GLOBAL OPERATIONS TECHNOLOGY INNOVATION. INTEGRATION. PROTECTION.
Mark Identification

GLOBAL OPERATIONS TECHNOLOGY INNOVATION. INTEGRATION. PROTECTION.

Serial Number

88666867

Filing Date

Oct 24, 2019

Registration Date

Apr 6, 2021

Trademark by

GLOBAL OPERATIONS SECURITY SERVICES INC.

Active Trademark

Classification Information

Business consulting services, namely, assisting clients in the development of personnel and operating policies and practices; business investigation services; business risk management; business intelligence services; Business services, namely, screening third-party vendors, suppliers, and contractors, verifying the credentials of those third parties, and reviewing and organizing documentation and information in relation to those third parties on behalf of others, all for business purposes

Advertising and Business

Computer security consultancy; design and development of electronic data security systems and contingency planning for information systems; maintenance of computer software relating to computer security and prevention of computer risks; computer forensic services; consulting services in the field of forensic science; data mining; computer consultation in the field of the development, maintenance and operation of computer security technology relating to data governance, analytics and compliance; computer services, namely, data recovery services; computer security consulting services in the nature of testing computer systems for malicious code and malware, network vulnerability and penetration testing to assess information security vulnerability; consulting services in the field of maintaining the digital security and integrity of databases by protecting such databases from unauthorized access; fraud resolution and assistance services, namely, electronic monitoring of credit card activity to detect data and identity theft and fraud; providing security assessments for businesses regarding the protection of data and information from unauthorized access; fraud detection services, namely, electronic monitoring of transactions to detect fraud via the internet in the fields of insurance, banking, credit cards, and business transactions; consultation in the field of electronic monitoring via the internet to detect and prevent data theft and identity theft; providing electronic monitoring via the internet to detect and prevent data theft and identity theft, and providing information about that monitoring service in the form of alerts and reports; security services, namely, providing security assessments of information systems with respect to unauthorized access via communications networks

Computer and Scientific

Consulting services in the field of privacy and security laws, regulations and legal requirements; consultation in the fields of privacy laws, physical security and data governance law; security services, namely, conducting recovery operations for the recovery of property and personnel; fraud resolution and assistance services, namely, mediation of disputes involving data and identity theft and fraud; providing security assessments for businesses regarding the protection of people and tangible property; consultation services in the field of privacy laws, physical security and data governance laws and regulations and legal requirements; physical security services, namely, threat vulnerability analysis and mitigation and emergency and crisis response planning for threats to physical security; security services, namely, providing executive protection; security services, namely, providing security guard services and security guarding of facilities; security services, namely, providing security assessments of physical locations and physical working environments; private investigation services; physical security consultancy; physical security consultation and physical security assessments for businesses, namely, the development of specialized security procedures, security risk mitigation procedures and crisis management and emergency communications planning with respect to physical security; planning and design of policies and procedures to protect the physical security of people, premises and tangible assets and information stored on physical media; investigation services, namely, detective investigations and private investigations; providing an interactive online database for use in background investigations

Personal