IC 016. US 002 005 022 023 029 037 038 050. G & S: Printed reports, technical manuals, instruction manuals, user manuals, user guides, educational, training and instructional materials, certificates, newsletters, pamphlets, brochures, catalogues, and printed advertising materials, all in the fields of computer science, information technology, communications technology, financial crime, crime and fraud detection and prevention, cyber security, homeland security and terrorism prevention
IC 035. US 100 101 102. G & S: Compilation and systematization of information into computer databases; management of computer databases; computer data processing; data processing services; business consulting; business management consulting; consulting services regarding business strategies; provision of business information via global computer networks; provision of business management information; business management analysis services; business data analysis; business management analysis, including business intelligence and business lifecycle analysis; business organization and operation consultation; business research services; business feasibility studies; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain management services; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business consultation in the nature of enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organizational enterprise in the achievement of its goals; business meeting planning, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; business consultation relating to all of the aforesaid services
IC 042. US 100 101. G & S: Information technology consultancy services; research and development of computer software; design and development of computer software and computer hardware; computer network design for others; computer monitoring service with tracks computer hardware performance and processes and sends out historical reports and alerts; computer monitoring service with tracks application software, performs periodic maintenance and provides reports and alerts concerning such performance; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software for searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modeling, viewing, sharing and monitoring of data and transactions, including patterns and networks in data and transaction; software as a service (SAAS) services featuring software for the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behavior, terrorism operations, smuggling operations, money laundering operations and monetary losses; software as a service (SAAS) services featuring software for identifying, investigating, reviewing and managing cases of financial crime of all types; software as a service (SAAS) services featuring software for predictive modeling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; software as a service (SAAS) services featuring software for due diligence investigations on customers and potential customers; software as a service (SAAS) services featuring software for the analysis and prediction of customer behavior; computer services, namely, computer system administration for others; computer systems analysis. computer forensic services, namely, forensic analysis of computer operating systems; software as a service (SAAS) services featuring software for matching, transforming, sampling, partitioning and analysis of data;advanced product research in the field of artificial intelligence; computer project management services; computer virus, malware and spyware protection services; recovery of computer data; geographic mapping; computer modeling services, namely, computer simulation from computer programs for others; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software forcountering of improvised explosive devices (IEDs), including minefield clearance
IC 045. US 100 101. G & S: Fraud and identity theft protection services; security inspection services for others; data security inspection services for others; security consultancy; consulting services in the field of national security; homeland security advisory and consultancy services, namely, advising and consulting on now to reduce vulnerability to terrorism, how to minimize the damage caused by terrorist attacks, and how to recover from terrorist attacks; providing information in the field of the military, military tactics and strategies
Trademark Registration Overview How To Trademark A Name Trademark Symbols Remedies To Trademark Infringement Defenses Against Trademark Infringement Paris Convention How To Report Trademark Infringement Tm Symbol Trademarks Common Law And Trademarks How To Register A Trademark The Madrid Agreement Overview Types Of Passing Off