RADICALLY OPEN SECURITY - Trademark Details
Status: 602 - Abandoned-Failure To Respond Or Late Response
Image for trademark with serial number 86291495
Serial Number
86291495
Word Mark
RADICALLY OPEN SECURITY
Status
602 - Abandoned-Failure To Respond Or Late Response
Status Date
2015-04-14
Filing Date
2014-05-26
Mark Drawing
4000 - Standard character mark Typeset
Law Office Assigned Location Code
M20
Employee Name
LEHKER, DAWN FELDMAN
Statements
Goods and Services
Computer consultation in the field of computer security; Computer forensic services; Computer hardware and software design; Computer network configuration services; Computer network design and computer software design for the computer security; Computer programming and computer system analysis; Computer programming and software design; Computer programming consultancy; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design for others; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of computer security; Computer software development, computer programming and maintenance of computer software for computer security; Computer systems analysis; Computer virus protection services; Consulting in the field of configuration management for computer hardware and software; Design and development of computer software; Design and development of computers and programs for computers; Design and development of electronic data security systems; Development and creation of computer programmes for data processing; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit Computer consultation in the field of computer security; Computer forensic services; Computer hardware and software design; Computer network configuration services; Computer network design and computer software design for the computer security; Computer programming and computer system analysis; Computer programming and software design; Computer programming consultancy; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design for others; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of computer security; Computer software development, computer programming and maintenance of computer software for computer security; Computer systems analysis; Computer virus protection services; Consulting in the field of configuration management for computer hardware and software; Design and development of computer software; Design and development of computers and programs for computers; Design and development of electronic data security systems; Development and creation of computer programmes for data processing; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Planning, design and implementation of computer technologies for others; Programming of computer software for others; Recovery of computer data; Rental of computers relating to computer security and prevention of computer risks; Research and development of computer software; Research in the field of intelligence and security technology; Technical advice relating to operation of computers; Technical support, namely, monitoring technological functions of computer network systems; Technological consultation in the technology field of computer security; Technological planning and consulting services in the field of computer security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risksplanning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Planning, design and implementation of computer technologies for others; Programming of computer software for others; Recovery of computer data; Rental of computers relating to computer security and prevention of computer risks; Research and development of computer software; Research in the field of intelligence and security technology; Technical advice relating to operation of computers; Technical support, namely, monitoring technological functions of computer network systems; Technological consultation in the technology field of computer security; Technological planning and consulting services in the field of computer security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks
Classification Information
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2014-06-09
Primary Code
042
First Use Anywhere Date
2014-03-27
First Use In Commerce Date
2014-03-27
Correspondences
Name
RIEBACK, MELANIE ROSE
Address
Please log in with your Justia account to see this address.
Trademark Events
Event DateEvent Description
2014-05-29NEW APPLICATION ENTERED IN TRAM
2014-06-09NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
2014-09-09ASSIGNED TO EXAMINER
2014-09-16NON-FINAL ACTION WRITTEN
2014-09-16NON-FINAL ACTION E-MAILED
2014-09-16NOTIFICATION OF NON-FINAL ACTION E-MAILED
2015-04-14ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
2015-04-14ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND