On Tue, 6 Sep 2016 07:49:54 +0200 ox <andre@ox.co.za> wrote:
you've missed my point I have not. you define abuse as "non sanctioned" activity... that is, activity for which permission has not been granted. Fair enough (so far as it goes)
I do no such thing... you then define "sanctioned" as being infringement :-( rather than setting out a definition which has something to do with the complexity of what permission means. no, you are wrong again... for sanity, lets skip to the part where the word "non" reverses the
On Tue, 6 Sep 2016 07:37:32 +0200 ox <andre@ox.co.za> wrote: permissiveness
second reply to my own post :( I guess as this is core to the very list, and is complex, and I make many mistakes, myself, this requires replying to my own posts when I am wrong or say wrong things - as I am adding to confusion and not contributing :( Okay, Richard, I think I understand, you are saying that orphan resources do not have an "assignor or administrative holder of rights to a resource" (5) Sanctioned Infringement upon the use of a resource by the assignor or administrative holder of rights to a resource --> What I am trying to say, long windedly, is that someone else pointed this out to me, off list, on the previous version of "sanctioned" Which then changed it to reflect that, and it now does cater for orphan resources, as I said in the reply before: water flows downhill Richard, I really and honestly appreciate your help! If you still think I am missing something - Please help by improving the "sanctioned" or explain to me with a practical example so that I can understand please? Andre ============ Internet Abuse ============ Understanding what constitutes Internet Abuse is not an easy undertaking as the topic is sometimes very technical. The Internet consists of resources and the understanding of Internet abuse relates to also understanding the use and interaction between these resources. Examples of Internet resources include also processes, protocols, credentials as well as other types of resources. More practical examples could be Internet Protocol numbers, Domain names or even Email addresses. This technical definition of Internet abuse does not include identifying the authority for any specific resource as it is not intended to define any rights to resources but simply to define what technically constitutes Internet abuse as it relates to all Internet resources. ====================== Definition of Internet abuse ====================== "The non sanctioned use of a resource to infringe upon the usage rights of another resource" -------------------------------------------------------- Terminology used in the above definition -------------------------------------------------------- (1) Resource Any Internet Resource (2) Use and Usage Any direct or indirect action involving a resource (3) Rights The correct assignment or allocation of a resource by the authoritative holder of such a resource which results in the entitlement or reasonable expectation to use, or ability to use, such an allocated or assigned resource (4) Infringe An action, event or situation which limits, reduces, undermines or encroaches upon the fair use of a resource (5) Sanctioned Infringement upon the use of a resource by the assignor or administrative holder of rights to a resource