86275209
May 8, 2014
(Based on 44(d) Priority Application) Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems; Design and development of home security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Inserting software protection programs and security programs onto magnetic media; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Research in the field of intelligence and security technology(Based on 44(e)) Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems; Design and development of home security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Inserting software protection programs and security programs onto magnetic media; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Research in the field of intelligence and security technology
Computer and Scientific(Based on 44(d) Priority Application) Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consulting and legal services in the field of privacy and security laws, regulations, and requirements; Consulting services in the field of maintaining the security and integrity of databases; Monitoring of computer systems for security purposes; Monitoring of security systems; Providing a web site featuring information in the field of security(Based on 44(e)) Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consulting and legal services in the field of privacy and security laws, regulations, and requirements; Consulting services in the field of maintaining the security and integrity of databases; Monitoring of computer systems for security purposes; Monitoring of security systems; Providing a web site featuring information in the field of security
Personal