SlideShare a Scribd company logo
Simple  is  the Best and Long Lasting. All Rights Reserved 2011 :Group (3)
Group (3) : ,[object Object],B-Tech 2nd Year(IT) , Technological University (Mdy) Mandalay , Myanmar. ,[object Object],LL.B, Higher Grade Pleader Mandalay, Myanmar. ,[object Object],LL.B  1st Year, Yada Nar Bon University Mandalay , Myanmar ,[object Object],LL.B  1st Year, Yada Nar Bon University Mandalay , Myanmar
Intellectual Property  It’s Rights and Information Technology 30-07-2011 BIZLAW CONSULTANT Mandalay, The Republic of the Union of Myanmar This presentation is for the fulfillment and requirement of fundamental of IPRs  course  provided by BIZLAW CONSULT, Mandalay.
Objective :  ,[object Object],Contents:  ,[object Object]
IP & IT.
Domain Name.
Cyber Squatting.All Rights Reserved 2011 :Group (3)
Intellectual Property ? Short form:  IP Just in your hand. Just in your Bag. Just beside you. All Rights Reserved 2011 :Group (3)
Intellectual Property  Rights? Short form:  IPRs Rights of : Creator, Inventor. Protected by: Laws and Regulations. All Rights Reserved 2011 :Group (3)
IP  Creator, Inventor & Rights holder ?  Intellect Human Being. All Rights Reserved 2011 :Group (3)
IP  related IT ? ,[object Object]
Hardware.
Website contents.
Trademark & Service Mark.
E Book.
Trade Secret.
URL.
Domain Name.
And others in soon.All Rights Reserved 2011 :Group (3)
Our Forecast  Domain Name. All Rights Reserved 2011 :Group (3)
Domain Name ? Name like us. To do: ,[object Object]
Social community.
Education.
Health.
Sports, on the Web.All Rights Reserved 2011 :Group (3)
Function of Domain Name  ,[object Object]
Represent.
Suggestion.
Free of legal conflicts/problem. All Rights Reserved 2011 :Group (3)
Recognized /familiar Domain Name  ,[object Object]
www.opera.com

More Related Content

Similar to Group 3

You Can Have Your Own Top Level Domain “for a small fee….”
You Can Have Your Own Top Level Domain “for a small fee….”You Can Have Your Own Top Level Domain “for a small fee….”
You Can Have Your Own Top Level Domain “for a small fee….”
Woodard, Emhardt, Henry, Reeves & Wagner, LLP
 
Mini-Class Report
Mini-Class ReportMini-Class Report
Mini-Class Report
Tiffany Sandoval
 
Domain name and trade dispute
Domain name and trade disputeDomain name and trade dispute
Domain name and trade dispute
Saravanan A
 
O Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 RevO Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 Rev
guest5ebaae9
 
Session 5 E-marketing - 27 Aug 10
Session 5   E-marketing - 27 Aug 10Session 5   E-marketing - 27 Aug 10
Session 5 E-marketing - 27 Aug 10
Muhammad Talha Salam
 
Tt dot brand march 2011
Tt dot brand march 2011Tt dot brand march 2011
Tt dot brand march 2011
Casper Thomsen
 
Questions On The And Football
Questions On The And FootballQuestions On The And Football
Questions On The And Football
Amanda Gray
 
Business Intelligence, Analytics, and Data Science A Managerial
Business Intelligence, Analytics, and Data Science A ManagerialBusiness Intelligence, Analytics, and Data Science A Managerial
Business Intelligence, Analytics, and Data Science A Managerial
TawnaDelatorrejs
 
Microsoft, Google and Amazon Patenting Strategy 2009-2018 - Analyzed by Teqmi...
Microsoft, Google and Amazon Patenting Strategy 2009-2018 - Analyzed by Teqmi...Microsoft, Google and Amazon Patenting Strategy 2009-2018 - Analyzed by Teqmi...
Microsoft, Google and Amazon Patenting Strategy 2009-2018 - Analyzed by Teqmi...
Hannes Toivanen
 
Crossing the Mashup Chasm. Enterprise Mashup Requirements
Crossing the Mashup Chasm. Enterprise Mashup RequirementsCrossing the Mashup Chasm. Enterprise Mashup Requirements
Crossing the Mashup Chasm. Enterprise Mashup Requirements
Justo Hidalgo
 
Lecture 4
Lecture 4Lecture 4
Lecture 5
Lecture 5Lecture 5
JAYALAKSHMI RESUME
JAYALAKSHMI  RESUMEJAYALAKSHMI  RESUME
JAYALAKSHMI RESUME
jayalakshmi nandakumar
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
Julie May
 
Education In Britain Telegraph. Online assignment writing service.
Education In Britain  Telegraph. Online assignment writing service.Education In Britain  Telegraph. Online assignment writing service.
Education In Britain Telegraph. Online assignment writing service.
Joshua Gorinson
 
DotBrand (08/2011) - VAYTON
DotBrand (08/2011) - VAYTONDotBrand (08/2011) - VAYTON
DotBrand (08/2011) - VAYTON
VAYTON
 
Domain Name and Web Portals
Domain Name and Web Portals Domain Name and Web Portals
Domain Name and Web Portals
Naveen Kumar
 
O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01
zelalwattar
 
India build problem
India build problemIndia build problem
India build problem
ICE CUBE
 
Amazon Case Study Paper
Amazon Case Study PaperAmazon Case Study Paper
Amazon Case Study Paper
Olga Bautista
 

Similar to Group 3 (20)

You Can Have Your Own Top Level Domain “for a small fee….”
You Can Have Your Own Top Level Domain “for a small fee….”You Can Have Your Own Top Level Domain “for a small fee….”
You Can Have Your Own Top Level Domain “for a small fee….”
 
Mini-Class Report
Mini-Class ReportMini-Class Report
Mini-Class Report
 
Domain name and trade dispute
Domain name and trade disputeDomain name and trade dispute
Domain name and trade dispute
 
O Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 RevO Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 Rev
 
Session 5 E-marketing - 27 Aug 10
Session 5   E-marketing - 27 Aug 10Session 5   E-marketing - 27 Aug 10
Session 5 E-marketing - 27 Aug 10
 
Tt dot brand march 2011
Tt dot brand march 2011Tt dot brand march 2011
Tt dot brand march 2011
 
Questions On The And Football
Questions On The And FootballQuestions On The And Football
Questions On The And Football
 
Business Intelligence, Analytics, and Data Science A Managerial
Business Intelligence, Analytics, and Data Science A ManagerialBusiness Intelligence, Analytics, and Data Science A Managerial
Business Intelligence, Analytics, and Data Science A Managerial
 
Microsoft, Google and Amazon Patenting Strategy 2009-2018 - Analyzed by Teqmi...
Microsoft, Google and Amazon Patenting Strategy 2009-2018 - Analyzed by Teqmi...Microsoft, Google and Amazon Patenting Strategy 2009-2018 - Analyzed by Teqmi...
Microsoft, Google and Amazon Patenting Strategy 2009-2018 - Analyzed by Teqmi...
 
Crossing the Mashup Chasm. Enterprise Mashup Requirements
Crossing the Mashup Chasm. Enterprise Mashup RequirementsCrossing the Mashup Chasm. Enterprise Mashup Requirements
Crossing the Mashup Chasm. Enterprise Mashup Requirements
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
JAYALAKSHMI RESUME
JAYALAKSHMI  RESUMEJAYALAKSHMI  RESUME
JAYALAKSHMI RESUME
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
Education In Britain Telegraph. Online assignment writing service.
Education In Britain  Telegraph. Online assignment writing service.Education In Britain  Telegraph. Online assignment writing service.
Education In Britain Telegraph. Online assignment writing service.
 
DotBrand (08/2011) - VAYTON
DotBrand (08/2011) - VAYTONDotBrand (08/2011) - VAYTON
DotBrand (08/2011) - VAYTON
 
Domain Name and Web Portals
Domain Name and Web Portals Domain Name and Web Portals
Domain Name and Web Portals
 
O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01
 
India build problem
India build problemIndia build problem
India build problem
 
Amazon Case Study Paper
Amazon Case Study PaperAmazon Case Study Paper
Amazon Case Study Paper
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Group 3

Editor's Notes

  1. First of all I would like to introduce my self and my friends who work together for this presentation.
  2. Explain:Title: WhereWhen and Why ?
  3. Because of the time allocation. Our presentation is a bit short But we hope that , this presentation will give summarized interesting information of IP and ITContents of our presentation are…………………………………..
  4. What is Intellectual property.At the beginning stage IP is very strange word for me. I think we all will be same ?During this short course, I has been noticed, that IP is just around me with various forms.
  5. In this slide, I would like to explain about Intellectual Property Rights.Its very simple:Right to protect by lawRight to do business and right to transfer monetization of creator and inventor IP is IPRs.
  6. So lets go to next slide.Who is creator inventor or right holder ?We can define , Any intellect person who can create who can invent can be IP rights holder.
  7. Here are IP related IT products.
  8. Out of previous IP related IT goods and services because of the time limitation we will forecast on Domain name. Any one familiar with this topic ?Domain name topic ? Aww ok. Any how lets drive our think and though to Domain age.
  9. What is domain name.When you use internet your have to type www.--------.comDomain is a like a name of you or number of your house.If your didn’t named your selfHow other peoples can call you and find you or your home.
  10. So we can say domain name identify represent suggest and avoid problem from legal case ,thus we do not need to meet with liars, sorry lawyers. Just a joke don’t serious.
  11. Ok here:There are famous and familiar domain name of us, correct ?
  12. In this slide we would like to share you number of registered domain name in this cyber age.In every second domain name registration and cancellation will be happen so this data can not accurate now, but it can use as a secondary concreted data.
  13. In this slide we would like to share you value of website age of the domain .
  14. In this slide I would like to share my knowledge how to select the best domain name.As all you knew Simple is the best and simple is the long lasting.Firstly you have to consider your domain name and your scope of business should be match.For example, your business is beautification, your domain is uglyman.com or your business is food production your domain is www.poision.com. Therefore you have to choose domain with this 5 fields in this slide.
  15. As a general there are 2 types of domain name.In short form ccTLds Country Code Top Level Domain Names and Second Level Domain Name.These are sample ccTLDs.ccTLDs is represent where are you.To buy or obtain this domain is a bit complicated in work in process , thus this domain can registered company , person, organization or other interesting group of specific country.Like www.planet.com.mm, www.yadanarbon.com.mm
  16. Most of international commercial and non commercial organization owned these second level domain name based on their type of objectives..com represent commercial purpose.net represent commercial and some area and interest..info represent information.edu represent education
  17. In this slide I would like to explain some different between domain name and trademark.Distinctive purpose is the same issue between domain and Trademark.But in trademark, generic name is not registrable , hope you all will be remember COLA and etc.In domain name generic domain is more valuable and also registrable.
  18. In this slide I would like to explain some different between domain name and trademark.Distinctive purpose is the same issue between domain and Trademark.But in trademark, generic name is not registrable , hope you all will be remember COLA and etc.In domain name generic domain is more valuable and also registrable.
  19. In this slide I would like to explain some different between domain name and trademark.Distinctive purpose is the same issue between domain and Trademark.But in trademark, generic name is not registrable , hope you all will be remember COLA and etc.In domain name generic domain is more valuable and also registrable.
  20. Like trademark registration process, if you would like to register you have to do search for similar checking.If some one has been registered , you have to choose another one. From this web site you can check domain similarity. Its free, you can get some more detail information about domain name from here.
  21. In this slide I will share basic process to solve thedomain hi jacking or cyber squattingDo who is the owner of that domain under WHOISLOOKUPAfter that you can choose 2 ways,Take legal action under ACPA or UDNDRP of ICANNICANN is International Code and NumberThis stage is too limited because you have to spend a lot like time, financial and etc:You have to pay UDNDRP examination cost and lawyer fees.Don’t forget lawyer fees. Total cost will around 6000 USDVery expensive for us Thus I would like to advice you if you have a chance to deal with cyber squatter in term of cash.Do it don’t delayIf the price is less or around 1000USD.
  22. As nature good man and bad man, good peoples and bad peoples stay together.Good people do and think good think and Bad people do and think bad think.Also in domain ownership, bad peoples do wrong thing and bad thing.Those people do following manner and we called their work, cyber squatting.Some time ,they took non popular domain name and offer to interest person with high price. This is a part of cyber squatting and we also called domain hi jacking. Most of hijacked domain name show following response when you search from internet browser.
  23. As nature good man and bad man, good peoples and bad peoples stay together.Good people do and think good think and Bad people do and think bad think.Also in domain ownership, bad peoples do wrong thing and bad thing.Those people do following manner and we called their work, cyber squatting.Some time ,they took non popular domain name and offer to interest person with high price. This is a part of cyber squatting and we also called domain hi jacking. Most of hijacked domain name show following response when you search from internet browser.
  24. As nature good man and bad man, good peoples and bad peoples stay together.Good people do and think good think and Bad people do and think bad think.Also in domain ownership, bad peoples do wrong thing and bad thing.Those people do following manner and we called their work, cyber squatting.Some time ,they took non popular domain name and offer to interest person with high price. This is a part of cyber squatting and we also called domain hi jacking. Most of hijacked domain name show following response when you search from internet browser.
  25. In this slide I will share basic process to solve thedomain hi jacking or cyber squattingDo who is the owner of that domain under WHOISLOOKUPAfter that you can choose 2 ways,Take legal action under ACPA or UDNDRP of ICANNICANN is International Code and NumberThis stage is too limited because you have to spend a lot like time, financial and etc:You have to pay UDNDRP examination cost and lawyer fees.Don’t forget lawyer fees. Total cost will around 6000 USDVery expensive for us Thus I would like to advice you if you have a chance to deal with cyber squatter in term of cash.Do it don’t delayIf the price is less or around 1000USD.
  26. In this slide I will share basic process to solve thedomain hi jacking or cyber squattingDo who is the owner of that domain under WHOISLOOKUPAfter that you can choose 2 ways,Take legal action under ACPA or UDNDRP of ICANNICANN is International Code and NumberThis stage is too limited because you have to spend a lot like time, financial and etc:You have to pay UDNDRP examination cost and lawyer fees.Don’t forget lawyer fees. Total cost will around 6000 USDVery expensive for us Thus I would like to advice you if you have a chance to deal with cyber squatter in term of cash.Do it don’t delayIf the price is less or around 1000USD.
  27. I would like to finalized our presentation and would like to say that Thanks to all.Especially to my group member.
  28. I would like to finalized our presentation and would like to say that Thanks to all.Especially to my group member.