SECLARITY
Mark Identification

SECLARITY

Serial Number

88026377

Filing Date

Jul 5, 2018

Trademark by

ISUBSCRIBED INC.

Classification Information

Computer application software for use in computer, data, network and mobile device security, namely, digital security software, computer utility software, computer software for the detection of computer viruses and threats, and instruction manuals therefor; computer software for managing and filtering electronic and wireless communications, computer software for protecting and securing the integrity of data, computer networks, mobile devices, electronic and wireless communications and applications, anti-virus software, and instruction manuals therefor; computer application software for scanning and monitoring computer network connections for signs of unauthorized entry, for creating and maintaining firewalls and for scanning computer data storage devices for computer viruses and other malware for use in home computer networks, and instruction manuals therefor; computer application software for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems, and instruction manuals therefor; computer application software for providing security for email, internet and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware and other undesirable content, and instruction manuals therefor; computer application software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices, and instruction manuals therefor; computer application software for enhancing and managing web browser software and personal identity information on computers, mobile phones and mobile devices, and instruction manuals therefor; computer application software in the field of network security for limiting access to web sites on a global information network, for sending e-mail alerts and event logs to a predefined e-mail address, and for generating computer usage reports, and instruction manuals therefor; computer application software for secure storage and management of usernames and passwords, and instruction manuals therefor; computer application software for providing alerts and notifications regarding potential identity theft and for providing tips and information concerning identity theft, and instruction manuals therefor; computer application software for managing network security of home appliances and personal electrics in the internet of things (IoT), and instruction manuals therefor; VPN (virtual private network) operating software, and instruction manuals therefor; computer application software for the removal of data and the optimization of computer performance, and instruction manuals therefor; computer software for conducting computer performance analysis and status reviews, and instruction manuals therefor; computer software for managing and filtering electronic and wireless communications, computer software for protecting and securing the integrity of data, computer networks, mobile devices, electronic and wireless communications and applications, anti-virus software, and instruction manuals therefor; computer software for conducting computer performance analysis and status reviews, and instruction manuals therefor

Electrical and Scientific Apparatus

Electronic data collection and data submission services for business purposes in the nature of providing credit reporting data maintained by others; tracking and reporting regarding consumer credit reports and changes thereto, providing advice and consultation in the field of credit reports and credit scores, all for business purposes

Advertising and Business

Providing virtual private network (VPN) services

Telecommunications

Electronic monitoring of credit card activity and personally identifying information to detect fraud or identity theft via the internet; domain name management services, namely, Domain Name System ("DNS") management and maintenance, domain name directory management and maintenance, Domain Name System ("DNS") infrastructure services, domain name and Domain Name System ("DNS") information propagation, and resolution of Domain Name System ("DNS") requests; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer monitoring service which tracks software performance, performs periodic maintenance and provides reports and alerts concerning such performance; maintenance of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services, namely, software for use in computer, data, network and mobile device security, namely, digital security software, computer utility software, computer software for the detection of computer viruses and threats, and instruction manuals therefor; software as a service (SAAS) services, namely, computer software for managing and filtering electronic and wireless communications, computer software for protecting and securing the integrity of data, computer networks, mobile devices, electronic and wireless communications and applications, anti-virus software, and instruction manuals therefor; software as a service (SAAS) services, namely, software for scanning and monitoring computer network connections for signs of unauthorized entry, for creating and maintaining firewalls and for scanning computer data storage devices for computer viruses and other malware for use in home computer networks, and instruction manuals therefor; software as a service (SAAS) services, namely, software for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems, and instruction manuals therefor; software as a service (SAAS) services, namely, software for providing security for email, internet and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware and other undesirable content, and instruction manuals therefor; software as a service (SAAS) services, namely, software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices, and instruction manuals therefor; software as a service (SAAS) services, namely, software for enhancing and managing web browser software and personal identity information on computers, mobile phones and mobile devices, and instruction manuals therefor; software as a service (SAAS) services, namely, software in the field of network security for limiting access to web sites on a global information network, for sending e-mail alerts and event logs to a predefined e-mail address, and for generating computer usage reports, and instruction manuals therefor; software as a service (SAAS) services, namely, software for secure storage and management of usernames and passwords, and instruction manuals therefor; software as a service (SAAS) services, namely, software for providing alerts and notifications regarding potential identity theft and for providing tips and information concerning identity theft, and instruction manuals therefor; software as a service (SAAS) services, namely, software for managing network security of home appliances and personal electrics in the internet of things (IoT), and instruction manuals therefor; VPN (virtual private network) operating software, and instruction manuals therefor; software as a service (SAAS) services, namely, software for the removal of data and the optimization of computer performance, and instruction manuals therefor; software as a service (SAAS) services, namely, computer software for conducting computer performance analysis and status reviews, and instruction manuals therefor; electronic monitoring of personally identifying information to detect identity theft via the internet, namely, detection of identity threats, namely, monitoring of credit reports, the Internet, and public records to facilitate the detection and prevention of identity theft and fraud; monitoring the internet, public records, private and public electronic databases to facilitate the detection of and protection against identity theft and fraud, namely, electronic monitoring of personally identifying information to detect identity theft via the internet; software as a service (SAAS) featuring software for removing personal information from public and private websites and databases; software as a service (SAAS) featuring software for detection of identity threats, namely, for monitoring of credit reports, the Internet, and public records to facilitate the detection and prevention of identity theft and fraud; software as a service (SAAS) featuring software for providing protection and control over who sees and accesses one's identity, namely, fraud and identity theft protection services; software as a service (SAAS) featuring software for providing authentication of personal identification information via secure storage and transmitting such information via the Internet; software as a service (SAAS) featuring software for monitoring consumer identity reports and providing an alert as to any changes therein; software as a service (SAAS) featuring software for providing credit monitoring, alerts and reports based on internet surveillance for the protection of identity and protection against identification theft; software as a service (SAAS) featuring software for social media monitoring, namely, for monitoring personal use of computers for personal safety and security purposes and monitoring personal use of computer of family members for parental supervision purposes for personal security

Computer and Scientific

Recovery and resolution of identity theft, namely, detective investigations and resolution of those investigations; providing information in the field of data theft and identity theft for personal security and protection purposes

Personal