Skip to main content

Documenting evidence for abuse reports

Supports takedown workflows and automation-humans and scripts should attach the same canonical fact pattern.

1. One timeline

UTC timestamps, first observation, DNS or hosting changes, and customer impact hypothesis. Avoid sending different timelines on appeal versus first contact.

2. Show malicious behavior

Phishing forms, credential harvest, brand misuse, or malware delivery-describe in plain language with screenshots or safe captures aligned with your retention policy.

3. Trademark footing

Reference registrations or authorized use where appropriate; legal owns filings, but abuse desks often need mark numbers or licensing context to prioritize.