IC 035. US 100 101 102. G & S: Providing business intelligence services; Business consulting services; business management consulting services in the field of critical infrastructure protection, namely, protection of high value manufacturing facilities, roadways and railways, power grids and telecommunications grids through the integration of existing and new security networks among different targets and different protective systems; government relations and advocacy, namely, helping companies and other business ventures with procurement strategy, identification, selection, and promotion of technological standards; business consulting and advisory services on matters of homeland security and critical infrastructure protection to maritime, mass transit, aviation, railway, pipeline, technology, and defense companies; Data processing services; business investigations; providing online business services in the nature of setting process-specific and industry-specific methodologies, processes and standards related to records and information management, and the management of privacy-related and corporate sensitive information; business management services, namely, assisting companies in the development, implementation and enforcement of corporate records management and privacy programs; Business risk management consultation. FIRST USE: 20090529. FIRST USE IN COMMERCE: 20090529
IC 042. US 100 101. G & S: Recovery of computer data; technology consultation in the field of computer forensics investigation; technology consultation in the field of the identification, collection and preservation of electronically-stored information (ESI); litigation consulting services; evidence evaluation and analysis services; electronic discovery and investigation services; providing temporary use of non-downloadable computer software for accessing, collecting, storing, organizing, aggregating, managing, and analyzing electronic documents and data; providing temporary use of non-downloadable computer software and computer software for regulatory compliance management; providing temporary use of non-downloadable computer software to create charts, graphs, statistical summaries and diagrams to visualize sequences of events; providing temporary use of non-downloadable computer software to reconstruct complex evidence and sequences of events; providing temporary use of non-downloadable database management software; providing temporary use of non-downloadable computer software for document management and knowledge management; database development services; providing a database accessible over electronic or optical communications networks; document management and knowledge management services, namely using proprietary software to access, collect, store, organize, aggregate, manage, and analyze electronic documents and data; data automation and collection services using proprietary software to access, collect, store, organize, aggregate, manage, and analyze electronic documents and data; Development of computer software; engineering and technical analysis of buildings, material, equipment and processes for the performance of threat and vulnerability assessments for critical infrastructure protection, international commerce security, and enhancement of critical communication between incident manager at operations centers and the first responders at the incident scene for our nation's defense, intelligence and response communities. data mining services for our nation's defense, intelligence and response communities; providing computer consultation services, namely computer security assessment, risk management and critical infrastructure for others; Computer security service, namely, hard drive erasure; Design and development of electronic data security systems; computer software consulting; computer software installation and maintenance; customizing computer software; design and development of electronic data security systems; development of security systems and contingency planning for information systems; Consultation and services in the field of forensics, namely, data and computer security services, namely, hard drive erasure, restricting access to and by computer networks; recovery of computer data; recovery of electronic data; computer programming; design and development of electronic data security systems; computer security consultancy; computer forensic services; electronic data forensic services; testing of security systems; information, advice and consultancy relating to all the aforesaid services; computer disaster recovery planning; Custom design and development of computer software; Software as a service (SAAS) services featuring software for streaming data processing and analytics; Software as a service (SAAS) services featuring software for big data processing and analytics; Software as a service (SAAS) services, namely, hosting software for use by others for use big data processing and analytics; Platform as a service (PAAS) featuring computer software platforms for use in analysis of streaming data. Computer consultation in the field of computer security, namely, providing computer security technical support in the nature of assessing, identifying and correcting threats to a computer network, incident responses in the nature of a 24/7 service to address compromises in computer networks, and policy development; computer security services, namely, computer firewall security programming services, computer virus protection services, anti-phishing incident response services, intrusion prevention services, web content filtering services, computer security testing; consultation in the field of computer security and assessment of computer security needs; technical support, namely, monitoring of network systems; computer network design; penetration testing in the field of computer security and risk assessment, namely, providing a detailed analysis of risks to a business and recommendations to reduce or eliminate such risks; IT consulting services; IT consulting and integration services, namely, designing information technology systems, implementing computer technologies, diagnosing IT assets, computer security consultation and testing, analysis and evaluation of information technology systems to assure compliance with industry standards; Software as a service (SaaS) featuring online software for use in project management, namely, site-specific document management, schedule management, project and program reporting, budgeting and contract management, action items, and capital planning and forecasting; Consulting services in the area of computer technology, namely, in the fields of system selection, system design, system implementation, system migration, system management, project management for cloud systems, non-cloud systems, client server systems, traditional systems, host based systems, legacy systems, software-as-a-service, hosted system, colocation systems, infrastructure, application, support, programming and repair. Back-up services for computer hard drive data. FIRST USE: 20090529. FIRST USE IN COMMERCE: 20090529
IC 045. US 100 101. G & S: Forensic analysis of computer data; forensic analysis of electronically stored information (ESI); litigation support services; evidence evaluation and analysis services; electronic legal discovery and investigation services; providing temporary use of non-downloadable computer software for accessing, collecting, storing, organizing, aggregating, managing, and analyzing electronic documents and data for use in the legal field; providing temporary use of non-downloadable litigation-support computer software and computer software for regulatory compliance management; providing temporary use of non-downloadable computer software to create charts, graphs, statistical summaries and diagrams to visualize sequences of events for use in the legal field; providing temporary use of non-downloadable computer software to reconstruct complex evidence and sequences of events for use in the legal field; providing temporary use of non-downloadable database management software; providing temporary use of non-downloadable computer software for document management and knowledge management; database development services; providing a database in the legal field accessible over electronic or optical communications networks; document management and knowledge management services, namely using proprietary software to access, collect, store, organize, aggregate, manage, and analyze electronic documents and data; legal research and services; data automation and collection services using proprietary software to access, collect, store, organize, aggregate, manage, and analyze electronic documents and data; Security services, namely, providing security assessments of physical locations, information systems, and working environments; Security services, namely, providing security assessments for businesses and governmental agencies; Consulting services in the field of state and federal regulatory compliance requirements for personnel safety. security consulting services, namely, security risk evaluations in the field of civil infrastructures; security consultation services, namely threat and vulnerability assessments in the field of physical security, disaster recovery, weapons of mass destruction, chemical, biological, radiological, nuclear and explosive (cbrne) threats; building security services, namely control of building environmental and security systems; infrastructure security services, namely physical protection of critical infrastructure and assets; emergency and interoperable communication systems consulting, namely the use of communication systems to facilitate access to and use of emergency information by the administrative personnel and public services access providers; providing security services and consultation and information in the field of emergency and crisis response plans, continuity of government (coog) and continuity of operations plans (coop) design and development; Security services for the protection of property and individuals provided on-line through the internet and other communications media, namely, providing user authorization and fraud detection services for monitoring of security systems; monitoring and surveillance services in relation to computer networks and systems, namely, monitoring of systems for security purposes; monitoring and surveillance services in relation to computers and computer networks and systems, namely computer monitoring service which tracks network performance and processes for security purposes and provides reports and alerts concerning such activities; security services for the protection of property and individuals; consultation and services in the field of security, namely, security guard services, security patrol services, security equipment leasing and security alarm monitoring; monitoring of computer systems for security purposes. fraud prevention services, namely, fraud and identity theft protection; fraud investigations; fraud detection services, namely, anti-corruption, anti-counterfeiting and anti-money laundering services; crime prevention consultancy; risk analysis, namely, security threat analysis for personal and business protection purposes; international asset protection, namely, investigation of assets for security purposes; security services, namely, industrial espionage detection and prevention; private investigative services; identity theft and fraud protection services; crisis management planning, namely, threat simulation vulnerability analysis and mitigation and emergency and crisis response; computerized security services for business establishments, namely, electronically monitoring, detecting and reporting on suspicious or abnormal activity indicating theft, fraud, or other criminal activity; monitoring of security systems; provision of on-site security facilities for personal protection and for protecting property; consultation services concerning homeland safety and security issues, namely, government advisory and consultancy services relating to security sector reform and law enforcement; information services, namely, provision of a website featuring non-downloadable on-line reports relating to security, travel security and other security risks; litigation support services; litigation support services, namely electronic legal discovery; providing a website featuring information in the field of security; security services, namely, security clearance services. security due diligence services; security assessment of risks; security integrity risk assessment and management; consultancy services in the field of preventing crime, including counter-terrorism, piracy, kidnap, extortion, threat, bribery and illegal detention; providing information regarding understanding and preventing crime, including terrorism, piracy, kidnap, extortion, threat, bribery and illegal detention; security services, namely, executive protection; personal background investigations; information, advice and consultancy relating to all the aforesaid services; pre-employment investigation and screening; computer crime investigations; monitoring and reporting of computer systems for security purposes; computer firewall security monitoring services; Background investigation and research services; Background investigation services; Personal background investigations; Pre-employment background investigation services; Pre-employment background screening; Information technology security, audit and assurance services, namely providing assessment, evaluation, auditing and analysis of computer and network systems for security purposes for others; evaluation of computer systems for security purposes; investigation services, namely computer security, network security, penetration testing, and computer forensic investigation services; Information security consulting services in the fields of computer and network incident response and digital forensics, vulnerability tracking and patch management, risk assessment certification and accreditation, application security assessment, network security assessment, wireless network security assessment, and security program development; Day and night guards; Emergency response alarm monitoring services, namely, monitoring of alert devices by a remote monitoring center for the dispatch of emergency public health and security services and notification to third parties; Monitoring burglar and security alarms; Monitoring of security systems; Personal body guarding; Personal security consultation; Providing information in the field of personal physical security. Security consultancy; Security due diligence services for individuals or businesses traveling or opening an office overseas, in the nature of detailed foreign country briefings, vetting of local personnel, establishing host country government contacts, and providing information on sustainable security measures overseas; Security guard services; Security guarding for facilities; Security services for individuals and business persons traveling internationally and domestically, namely, providing foreign country security briefings, embassy information for security purposes and security reports; Security services, namely, armed escorts and security personnel for celebrities, executives, families, production crews, men women and children, dignitaries, and other various persons; Security services, namely, conducting recovery operations for the recovery of property and personnel; Security services, namely, providing executive protection; Security services, namely, providing security assessments for businesses and governmental agencies; Security services, namely, providing security assessments of physical locations, information systems, and working environments; Security services, namely, sexual offender registry and locator service; Security services, namely, threat simulation vulnerability analysis and mitigation and emergency and crisis response; Security services, namely, water vulnerability assessment services. Verifying and monitoring the security credentials of event staff for various private and public sports or entertainment events; Security consultancy. FIRST USE: 20090529. FIRST USE IN COMMERCE: 20090529
Trademark Registration Overview How To Trademark A Name Trademark Symbols Remedies To Trademark Infringement Defenses Against Trademark Infringement Paris Convention How To Report Trademark Infringement Tm Symbol Trademarks Common Law And Trademarks How To Register A Trademark The Madrid Agreement Overview Types Of Passing Off