Downloadable software for use in the authenticating, evaluating, assessing, protecting, and managing of IT security, data privacy, IT quality control testing, and IT certification of relevant standards; downloadable software applications for use in the authenticating, evaluating, assessing, protecting, and managing of IT security, data privacy, IT quality control testing, and IT certification of relevant standards; downloadable testing software for use in the authenticating, evaluating, assessing, protecting, and managing of IT security, data privacy, IT quality control testing, and IT certification of relevant standards; recorded testing software for use in the authenticating, evaluating, assessing, protecting, and managing of IT security, data privacy, IT quality control testing, and IT certification of relevant standards; equipment, apparatus, instruments and tools, in the fields of testing and quality control in the fields of information technology and telecommunications, namely, computer component testing and calibrating equipment; test battery leads for testing and quality control in the fields of information technology and telecommunications; replacement structural parts for the aforesaid goods
Electrical and Scientific ApparatusProviding of training and further training in the nature of providing training courses in the fields of digitalization, IT services and IT projects, data protection and IT security
Education and EntertainmentProviding testing services of products for others; quality inspection in the fields of computer networks, computer systems, computer hardware systems, communication networks and communications systems, software, computer hardware, computer source codes; testing, analysis and evaluation of the goods of others to determine conformity with certification standards; engineering project management services in the field of secure digitalization; data protection certification being testing, analysis and evaluation of the services of others to determine conformity with certification standards; technical survey services; technical control services, technical inspection, technical analysis, technical inspection being quality control services for others in the fields of computer networks, computer systems, computer hardware systems, communication networks and communications systems, software, computer hardware, computer source codes; IT project management; IT consultancy, advisory and information services related to computer software for the purpose of secure digitalization; security services in the field of computing, namely, network security threat analysis for protecting data; IT services in the field of data protection being network security threat analysis for protecting data; engineering services in the fields of data processing, transport of data, data encryption services and data storage services; technical data analysis services being network security threat analysis for protecting data; design, development and maintenance of computer software and design and development of computer hardware; software as a service (SaaS) services featuring software for use in the authenticating, evaluating, assessing, protecting, and managing of IT security, data privacy, IT quality control testing, and IT certification of relevant standards; platform as a service (PaaS) featuring software platforms for use in the authenticating, evaluating, assessing, protecting, and managing of IT security, data privacy, IT quality control testing, and IT certification of relevant standards; providing online, non-downloadable software for use in the authenticating, evaluating, assessing, protecting, and managing of IT security, data privacy, IT quality control testing, and IT certification of relevant standards; blockchain as a service, namely, software as a service (SaaS) services featuring software for software development; information and consultancy relating to all the aforesaid services
Computer and ScientificAdvisory services in the fields of data protection compliance with legal regulations, legal issues related to data theft and identity theft
Personal