sb-nz logo
Story image

Privacy concerns spark contact address masking for .nz domain owners

02 Nov 2016

New Zealand domain name owners can now use a free address masking option that can mask contract addresses and make them invisible from public display on domain search tool WHOIS.

Owners of individual (natural person) .nz domains are now able to use the tool following a Domain Name Commission (DNCL) review  into privacy matters.

The review follows concerns raised by individual registrants about privacy and personal safety, specifically having the contact address displayed for anyone to view.

Domain Name commissioner Debbie Monahan states the company is now seeking public consultation and feedback on two policy options regarding the type of information that should be withheld on WHOIS, including contact addresses.

As a result, DNCL enacted a provisional address masking option while the WHOIS privacy review takes place. The masking option replaces personal contact details with a unique reference code and DNCL's own P.O. Box contact address.

DNCL stresses that the contact information on the .nz register doesn't change, but it does prevent the information from showing on WHOIS searches. Mail sent to DNCL's P.O. Box will be forwarded on to the individual's contact address that was given in the register.

“The address masking option... is intended to allay any personal safety concerns around public display of address information while we finish up our review and implement any permanent policy changes – expected to be later in 2017,” Monahan says.

DNCL is the only authorised provider that can mask addresses. Registrants must email DNCL from the email address on record. After verification checks, the masking will be applied.

Address masking is only offered to individual registrants. Businesses and organisations are not eligible.

Story image
Protegrity rolls out updates to data protection platform
Protegrity has updated its Protegrity Data Protection Platform to better secure sensitive data in hybrid-cloud, multi-cloud and SaaS environments.More
Story image
UiPath and eSentire bring hyperautomation to Microsoft Security
UiPath and eSentire have announced a strategic partnership to deliver end-to-end security policy automation across multiple Microsoft Security services.More
Story image
The business case for an in-house ethical hacker
Ethical hackers, also known as penetration testers or white-hat hackers, mimic the techniques used by malicious hackers to try and break into computer systems and discover vulnerabilities before the bad guys can exploit them.More
Story image
Video: 10 Minute IT Jams - SonicWall VP discusses the importance of endpoint security
In this video, Dmitriy discusses the exposure points and new risks that come as a result of widespread flexible working arrangements, how organisations should secure their massively distributed networks, and how SonicWall's Boundless Cybersecurity model can solve these issues.More
Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More
Story image
Backups as a last line of defence are under threat
Malware can incrementally overwrite and encrypt backups, rendering them inadequate as an insurance policy against ransomware.More