42 Design and development of computer software for the detection, prevention, management and reduction of financial fraud and financial fraud misdemeanors; design and development of computer software for protection against fraud, corruption and credit risks; electronic monitoring of credit card transactions for the detection, prevention, management and reduction of fraud via the Internet; electronic monitoring of personal identification information for the detection, prevention, management and reduction of identity theft via the Internet; electronic monitoring of computer systems for the detection, prevention, management and reduction of unauthorized access or breaches of data protection; engineering and systems analysis in the fields of data mining, cloud computing, artificial intelligence, behavioral analytics; scientific and technological research in the fields of data mining, cloud computing, artificial intelligence, behavioral analytics; data mining; technological consultation in the field of data warehousing, data management computer systems, data mining, electronic data monitoring, data optimization software, computer data recovery, computer security threat analysis for protecting data; cloud computing consultation services; computer project management in the field of electronic data processing; technological research relating to data processing; technical consultancy services relating to data processing software design; data conversion of electronic information and copying of computer software; data encoding of magnetic cards; data security consultation; provision of information concerning the encryption of electronic data for securing transactions performed online on websites and by means of e-commerce; engineering in the field of computing, telephony and telecommunications; design and development of computers and computer software; software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS), all equipped with software, software platforms, or IT infrastructures for data warehousing, data management, data retrieval, data monitoring, data optimization and advanced data analysis; research and development of new products for third parties; technical consulting in the field of data mining, cloud computing, artificial intelligence, and behavioral analytics studies; auditing of computer security measures for others, namely, of restricting access to and by computer networks to and of undesired web sites, media, and individuals and facilities; computer security control in the nature of administering digital keys and certificates, restricting unauthorized network access to secure networds; computer services, namely, scanning and detecting of malware on computers and electronic devices; data encryption and decryption; computer code conversion for others; design of systems for encrypting, decrypting, controlling access to any transmission of information; issuance and validation of digital certificates used for the authentication or encryption of a digital communication, or authentication of a digital signature in a transaction or electronic communication on the Internet and other computer networks and provision of technical support, namely, troubleshooting of problems for customers in connection with these services; application service provider featuring online, non-downloadable software for testing computer security in the fields of computer and Internet security; development, design, implementation, testing, analysis and advice of computer, computer hardware, and computer network systems for optimization of security, access, authorization, authentication, encryption and user identification; testing and analysis of the services of others and advisory services in the field of computer security, namely, restricting unauthorized network access by users without credentials, and restricting unauthorized access to computer networks, computers, and computer hardware; computer system analysis; computer system design; software as a service (SaaS) featuring software for use in database management, cloud computing in the field of systems security, and authentication; monitoring of computer systems for detecting data breach and unauthorized access; electronic storage and recovery of computer data