Security
Risk & Abuse Policy
Last updated: 2026
1. Purpose
This Risk & Abuse Policy explains how TransferLayer reviews domain transaction enquiries and manages operational risk, fraud risk and misuse of the service.
2. Risk review
TransferLayer may review the domain name, seller-control signals, buyer and seller information, transaction context, urgency, inconsistencies, payment method, prior disputes and other risk indicators.
3. Refusal criteria
TransferLayer may refuse or stop support if the domain appears stolen, disputed, involved in abuse, connected to impersonation, subject to unclear ownership, or if either party provides incomplete or inconsistent information.
4. Abuse restrictions
The service must not be used to support phishing, malware, spam, impersonation, account compromise, sanctions evasion, unlawful content, deceptive trading or any transaction involving a domain a party is not authorised to transfer.
5. Verification requests
TransferLayer may request additional information before proceeding, including proof of domain control, registrar status, account details relevant to transfer readiness, identity or business details, and written confirmation of transaction terms.
6. Pausing a transaction
If risk indicators appear during a case, TransferLayer may pause support while additional information is reviewed.
In some cases, support may be permanently discontinued.
7. Reporting abuse
Suspected abuse or misuse of TransferLayer can be reported to contact@transferlayer.example.