web, email, voice-over IP, virtual private network access, and more\u2014as well as the specific DNS and digital certificates those critical domains use.<\/p>\n\n\n\n<p>Without an appreciation for these vital assets:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You cannot effectively apply advanced security features such as locks, domain name system security extensions (DNSSEC), and domain-based message authentication reporting and conformance (DMARC), digital certificates, or certificate authority authorization (CAA) records to those domains. In other words, you can&#8217;t ensure that you\u2019re doing everything to prevent your domains from being compromised in a cyber attack.<\/li><li>You\u2019ll also be unable to ensure that the quality of the DNS and digital certificate providers you\u2019re using are sufficient for your needs.<\/li><li>You risk accidently lapsing, abandoning, or divesting a domain you didn\u2019t realize was mission critical to your business.<\/li><\/ul>\n\n\n\n<p>If you know your vital domains, you can put policies and controls in place that will significantly reduce the threat from cyber attacks against these assets. However, deciding on policy is one thing and enforcing this policy and ensuring it acts as the control is another. For this to happen, you not only need a provider who can monitor and identify new vital domains within your portfolio, and who can notify you if any vital domain is not adhering to those controls, but you need to be able to identify domains outside of that centralized management to ensure they are considered from a security perspective in exactly the same way as those managed centrally.<\/p>\n\n\n\n<p>This is domain monitoring. It should be central to your approach to securing your digital assets and ensuring policy compliance. <br \/> <br \/> As brands enter a new decade, new challenges and risks will spring from the same landscape as opportunities. Brand owners must prioritize having these tools as part of their overall domain strategy, as it will set apart those who are prepared and have the ability to respond swiftly to infringements.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/\">&gt;&gt; Contact us for more information on how domain monitoring can be used together with CSC\u2019s Security Center<sup>SM<\/sup> to improve your domain name security and policy compliance.<\/a><\/p>\n\n\n\n<hr \/>\n\n\n\n<p><strong><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/domain-registrations-blocking-and-monitoring\/\"><strong>Read Part 1: Introduction and domain registration<\/strong><\/a><\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/three-pronged-defense-domain-blocking\/\"><strong>Read Part 2: Domain blocking<\/strong><\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/domain-monitoring-for-brand-protection\/\"><strong>Read Part 3: <\/strong> <strong>Domain monitoring for brand protection<\/strong> <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Domain monitoring for policy compliance By Ken Linscott, product director, Domains and Security Share this post In our three previous posts, we\u2019ve discussed how brand owners can defend their domains by using defensive registrations, blocks, and monitoring, with a focus on brand protection and third-party infringements. Domain monitoring is a known and commonly used tool [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,521],"tags":[],"class_list":["post-8647","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Three-Pronged Defense for Brand Owners Part IV: | CSC<\/title>\n<meta name=\"description\" content=\"Domain monitoring for policy compliance By Ken Linscott, product director, Domains and Security Share this post In our three previous posts, we\u2019ve\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Three-Pronged Defense for Brand Owners Part IV: | CSC\" \/>\n<meta property=\"og:description\" content=\"Domain monitoring for policy compliance By Ken Linscott, product director, Domains and Security Share this post In our three previous posts, we\u2019ve\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-04T13:24:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-05T13:08:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/02\/DBS_Part_IV_img-1024x536.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"The Three-Pronged Defense for Brand Owners Part IV:\",\"datePublished\":\"2020-02-04T13:24:53+00:00\",\"dateModified\":\"2020-02-05T13:08:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/\"},\"wordCount\":1062,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/DBS_Part_IV_img-1024x536.jpg\",\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/\",\"name\":\"The Three-Pronged Defense for Brand Owners Part IV: | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/DBS_Part_IV_img-1024x536.jpg\",\"datePublished\":\"2020-02-04T13:24:53+00:00\",\"dateModified\":\"2020-02-05T13:08:54+00:00\",\"description\":\"Domain monitoring for policy compliance By Ken Linscott, product director, Domains and Security Share this post In our three previous posts, we\u2019ve\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/DBS_Part_IV_img-1024x536.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/DBS_Part_IV_img-1024x536.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-monitoring-for-policy-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Three-Pronged Defense for Brand Owners Part IV:\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Three-Pronged Defense for Brand Owners Part IV: | CSC","description":"Domain monitoring for policy compliance By Ken Linscott, product director, Domains and Security Share this post In our three previous posts, we\u2019ve","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/","og_locale":"en_US","og_type":"article","og_title":"The Three-Pronged Defense for Brand Owners Part IV: | CSC","og_description":"Domain monitoring for policy compliance By Ken Linscott, product director, Domains and Security Share this post In our three previous posts, we\u2019ve","og_url":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2020-02-04T13:24:53+00:00","article_modified_time":"2020-02-05T13:08:54+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/02\/DBS_Part_IV_img-1024x536.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"The Three-Pronged Defense for Brand Owners Part IV:","datePublished":"2020-02-04T13:24:53+00:00","dateModified":"2020-02-05T13:08:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/"},"wordCount":1062,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/02\/DBS_Part_IV_img-1024x536.jpg","articleSection":["Brand Protection","Cyber security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/","url":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/","name":"The Three-Pronged Defense for Brand Owners Part IV: | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/02\/DBS_Part_IV_img-1024x536.jpg","datePublished":"2020-02-04T13:24:53+00:00","dateModified":"2020-02-05T13:08:54+00:00","description":"Domain monitoring for policy compliance By Ken Linscott, product director, Domains and Security Share this post In our three previous posts, we\u2019ve","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/02\/DBS_Part_IV_img-1024x536.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/02\/DBS_Part_IV_img-1024x536.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/domain-monitoring-for-policy-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Three-Pronged Defense for Brand Owners Part IV:"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=8647"}],"version-history":[{"count":4,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8647\/revisions"}],"predecessor-version":[{"id":8659,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8647\/revisions\/8659"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=8647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=8647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=8647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}