Abuse of Policy

Last updated on March 12, 2024.

1. Types of Illegal and Irregular Abuse of Domains

1.1 Obscene and pornographic, vulgar content includes: (1) Direct exposure or depiction of human sexual parts; (2) Prohibited dissemination of pornographic text, audio and movies, promotion of obscene pornography websites; (3) Links to vulgar information, pictures, texts, live content, pornographic video chats; (4) Content that infringes on personal privacy; (5) Content promoting violence, malicious slander/abuse/defamation or insulting others.

1.2 Prohibited items: Drugs, hallucinogens, botulinum toxin, stimulants, triazolam, knockout drugs etc., firearms, explosives and other weapon-related information such as bows and crossbows or atomic bomb production. Services like exam impersonation or selling exam answers are also prohibited. Fake certificates creation services or invoice issuance on behalf of others is not allowed. Counterfeit money and products that the country prohibits from being sold such as mobile phone eavesdropping devices, invisible earphones and pinhole cameras are forbidden too. Police or military equipment is also banned.

1.3 Sensitive information includes: (1) Various types of information that are prohibited from being disseminated in violation of laws and regulations; (2) Content against the basic principles established by the constitution; (3) Content that endangers national security, leaks state secrets, subverts state power, and undermines national unity; (4) Content damaging to national honor and interests; (5) Content inciting ethnic hatred or discrimination, undermining ethnic unity; (6) Content undermining national religious policies, promoting cults and feudal superstitions; (7) Spreading rumors, disrupting social order, undermining social stability content; 8. Disseminating obscene content such as pornography gambling violence murder terror or instigating crime ;(9 ) Insulting or slandering others infringing on their legal rights;(10 ) Contains other contents prohibited by law administrative regulations.

1.4 Private servers, plug-ins: Plug-in programs, software and clients, plug-in cards, private server hosting services, private server programs, private server websites, private server source code, private server servers and spaces etc.

1.5 Online gambling types: illegal lottery, betting on sports, casinos, phishing websites, online scams and so on.

1.6 Infringement category: Violation of intellectual property rights, reputation rights, name rights, personal name rights and other personal or property rights.

1.7 Malicious Registration: Maliciously registering others' trademarks, company names, personal names, COVID-19, logos and so on.

1.8 Malicious Use Category: The domain name is used for botnets, phishing, business email scams, malicious software distribution, botnet command and control, fraud and many other types of attacks.

1.9 Other categories: Violating domain names mentioned in the notices issued by domain name registries or other higher authorities.

2. Prohibited from use

The registration authority explicitly prohibits the use of domain names for any illegal or fraudulent purposes, including but not limited to prohibiting domain name holders from disseminating malicious software, zombie networks, phishing, piracy, infringing on trademark rights or intellectual property rights, fraud, counterfeiting or participating in legally prohibited activities.

The registration authority will regularly assess whether there are security threats to any domain names through technical analysis such as grafting, phishing, malicious software and zombie networks.

3. Handling Method for Illegal and Irregular Abuse of Domains

3.1 Proactively contact the domain name holder or website manager to request them to cease infringement. Contact the domain name holder (only for VM domains).

4. VM Complaints and Contact Information

4.1 Domain Name Abuse Complaint Mailbox: abuse@vm.com

Tips: To ensure users receive notification emails promptly and accurately, please add abuse@vm.com to your email whitelist, and make sure your contact information is accurate. This will prevent unnecessary losses due to inaccurate user contact information. If you fail to receive the notification email due to issues with your own mail system, it's on you.

Last updated