<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div>I agree with McTim.</div><div>If the member is in breach of the RSA, then membership criteria should deal with that.</div><div>If a member applies and received resources, there are conditions attached and need to be adhered to and the terms and conditions of the agreement should deal with any breached. IF and only if that process is broken, should we look at fixing it, but not by putting other processes in place to fix other issues! </div><div><br></div><div>Is there perhaps an real example of an issue that needs to be solved here? </div><div><br><div>Regards</div><div>Saul</div></div><div><br>On 22 May 2016, at 18:06, McTim <<a href="mailto:dogwallah@gmail.com">dogwallah@gmail.com</a>> wrote:<br><br></div><blockquote type="cite"><div><div dir="ltr">All,<div><br></div><div><br><div class="gmail_extra"><br><div class="gmail_quote">On Sat, May 21, 2016 at 3:53 AM, Seun Ojedeji <span dir="ltr"><<a href="mailto:seun.ojedeji@gmail.com" target="_blank">seun.ojedeji@gmail.com</a>></span> wrote:<br><div><br></div><div><snip></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-style:solid;border-left-color:rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div></div><br>Section 4 of the Registration Service Agreement (RSA) provides the framework for investigations of the usage of allocated Internet Number resources, defines members’ obligation to cooperate and the measures to be taken by AFRINIC in case of failure to comply.<br></div></blockquote><div><br></div><div>If the above is the case, why is this policy needed?</div><div><br></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-style:solid;border-left-color:rgb(204,204,204);padding-left:1ex"><div dir="ltr"><br>The lack of such investigation or regular control can lead to inefficient usage of the Internet Number resources, to stockpiling and other types of abuse.<br><br></div></blockquote><div><br></div><div>Is there any evidence to support this statement??</div><div><br></div><div><br></div><div>I tend to agree with Mr. Alston, it seems to me to be "<span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">impractical".</span></div><div><span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px"><br></span></div><div><span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px">It would impose significant costs on the organisation to an end which is already at our disposal.</span></div><div><br></div></div><br clear="all"><div><br></div>-- <br><div class="gmail_signature">Cheers,<br><br>McTim<br>"A name indicates what we seek. An address indicates where it is. A route indicates how we get there." Jon Postel</div>
</div></div></div>
</div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>RPD mailing list</span><br><span><a href="mailto:RPD@afrinic.net">RPD@afrinic.net</a></span><br><span><a href="https://lists.afrinic.net/mailman/listinfo/rpd">https://lists.afrinic.net/mailman/listinfo/rpd</a></span><br></div></blockquote></body></html>