42 Design and development of computer software for the detection, prevention, management and reduction of financial fraud and misdemeanors; design and development of computer software for protection against fraud, corruption and credit risks; electronic monitoring of credit card transactions for the detection, prevention, management and reduction of fraud via the Internet; electronic monitoring of personal identification information for the detection, prevention, management and reduction of identity theft via the Internet; monitoring of computer systems for the detection, prevention, management and reduction of unauthorized access or breaches of data protection; evaluations, assessments and research in the fields of science and technology provided by engineers; data mining; consulting and evaluation of technologies in the field of data warehousing, data management, data mining, data monitoring, data optimization, data retention, data analysis; cloud computing services, namely, cloud hosting provider services; computer project management in the field of electronic data processing; research with respect to data processing technology; IT training, consulting, and integration services for data security; provision of information concerning the encryption of electronic data for securing transactions performed online on websites and by means of e-commerce; engineering in the field of computing, telephony and telecommunications; design and development of computers and software; Software as a Service (SAAS), Platform as a Service (PAAS) and Infrastructure as a Service (IaaS), namely, computer software platforms, computer software infrastructure all for data warehousing, data management, data extraction, data monitoring, data optimization and advanced data analysis; research and development of new products for third parties; technical project studies, namely, research in the fields of data security, cloud computing, artificial intelligence, behavioural analytics; computer security control services, namely, administering digital keys and certificates, restricting unauthorized access to secure networks; computer services, namely, scanning and online detection of malware on online sites; computer data encryption, decryption and coding; design of systems for encrypting, decrypting of access control to any transmission of information; computer services, namely, diagnosing computer software and hardware problems; services of an application service provider, namely, provision of online software, not-downloadable, for testing computer security in the fields of computer and Internet security; development, design, implementation, and testing of computer software, and analysis and advice, in the fields of systems security and authentication, for computers, computer hardware and computer networks; testing and analysis and advisory services in the field of security and access and authorization systems for computers and computer hardware and computer networks; computer system analysis; computer system design; software as a service (SaaS) featuring software for use in database management, cloud computing in the field of systems security, authentication; computer security services, namely, monitoring of computer systems for detecting unauthorized access and data breach; design of computer systems for the detection, prevention, management and reduction of fraud, identity theft and financial crime; Electronic storage services for the archiving and retrieval of data; information technology management consulting services, namely, consulting services with respect to management of information technologies