<div dir="ltr"><div>Hi, My Suggestions for Article 3</div><div><br></div><div><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif">Article 3: Recognition</p>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif">Add new paragraph (g):</p>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif">(g) Anti-Capture, Resilience and Continuity. The Candidate RIR must
demonstrate documented and tested Anti-Capture, Continuity, and Resilience policies meeting
Section 4.1(t), including verified plans for maintaining essential registry and
governance functions during crises. Evidence of such policies and successful
tests shall form part of the Recognition audit.</p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif">suggestion to add </p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif"><b>4.1(t) Anti-Capture, Resilience and Continuity Governance</b></p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif">
</p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif">(i) Each RIR shall adopt, maintain, and annually test Anti-Capture, Continuity, and Resilience Policies to ensure essential operational and
governance functions continue without paralysis or material degradation under
emergency conditions.</p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif">(ii) Policies shall include: an anti-capture Plan, A business-continuity plan for registry and
critical systems; crisis-governance procedures for remote decision-making;
succession procedures for key officers and board members; disaster-recovery
objectives with defined RTO/RPO; annual testing with a public report within 30 days;
and independent verification during Recognition or audit.</p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif">(iii) Results of tests and remedial actions shall appear in the audit summary
under 4.2.<br>
(iv) Failure to maintain or test these policies is material non-compliance
subject to corrective action under audit procedures.</p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif"><br></p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif"><b>4.2 Audit </b><br>
Audits shall verify compliance with this Document, including the Anti-Capture, Resilience, and
Continuity Governance obligations of Section 4.1(t). A summary report after
each audit shall be published by ICANN.</p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif"><br></p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif"><b>Article 5 Emergency Continuity</b></p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif"><b>5.1 (e) and (f) Non-Disruption Guarantee</b></p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif">(e) During any Recognition Review or Audit process and until
a Recognized successor or Emergency Operator is verified, RIR Services to
compliant Resource Holders shall continue without interruption. No RIR, ICANN,
or Emergency Operator shall degrade or suspend services except as required by
law or Global Policy.</p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif">
</p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif">(f) Registry (RDAP/WHOIS), RPKI, IRR, and member-portal
functions shall be maintained at or above defined SLOs; any transition must be
hot-cut with integrity validation and public status updates.</p><p class="MsoNormal" style="margin:0in 0in 8pt;line-height:115%;font-family:Aptos,sans-serif"><br></p></div><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div dir="ltr"><div><div dir="ltr"><b>Amin Dayekh</b></div><div dir="ltr"><br></div></div><div dir="ltr"><pre cols="72" style="color:rgb(34,34,34)">****************************************************************************************
This email and any attachment (s) transmitted with it are confidential. They
may also be privileged or otherwise protected by law. They are intended
solely for the use of the individual or entity to whom they are addressed. If
you have received this email by error, please notify the sender immediately
by e-mail and delete this e-mail from your system. You are also notified that
disclosing, copying, distributing, or taking any action in relation to its contents
is strictly prohibited and unlawful. By reading the message and opening
any attachment, the recipient accepts full responsibility for taking protective
and remedial action about viruses and other defects.
****************************************************************************************</pre></div></div></div></div></div></div>