TACTICS ON
Mark Identification

TACTICS ON

Serial Number

87669542

Filing Date

Nov 2, 2017

Registration Date

Jan 22, 2019

Trademark by

INTERNATIONAL CORPORATE PROTECTION GROUP LIMITED

Active Trademark

Classification Information

Computer software for tracking and locating an individual for personal and internet security; Computer software for dialing emergency services for personal and internet security; Computer software used to issue panic alerts for personal and internet security; Computer application software for tracking and locating an individual for personal and internet security; Computer application software for dialing emergency services for personal and internet security; Computer application software used to issue panic alerts for personal and internet security; safety, security, protection and signaling devices, namely, personal security alarms; safety, security, protection and signaling device software, namely, computer software for used to issue panic alerts, notifications to individuals and corporates personal security alarms; safety, security, protection and signaling device application software, namely, computer software for personal security alarms; GPS software for navigating, locating, tracking, and mapping people; personal security alarms; safety alarms, namely, personal security alarms; Global Positioning System apparatus; GPS navigation device; navigation, guidance, tracking, targeting and map making devices, namely, GPS navigation and tracking devices; electronic data loggers and recorders; downloadable electronic publications in the nature of articles relating to personal and internet security; Downloadable publications in electronic format in the nature of articles relating to personal and internet security; Electronic downloadable publications in electronically readable form in the nature of articles relating to personal and internet security; telecommunications apparatus, equipment and accessories, namely, electric capacitors for telecommunication apparatus; Security alarm controllers; Personal security alarms; X-ray security scanners; Iris recognition security devices; USB computer security key; Security and fire alarms; Motion sensitive security lights; LCD monitors for security purposes; Security lights for outdoor use; Security products, namely, entry door systems comprising touch pads and security doors; X-ray full body security scanners; Security control panels and motion detectors; Electronic security and surveillance devices, namely, electronic security tags and labels, acoustic tags, magnetic tags; Cards encoded with security features for identification purposes; Software for ensuring the security of electronic mail; Electronic video surveillance products, namely, electronic components of security systems; Personal security alarms that connect to a wireless communications network; Security devices, namely, mobile image projection device for displaying retinal images; Hand-held security device that disables assailants using flashing light emitting diodes; Facilities management software, namely, software to control building environment, access and security systems; Closed circuit TV systems for security and surveillance, namely, cameras, switchers, monitors, microphones, and recorders; Vehicle locating, tracking and security system comprised of an antenna and radio transmitter to be placed in a vehicle; Building security systems comprising software and hardware for providing picture, video, alarm status, building plans, and other information to a remote station; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Entry/exit security portal comprised of an electronic passageway equipped with biometric devices for identification verification and detection of impermissible items being carried through; Home and office automation systems comprising wireless and wired controllers, controlled devices, and software for lighting, HVAC, security, safety and other home and office monitoring and control applications; Home and office electrical power automation systems comprising wireless and wired controllers, controlled devices, and software for appliances, lighting, HVAC, security and other home and office electrical power monitoring and control applications; Optical apparatus, namely, a nonlethal security device that uses a light source to detect, warn, repel, temporarily blind, disorient, nauseate, disable, confuse, debilitate, stun, subdue, stop, or incapacitate persons or animals; Vehicle locator and recovery device programmed to use global positioning systems (GPS) and cellular telecommunications; Hardware and software adapter for coupling a GPS receiver to the microphone input of a digital camcorder; Computer hardware and software system for tracking people, objects and pets using GPS data on a device on the tracked people, objects and pets; Computer hardware for IP video surveillance; Electric and electronic video surveillance installations; Electronic video surveillance products, namely, electronic components of security systems; all the above mentioned goods not including goods related to games

Electrical and Scientific Apparatus

Value-added reseller services, namely, distributorship services featuring computer security and information technology products; Promoting the use of the security assurance best practices of others in the field of cloud computing; Database management; Computerized database management; Management and compilation of computerized databases; Market research by means of a computer database; Updating and maintenance of data in computer databases; Providing an on-line computer database for the reporting and tracking of vehicle and boat moves and location for business purposes; Business management consultation in the field of personal and internet security; Business research in the field of intelligence and security technology

Advertising and Business

Internet security consultancy; Data security consultancy; Electronic monitoring of credit card activity to detect fraud via the internet; Computer security consultancy; Testing of security systems; Computer security service, namely, hard drive erasure; Design and development of home security systems; Computer security threat analysis for protecting data; On-line security services, namely, data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Design and development of electronic data security systems; Technology research in the field of intelligence and security technology; Computer technology consultancy in the field of computer security and internet security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Development of security systems and contingency planning for information systems; Recording software protection programs and security programs onto magnetic media; Engineering and system analysis in the field of home security systems; Rental of computers relating to computer security and prevention of computer risks; Providing technology information updates for home security systems via the global computer network; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Forensic analysis of surveillance video for forensic research purposes; Internet security consultancy; Data security consultancy; Electronic monitoring of credit card activity to detect fraud via the internet; Computer security consultancy

Computer and Scientific