86422063
Oct 13, 2014
Mar 8, 2016
Computer software for managing security strategy and resources relating to the security risk industry; Downloadable electronic publications in the nature of e-books, digital magazines, catalogues and digital publishing material relating to the security risk industry; Apparatus, instruments and media for recording, storing, carrying, transmission, reproduction and retrieval of data, signals, information, codes, images, text, video, sounds and audio; Computer programs for managing security strategy and resources for use in the security risk industry; Computer hardware relating to the security risk industry; Downloadable databases relating to the security risk industry; Electronic databases relating to the security risk industry recorded on computer media; Computer database management software for use in the security risk industry; Interactive computer software for managing security strategy and resources relating to the security risk industry; Computer database servers relating to the security risk industry; Computer network servers relating to the security risk industry; Downloadable computer programs for managing security strategy and resources for use in the security risk industry; Computer programs and computer software for providing online databases relating to the security risk industry; Electronic publications downloadable from the Internet relating to the security risk industry; Downloadable software for managing security strategy and resources relating to the security risk industry; Computer application software for mobile phones, portable media players, handheld computers, desktop computers, tablets, printers and other technological equipment, namely, software for use in data management, electronic storage of data, media storage and application, documentation, resource planning, project management, educational applications and computer simulation, relating to the security risk industry; Computer application software and computer software for mobile phones, portable media players, handheld computers, desktop computers, tablets, printers and other technological equipment, namely, software for allowing data retrieval, upload, download, access and management; Computer software for application and database integration relating to the security risk industry; Computer software for provision and display of data from local and global computer networks and for receiving, exchange and display of messages, images or data for use in the security risk industry; Computer software for the creation of data, storage of data and manipulation of data for use in the security risk industry; Computer software enabling parties to store and organize data relating to the security risk industry; Parts and fittings for all of the aforesaid goods
Electrical and Scientific ApparatusBusiness investigation services; Business risk management; Business strategy development services; Business intelligence services; Business management assistance and consultancy; Business consultancy and management; Business risk appraisals; Business efficiency expert services; Corporate enquiries and investigations; Business failure analysis services; Business services, namely, screening, credentialing and organizing third party vendors, suppliers, contractors and other parties on behalf of others; Business management consulting and advisory services for the security risk industry; Forensic accounting services; Business auditing; Compilation, systemization and management of data; Collating of data in computer databases; provision of business information via global computer networks; Compilation of information into computer databases; Business consulting services, namely, providing assessment and development of strategy, business case and implementation of security programs; Providing business assessment and intelligence services; Information, advisory and consultancy services relating to the aforesaid services
Advertising and BusinessFinancial risk management services; Strategic corporate financial advisory services Financial due diligence, analysis and investigations; Financial asset evaluation; Financial asset management, namely, asset recovery services; Business credit verification services; Information, advisory and consultancy services relating to the aforesaid services
Insurance and FinancialTraining services in the field of security risk; Training of personnel in relation to security, risk assessments and risk mitigation of property and individuals; Security awareness training and security skills assessments; Training in relation to IT and computer security; Information, advisory and consultancy services relating to the aforesaid services
Education and EntertainmentComputer consultation in the field of computer security compliance and risk consultancy and advisory services; industrial analysis and research services; Quality control for others; Corporate computer security and contingency planning services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security consultancy and advisory services relating to IT systems and computer security; Computer security consultancy services relating to the provision of IT systems and computer security; Information technology support services, namely, monitoring of IT systems and computer security systems; Computer security consultancy and advisory services relating to risk strategies of computers and IT systems; Information technology risk management services in relation to IT systems and computers, namely, cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; Information technology security consulting services, namely, advising companies in the development and implementation of security strategy alignment, security control optimization and security protection assurance in relation to IT systems and computers; Consulting services relating to corporate strategy and information technology IT systems and computers security control and optimization; Computer security services, namely, security assessments for businesses and individuals in relation to IT systems and computers; Computer security services, namely, assessment, design and development of security services software, systems, applications, procedures, controls, projects and organizations for computers or IT systems; Computer disaster recovery planning; Computer services, namely, data recovery services; Computer forensic services; Consultancy and advisory services relating to computer security and telecommunications technology systems security; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Information technology security services in the nature of providing cyber-threat intelligence, cyber-attack verification, and security analysis of network traffic, emails, files, media computer software, and mobile applications; Data security services, namely, design and development of electronic data security systems; Computer consultancy and advisory services in the field of computer information systems security, namely, data security and information systems risk consultancy and advisory services; Design and development of computer hardware and software relating to the security risk industry; Consultancy, advice, assistance, analysis, design, evaluation and programming services relating to computer software, firmware and hardware relating to the security risk industry; Maintenance of computer software relating to the security risk industry; Computer security consultancy; Information, advisory and consultancy security services relating to the aforesaid services
Computer and ScientificSecurity consulting services, namely, providing security assessments for businesses and governmental agencies; Security consultancy; Advisory services in the field of home security systems; consultancy services relating to the provision of home security; Security services for the protection of property and individuals; Monitoring of security systems; Provision of security information; Security consulting services, namely, providing assessment of security risks for businesses and governmental agencies; Advisory services in the field of home security risk strategies; Security consulting services, namely, providing security assessments, security risk management, security strategy alignment, security control optimization and security protection assurance for governmental agencies, businesses and individuals; Security services relating to corporate strategy, namely, security and auditing assessments; Assessment of compliance to risk and security policy, standards, regulations and procedures, namely, regulatory compliance consulting in the field of security services for individuals, businesses and governmental agencies; Security consulting services in the field of business security, namely, assessment and development of strategy, business case security analysis and prioritization of project objectives and implementation of security programs; Security consulting services, namely, assessment of protection of physical facilities, assessment of security and protection measures for information, documents and materials; Security services, namely, providing executive protection and protection of individuals and property; Security services, namely, providing security assessments of protection of personnel for businesses and governmental agencies; Private investigation and enquiry services; Risk, security and crisis advisory and consultancy services; Provision of security information; Security consulting services, namely, assessment of security risks and assessment of security operations; Security services, namely, conducting recovery operations for the recovery of property and personnel; Security services, namely, providing executive protection; Security services, namely, threat vulnerability analysis and mitigation, and emergency and crisis response and management; Security services, namely, security vulnerability assessment and intelligence services; Security services, namely, providing impact assessments of protective measures, strategy and intelligence related to physical locations, information systems, information, documents and materials and working environments; Security consulting services, namely, assessments of physical locations, information systems and working environments for individuals, businesses and governmental agencies; Investigation of assets, credit reports, fiscal assessments and collection reports for security or authentication purposes; Information, advisory and consultancy security services relating to the aforesaid services
Personal