Shadow Map Takedown Process
The takedown process in Shadow Map is designed to be systematic and efficient, ensuring prompt action against infringing content. The process includes the following steps:
Identification & Notification
- Shadow Map detects infringing content and notifies the client via the dashboard.
- Clients can also manually report incidents through the Shadow Map platform.
Client Confirmation & Documentation
- Clients must confirm the takedown request.
- Required documentation, such as proof of trademark ownership or a Letter of Authority, must be submitted.
Submission to Service Providers
- The takedown request is formally submitted to the relevant online platforms or hosting providers, following established legal protocols.
Follow-up & Monitoring
- Shadow Map actively tracks the progress of the takedown request.
- Clients receive real-time status updates through the Shadow Map dashboard.
Types of Takedown Requests & SLAs
Shadow Map supports various types of takedown requests with corresponding Service Level Agreements (SLAs). These include:
Product Takedown: Targeting specific product listings that infringe on trademarks or copyrighted content. These take approximately 7 business days as the legal basis requires validation by hosting providers.
Brand Infringement / Impersonation: Fraudulent websites impersonating brands are generally taken down within 48 hours after acknowledgment by the hosting provider.
Bulletproof Hosting Takedown: Cases involving malicious hosting providers (e.g., in China, Russia, South Africa) typically take 3-4 business days due to the need to coordinate with upstream bandwidth providers.
Other Categories:
- Phishing & Domain Takedowns: 1 business day response, 2 business days takedown.
- Social Media Takedowns: 1 business day response, 5 business days takedown.
- Code & Data Leak Takedowns: 1 business day response, 4 business days takedown.
- Business Listing Takedowns: 1 business day response, 4 business days takedown.
- Dark Web Takedowns: Case-dependent due to the decentralized nature of the dark web.
The total time for executing a takedown depends on:
- The responsiveness of hosting providers and legal requirements.
- The complexity of the takedown request (e.g., bulletproof hosting providers may take longer due to additional escalation steps).
Reference table with all takedown categories:
| Takedown Type | Response Time (Business Days) | Takedown Time (Business Days) | Remarks |
|---|---|---|---|
| Product Takedown- Websites and Applications | 1 | ~7 (Varies based on validation) | Requires proof of trademark/copyright infringement |
| Brand Infringement/Impersonation- Websites and Applications | 1 | ~2 (After host acknowledgment) | Faster as it directly violates brand rights |
| Bulletproof Hosting Takedown | 1 | 3-4 (After host acknowledgment) | Requires working with upstream providers |
| Phishing & Domain Takedowns | 1 | 2 | Typically removed quickly by domain registrars |
| Social Media Takedowns | 1 | 5 | Dependent on platform policies |
| Code & Data Leak Takedowns | 1 | 4 | Requires proof of data ownership |
| Business Listing Takedowns | 1 | 4 | Varies based on platform response |
| Dark Web Takedowns | N/A | N/A | No direct takedowns, only intelligence & disruption efforts |
While Shadow Map works to expedite the process, response times from external parties can vary. Updates on takedown progress are provided via the Shadow Map dashboard. Due to the inherent complexities of takedowns and the actions of independent third parties, Security Brigade cannot guarantee the success of every takedown request.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article