42 Computer security consultancy; computer technology support in the field of computer security and data security, namely, help desk services; engineering and technical support services for software and security, namely, troubleshooting of computer software problems; computer diagnostic services; computer data recovery; technical support services, namely, troubleshooting in the nature of diagnosing computer software and hardware problems; software installation services; programming for computers; computer network configuration services; Internet security services, namely, security services for restricting unauthorized access to computer networks, computer systems and computerized transactions; technical advice in relation to software installation and maintenance; consulting services in the field of design, selection, implementation and use of computer apparatus and computer systems; design, elaboration, installation, development, updating, servicing and maintenance of software, software packages comprising computer software programs, applications, computer programs, hosted and/or operated services (SaaS), online databases and computer platforms; provision of technology information in the field of network and Internet security; expertise in the nature of computer software consulting and advisory regarding industrializing free software and open source development; online technical support in the field of computers, software and computer systems, namely, providing online security threat analysis for protecting data; computer security services, namely, computer network security services for enforcing, restricting and controlling computer access privileges of users of computer networks and encrypting data for computerized transactions; controlling the computer systems of others for technical purposes, namely, remote management of information technology systems of others; project studies being research in the field of computer security; risk and prevention studies being research in the field of computer security; setting up and managing technical support procedures for events regarding software, databases, computers and computer security, namely, infrastructure management services for establishing and administering computer disaster recovery plans; implementing computer platforms for the deployment of secure remote technology systems and architectures; provision of technology information in the field of computer and online security services, via computer networks, wireless networks and the Internet; controlling access privileges of users of computer systems for security purposes; provision of computer threat management systems, namely, computer security threat analysis for protecting data provided by means of monitoring and tracking vulnerability and security-related problems in software products, on the Internet, and on computer networks; designing computer systems and software architecture; computer programming services; maintenance of database software; monitoring of computer systems for the detection of unauthorized access or data protection breaches; electronic data storage; online data storage; software as a service (SaaS) featuring software for encrypting data and assigning credentials, featuring software for provision of identity and access security on networks, the Internet, extranet and computers, data security, data analytics ; control software design for self-service terminals