CYBERVAR - Trademark Details
Status: 602 - Abandoned-Failure To Respond Or Late Response
Image for trademark with serial number 86431812
Serial Number
86431812
Word Mark
CYBERVAR
Status
602 - Abandoned-Failure To Respond Or Late Response
Status Date
2016-04-04
Filing Date
2014-10-22
Mark Drawing
4000 - Standard character mark Typeset
Attorney Name
Law Office Assigned Location Code
M40
Employee Name
DENNIS, SETH OWEN
Statements
Goods and Services
Computer application software for financial risk management and risk mitigation, namely, software for calculating, determining and mitigating potential financial and security risks to computer networks, computer peripherals and electronic components and systems; Computer software and firmware for financial risk management and financial and security risk mitigation; Computer software for administration of computer local area networks; Computer software for application and database integration; Computer software for computer system and application development, deployment and management; Computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for determining and mitigating potential financial and security risks to computer networks, computer peripherals and electronic components and systems; Database management software for calculating and determining and mitigating potential financial and security risks to computer networks, computer peripherals and electronic components and systems; Downloadable cloud computer software for financial and security risk management, information technology and for enhancing security of computer networks and electronic assets; Downloadable software for risk management and for calculating and determining and mitigating potential financial and security risks to computer networks, computer peripherals and electronic components and systems; Software for monitoring and controlling communication between computers and automated machine systems
Goods and Services
Abstracting services in the nature of extracting and summarizing information from computer networks, information systems and electronic asset records; Business risk assessment services; Business risk management; Business risk management consultation; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing online business risk management service for use in project management
Goods and Services
Financial advice and consultancy services; Financial analysis, namely, compiling and analyzing statistics, data and other sources of information for financial purposes; Financial risk assessment services; Financial risk management; Financial risk management consultation; Providing an on-line searchable database featuring financial information about risk mitigation and avoidance of risks to computer networks and electronic systems; Providing financial risk management services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Providing information and research in the field of finance and financial investments; Strategic financial advisory services
Goods and Services
Advice relating to the design of computer hardware; Computer consultation; Computer consultation in the field of computer security; Computer diagnostic services; Computer disaster recovery planning; Computer forensic services; Computer modeling services; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; Computer network configuration services; Computer programming and computer system analysis; Computer programming services for commercial analysis and reporting; Computer programming services for others in the field of software configuration management; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, computer system administration for others; Computer services, namely, integration of computer software into multiple systems and networks; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, on-site management of information technology (IT) systems; Computer services, namely, remote management of the information technology (IT) systems of others; Computer software development and computer programming development for others; Computer systems analysis; Computer systems integration services; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting in the field of configuration management for computer hardware and software; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of computer-based information systems for businesses; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of testing of electronic components and electronic systems; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Design and development of electronic data security systems; Development and implementation of software, hardware and technology solutions for the purpose of testing of electronic components and electronic systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Development, updating and maintenance of software and database systems; Integration of computer systems and networks; IT integration services; Maintenance of computer software relating to computer security and prevention of computer risks; Planning and development of electronic communications networks; Planning, design and implementation of computer technologies for others; Planning, design and management of information technology systems; Providing a secure electronic online system featuring technology which allows businesses to determine and avoid potential financial and security risks to computer networks, data and electronic components; Providing an online non-downloadable Internet-based system application featuring technology enabling users to determine and mitigate potential financial and security risks to computer networks and electronic components; Providing information on computer technology and programming via a web site; Research in the field of intelligence and security technology; Research services in the field of information and telecommunications technology; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technological planning and consulting services in the field of computer hardware systems; Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of IT security; Updating of computer software relating to computer security and prevention of computer risks
Pseudo Mark
CYBER VAR VALUE AT RISK
Classification Information
International Class
009 - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus. - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
US Class Codes
021, 023, 026, 036, 038
Class Status Code
6 - Active
Class Status Date
2014-10-30
Primary Code
009
International Class
035 - Advertising; business management; business administration; office functions. - Advertising; business management; business administration; office functions.
US Class Codes
100, 101, 102
Class Status Code
6 - Active
Class Status Date
2014-10-30
Primary Code
035
International Class
036 - Insurance; financial affairs; monetary affairs; real estate affairs. - Insurance; financial affairs; monetary affairs; real estate affairs.
US Class Codes
100, 101, 102
Class Status Code
6 - Active
Class Status Date
2014-10-30
Primary Code
036
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2014-10-30
Primary Code
042
Correspondences
Name
STEPHEN L. ANDERSON
Address
Please log in with your Justia account to see this address.
Trademark Events
Event DateEvent Description
2014-10-27NEW APPLICATION ENTERED IN TRAM
2014-10-30NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
2014-10-31NOTICE OF PSEUDO MARK E-MAILED
2015-01-30LETTER OF PROTEST ACCEPTED
2015-02-10ASSIGNED TO EXAMINER
2015-02-12NON-FINAL ACTION WRITTEN
2015-02-12NON-FINAL ACTION E-MAILED
2015-02-12NOTIFICATION OF NON-FINAL ACTION E-MAILED
2015-05-28FAX RECEIVED
2015-06-03ASSIGNED TO LIE
2015-06-10CORRESPONDENCE RECEIVED IN LAW OFFICE
2015-06-10AMENDMENT FROM APPLICANT ENTERED
2015-06-10REPORT UNRESPONSIVE AMENDMENT - COMPLETED
2015-06-10NOTICE OF UNRESPONSIVE AMENDMENT - E-MAILED
2015-06-10NOTIFICATION OF NOTICE OF UNRESPONSIVE AMENDMENT - E-MAILED
2015-07-08REPORT UNRESPONSIVE AMENDMENT - COMPLETED
2015-07-08NOTICE OF UNRESPONSIVE AMENDMENT - E-MAILED
2015-07-08NOTIFICATION OF NOTICE OF UNRESPONSIVE AMENDMENT - E-MAILED
2015-08-12TEAS RESPONSE TO OFFICE ACTION RECEIVED
2015-08-12CORRESPONDENCE RECEIVED IN LAW OFFICE
2015-08-13TEAS/EMAIL CORRESPONDENCE ENTERED
2015-09-01FINAL REFUSAL WRITTEN
2015-09-01FINAL REFUSAL E-MAILED
2015-09-01NOTIFICATION OF FINAL REFUSAL EMAILED
2015-12-31TEAS CHANGE OF CORRESPONDENCE RECEIVED
2016-04-04ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
2016-04-04ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND