On Dec 10, 2013, at 8:55 AM, John Curran <[email protected]> wrote:

> On Dec 10, 2013, at 7:43 AM, David Huberman <[email protected]> 
> wrote:
> 
>> During my 14 years of experience on both sides of the ARIN request desk, and 
>> watching Public Policy events for most of that time, it's clear to me that 
>> large
>> swaths of 8.2 transfers go unapproved because the requestor abandons them. 
>> Many of the requests are abandoned because some combination of policy and 
>> procedure is considered too onerous and "not worth it" by the requestor. 
> 
> Agreed... (note that verification that the requester is actually 
> an authorized party is often considered onerous by requesters.)

To elaborate a bit, it's important to remember that in the circumstances where 
someone 
is attempting to hijack resources (which looks quite similar to those 
attempting to 
update resource records but unable or unwilling to provide supporting 
documentation),
there's another party that could be potentially harmed if ARIN does not take 
reasonable
and proper care in processing the request.  

>> That policy work, combined with changes in procedures, hopefully leads to 
>> easier
>> 8.2 transfers for requestors, and in turn, more accuracy in Whois records.

Such a goal is laudable, and should be explored to the extent that it can be 
accomplished with respect to the duty that ARIN has in protecting resources
presently issued to legitimate resource holders.

Thanks!
/John

John Curran
President and CEO
ARIN



_______________________________________________
PPML
You are receiving this message because you are subscribed to
the ARIN Public Policy Mailing List ([email protected]).
Unsubscribe or manage your mailing list subscription at:
http://lists.arin.net/mailman/listinfo/arin-ppml
Please contact [email protected] if you experience any issues.

Reply via email to