POWERED BY PROFICIO - Trademark Details
Status: 606 - Abandoned - No Statement Of Use Filed
Image for trademark with serial number 87332996
Serial Number
87332996
Word Mark
POWERED BY PROFICIO
Status
606 - Abandoned - No Statement Of Use Filed
Status Date
2019-04-29
Filing Date
2017-02-13
Mark Drawing
4000 - Standard character mark Typeset
Published for Opposition Date
2018-07-31
Attorney Name
Law Office Assigned Location Code
M10
Employee Name
MEINERS, DEBORAH L
Statements
Goods and Services
Computer hardware and software in the fields of computer security for use in keeping computers, software and networks secure; computer software for computer security policy assessment; computer software for computer technical support services; computer software for computer vulnerability assessments; computer software for cybersecurity diagnostics services; computer software for cybersecurity maintenance services; computer software for maintaining cybersecurity of computers, software and hardware; computer software for cybersecurity policy assessment; computer software for cybersecurity technical support services; computer software for cybersecurity vulnerability assessments; computer software for data security diagnostics services; computer software for data security maintenance services; computer software for maintaining data security of computers, software and hardware; computer software for data security policy assessment; computer software for data security technical support services; computer software for data security vulnerability assessments; computer software for endpoint detection and response; computer software for firewall security assessments; computer software for firewall security diagnostics services; computer software for firewall security maintenance services; computer software for firewall security; computer software for firewall security policy assessment; computer software for firewall security technical support services; computer software for firewall security vulnerability assessments; computer software for computer hardware diagnostics services; computer software for computer hardware maintenance services; computer software for computer hardware security; computer software for computer hardware security policy assessment; computer software for computer hardware technical support services; computer software for hardware vulnerability assessments; computer software for information technology diagnostics services; computer software for information technology maintenance services; computer software for information technology security; computer software for information technology security policy assessment; computer software for information technology technical support services; computer software for information technology vulnerability assessments; computer software for managed detection and response to cyber-attacks, data security exceptions and policy exceptions; computer software for a managed security service provider; computer software for computer network diagnostics services; computer software for computer network maintenance services; computer software for computer network security; computer software for computer network security policy assessment; computer software for computer network technical support services; computer software for computer network vulnerability assessments; computer software for software or hardware password diagnostics services; computer software for software or hardware password maintenance services; computer software for software or hardware password security; computer software for software or hardware password security policy assessment; computer software for software or hardware password technical support services; computer software for software or hardware password vulnerability assessments; computer software for preventing cybersecurity and unauthorized data access; computer software for software-implemented security policy assessment; computer software for support services, namely, diagnosing computer software and hardware problems, diagnosing computer security problems; computer software for cyber and data vulnerability assessments; computer software for penetration testing of cyber threats and data access threats; computer software for cyber and data security operations center management; computer software for software diagnostics services; computer software for software maintenance services; computer software for software security policy assessments; computer software for software technical support services; computer software for software vulnerability assessments; computer software for computer operating software, applications software, computer hardware and computer network vulnerability assessments
Goods and Services
Educational courses and training in the fields of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer technical support services for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of data security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of data security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of data security; Education and training in the fields of computer security, namely, educational courses and training in the field of data security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of data security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of data security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of endpoint detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware diagnostic; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of managed detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of managed security service provider; Education and training in the fields of computer security, namely, educational courses and training in the field of network diagnostic services; Education and training in the fields of computer security, namely, educational courses and training in the field of network maintenance services; Education and training in the fields of computer security, namely, educational courses and training in the field of network security; Education and training in the fields of computer security, namely, educational courses and training in the field of network security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of network technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of network vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of password diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of password maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of password security; Education and training in the fields of computer security, namely, educational courses and training in the field of password security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of password technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of password vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of penetration testing; Education and training in the fields of computer security, namely, educational courses and training in the field of security operations center management; Education and training in the fields of computer security, namely, educational courses and training in the field of software diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of software maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of software security policy assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of software technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of software vulnerability assessments
Goods and Services
Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer support services, namely, help desk services; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity computer diagnostic services; cybersecurity computer software maintenance services; cybersecurity, namely, computer security threat analysis for protecting data; cybersecurity policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity support services, namely, help desk services; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security computer diagnostic services; data security computer software maintenance services; data security consulting; data security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security support services, namely, help desk services; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; endpoint detection and response, namely, monitoring of computer systems to detect intrusions and breakdowns; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; firewall security computer diagnostic services; firewall security services, namely, computer security threat analysis for protecting data; firewall security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes; firewall security support services, namely, help desk services; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; hardware diagnostic services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware security, namely, computer security threat analysis for protecting data; hardware security policy assessment, namely, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; hardware support services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware vulnerability assessments, namely, diagnosing computer hardware security problems; information technology computer diagnostic services; information technology software maintenance services; information technology security, namely, computer security threat analysis for protecting information technology data; information technology security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; information technology support services, namely, help desk services; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; managed detection and response, namely, monitoring of computer systems to detect breakdowns and security vulnerabilities; managed security service provider, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; network computer diagnostic services; network maintenance services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security policy assessment, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes; network support services, namely, help desk services; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, review and testing of computer hardware security involved in computer networks, review and testing of network hardware security of computer networks; computer diagnostic services relating to passwords; computer software maintenance services relating to passwords; password security, namely, maintenance of computer software relating to computer security and prevention of computer risks for passwords; password security policy assessment, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes, scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; password support services, namely, help desk services; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password information security vulnerability for computer security purposes, , scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; security, namely, computer consultation in the field of computer security; security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; vulnerability assessments, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes, , scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; penetration testing of computers and networks to assess information security vulnerability for computer security purposes; security operations center management, namely, monitoring technological functions of computer network systems; software diagnostic services, namely, troubleshooting of computer software and computer security problems; computer software maintenance services; software security policy assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software support services, namely, troubleshooting of computer software problems; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes
Goods and Services
Security guarding of facilities; security policy assessment, namely, physical security consultation; physical security support services in the nature of consulting; vulnerability assessments, namely, security threat analysis for protecting tangible corporate property; penetration testing, namely, security threat analysis for protecting tangible corporate property; vulnerability assessment, namely, verifying and monitoring the credentials of security personnel for corporate offices to ensure public safety and building security
Classification Information
International Class
009 - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus. - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
US Class Codes
021, 023, 026, 036, 038
Class Status Code
6 - Active
Class Status Date
2017-02-16
Primary Code
009
International Class
041 - Education; providing of training; entertainment; sporting and cultural activities. - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes
100, 101, 107
Class Status Code
6 - Active
Class Status Date
2017-02-16
Primary Code
041
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2017-02-16
Primary Code
042
International Class
045 - Personal and social services rendered by others to meet the needs of individuals; security services for the protection of property and individuals. - Personal and social services rendered by others to meet the needs of individuals; security services for the protection of property and individuals.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2017-02-16
Primary Code
045
Correspondences
Name
Glenn E. Von Tersch
Address
Please log in with your Justia account to see this address.
Trademark Events
Event DateEvent Description
2017-02-16NEW APPLICATION ENTERED IN TRAM
2017-02-16NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
2017-05-09ASSIGNED TO EXAMINER
2017-05-17NON-FINAL ACTION WRITTEN
2017-05-17NON-FINAL ACTION E-MAILED
2017-05-17NOTIFICATION OF NON-FINAL ACTION E-MAILED
2017-11-17TEAS RESPONSE TO OFFICE ACTION RECEIVED
2017-11-17CORRESPONDENCE RECEIVED IN LAW OFFICE
2017-11-18TEAS/EMAIL CORRESPONDENCE ENTERED
2017-12-10FINAL REFUSAL WRITTEN
2017-12-10FINAL REFUSAL E-MAILED
2017-12-10NOTIFICATION OF FINAL REFUSAL EMAILED
2018-06-07TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
2018-06-07ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
2018-06-11TEAS REQUEST FOR RECONSIDERATION RECEIVED
2018-06-11CORRESPONDENCE RECEIVED IN LAW OFFICE
2018-06-12TEAS/EMAIL CORRESPONDENCE ENTERED
2018-06-27APPROVED FOR PUB - PRINCIPAL REGISTER
2018-07-11NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
2018-07-31PUBLISHED FOR OPPOSITION
2018-07-31OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
2018-09-25NOA E-MAILED - SOU REQUIRED FROM APPLICANT
2019-04-29ABANDONMENT - NO USE STATEMENT FILED
2019-04-29ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED
2019-05-08TEAS CHANGE OF CORRESPONDENCE RECEIVED