Brand Protection Glossary
Key terms in online brand protection, domain monitoring, and digital enforcement — explained clearly.
A
B
Brand Impersonation
Brand impersonation is a cyber threat in which attackers create fraudulent websites, emails, or social media profiles that mimic a trusted brand's identity to deceive consumers, steal credentials, or commit fraud.
Brand Protection
Brand protection is the structured practice of safeguarding a company's intellectual property (IP)—including trademarks, designs, and brand identity—from misuse, counterfeiting, and infringement. It combines monitoring, risk analysis, and enforcement actions to preserve both brand value and stakeholder trust.
C
Copyright Enforcement
Copyright enforcement is the process of taking legal and technical action to stop unauthorized use of protected works — including text, images, software, music, and video. This includes sending takedown notices, filing platform complaints, pursuing domain actions, and escalating to litigation when necessary.
Cybersquatting
Cybersquatting is the bad-faith registration of a domain name that is identical or confusingly similar to a trademark, typically with the intent to profit by selling it to the trademark owner or exploiting their brand recognition.
D
Deepfake Brand Threats
Deepfake brand threats are the use of AI-generated or AI-manipulated video, audio, or images to impersonate a brand, its executives, or its communications for fraudulent purposes — including CEO fraud, fake endorsements, fabricated product demonstrations, and synthetic customer service interactions designed to steal data or money.
Digital Services Act (DSA)
The Digital Services Act (EU Regulation 2022/2065) is a European Union law that establishes clear obligations for online platforms regarding illegal content, including counterfeit goods and trademark-infringing material. It creates a standardized notice-and-action framework and introduces the Trusted Flagger system for faster content removal.
DMCA Takedown
A DMCA takedown is a process established by Section 512 of the Digital Millennium Copyright Act (1998) that allows copyright owners to request the removal of infringing content from online platforms, while providing safe harbor protections for compliant service providers.
DNS Monitoring
DNS monitoring is the practice of continuously tracking Domain Name System records and changes to detect potential brand threats — including new domain registrations that impersonate a brand, DNS record changes that signal malicious activity, and infrastructure patterns associated with phishing and counterfeit operations.
Domain Abuse
Domain abuse (also called DNS abuse) refers to the malicious use of domain names to conduct phishing, distribute malware, impersonate brands, or perpetrate fraud. ICANN defines five categories of DNS abuse: phishing, malware, botnets, pharming, and spam used to deliver other forms of DNS abuse.
Domain Name Dispute
A domain name dispute is a formal proceeding to resolve a conflict over the registration or use of a domain name — typically when a trademark owner claims that a domain name is identical or confusingly similar to their mark and was registered in bad faith. The primary resolution mechanism is ICANN's Uniform Domain-Name Dispute-Resolution Policy (UDRP).
E
F
I
IANA
IANA (Internet Assigned Numbers Authority) is the technical coordination function responsible for maintaining key registries that ensure the global Internet operates consistently and interoperably. While often discussed alongside ICANN, IANA is not a separate organization — it is a set of functions operated by ICANN under oversight from the global multistakeholder community.
ICANN
ICANN (Internet Corporation for Assigned Names and Numbers) is a nonprofit organization founded in 1998 that coordinates the global Domain Name System (DNS), accredits domain registrars, and develops policies like UDRP that enable trademark owners to fight cybersquatting.
IP Address & Hosting
An IP address is a unique numerical identifier assigned to every device connected to the Internet, functioning like a digital address for routing data. A hosting provider is a company that offers the server infrastructure needed to make websites accessible online. Together, they form the backbone of how websites are located, served, and — when necessary — taken down.
IP Enforcement
IP enforcement (intellectual property enforcement) is the process of detecting, preventing, and taking action against unauthorized use of intellectual property rights — including trademarks, copyrights, patents, trade secrets, and designs. It encompasses monitoring, investigation, administrative proceedings, platform takedowns, and litigation.
P
T
Takedown Automation
Takedown automation is the use of technology to automatically file, track, and manage enforcement requests — such as domain registrar abuse complaints, hosting provider takedowns, marketplace IP reports, and search engine delisting requests — at scale and speed that manual processes cannot match.
Trademark Enforcement
Trademark enforcement is the process of taking legal and technical action to stop unauthorized use of a registered trademark — including sending cease-and-desist notices, filing domain disputes, submitting takedown requests to platforms, and pursuing litigation when necessary.
Trusted Reporter
A Trusted Reporter (also called Trusted Flagger under the EU Digital Services Act, or Trusted Notifier in some registrar programs) is an entity that has been granted priority status for submitting abuse reports or content removal requests to online platforms, domain registrars, or registries — enabling faster processing and higher action rates on reported threats.
Typosquatting
Typosquatting is a cyberattack where bad actors register domain names that closely resemble legitimate brands — exploiting common typing errors to redirect users to malicious websites, phishing pages, or scam shops.
U
W
Website Content Monitoring
Website content monitoring is the practice of analyzing the actual content of web pages to detect brand abuse, impersonation, and infringement — regardless of whether the domain name itself contains the protected trademark.
Website Impersonation
Website impersonation is the practice of creating fraudulent websites that replicate the visual design, content, and branding of legitimate organizations to deceive visitors — typically to steal credentials, payment information, or personal data, or to sell counterfeit goods under a trusted brand name.