Trademark: 85154143
Word

Status
Registered
Status Code
702
Status Date
Thursday, October 3, 2019
Serial Number
85154143
Registration Number
4354348
Registration Date
Tuesday, June 18, 2013
Mark Type
2000
Filing Date
Friday, October 15, 2010
Published for Opposition
Tuesday, September 13, 2011

Trademark Owner History
GEN DIGITAL INC. -
Symantec Corporation - Original Registrant

Classifications
9 Computer antivirus software; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for providing intrusion detection and prevention; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, including computer software for use in the monitoring and control of computer and online activity; computer software for providing online transaction security; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer maintenance software; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; computer software for the creation of virtual private network; computer utility software; computer utility software for removal of computer applications and software; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software, namely, middleware for interfacing client applications and networked or host based databases; computer software for use in updating other computer software; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; computer software for use with a home or remote office for connecting computer network users to global networks; computer software and recorded databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; computer software, hardware, firmware and peripherals for network and Internet security data and system protection, and storage, server, client, and application performance management; computer hardware; computer hardware appliances that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for use in disaster recovery; computer software for use in removable storage media management; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for use in the field of enterprise information management; computer software for use in the field of online analytical processing (OLAP); computer software for generating reports from databases; computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network; computer software for replicating and archiving files from one data store to another; computer software for metering the use of the other computer software; computer software for use in developing data analysis applications and other computer software; computer programs for data security for use with data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; computer programs for remotely monitoring, evaluating, demonstrating and controlling other computer programs or computer processes; computer programs for locking-down one or more computers on a computer network; computer hardware and software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; embedded software for network monitoring and security; embedded software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; computer software, namely, content management software which filters, monitors, reports on and controls use of and access to locations on computer systems and networks and on global communication networks; electronic mail and news group filtering software which prevents or shunts delivery of defined categories or origins of electronic mail messages and news postings; protection software which detects electronic inquiries for information from computer systems or of users of computer systems and organizes, monitors, controls and prevents provision of such information; privacy management software which prevents, monitors, certifies, aggregates and reports on the distribution and use of personal identification information on computer systems and networks and on global communications networks; file transfer filtering software which prevents, monitors, reports on or shunts delivery of defined categories, origins, volumes, or timeframes of electronic files; and chat filtering software which prevents, monitors, reports on, analyzes, or shunts delivery of defined categories, senders, recipients, origins, volumes or timeframes of conversations transmitted or stored electronically; downloadable electronic publications in the nature of reference, user, technical and instructional manuals and data sheets for use with computer software, hardware, peripherals and firmware and downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books and pamphlets in the fields of computer software and computer and on-line security
39 Electronic storage of data files for clients to store and retrieve data via a global computer network; electronic document and email archiving services
16 Computer user manuals in the field of computers, computer software, computer peripherals, computer security, computer services, and computer networks; printed matter and publications, namely, [ magazines and ] conference materials in the field of computers, computer software, computer peripherals, and computer networks [ ; paper labels and paper printed hologram labels ]
38 Transmittal of anti-virus scanning and other network security software via a global computer network; information and consultancy with regard to aforementioned services
45 Monitoring of computer systems for security purposes; monitoring computer networks for security purposes; providing user authentication services in e-commerce transactions; providing information about computer and Internet security in the nature of administering digital keys and certificates
42 Development of software for network and Internet security and data encryption; computer consultation; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, filtering of unwanted and unsolicited email; computer services, namely, data recovery services; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, providing back-up computer programs and facilities; computer virus protection services; computer software installation services; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; providing information in the field of computer network and Internet security; providing technical information in the field of computer software applications; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; updating computer software; providing information in the field of computer database, software, hardware, and network operation, design and development; computer monitoring services in the nature of tracking hardware and software performance and processes and sending reports thereof; monitoring the computer systems of others for technical purposes and providing back-up computer programs and facilities; integration of computer systems and networks; computer services, namely, providing information concerning the encryption and authentication of electronic data for website and ecommerce transaction security; computer and software consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; creating indexes of information available on websites and filtering unwanted electronic transmissions from websites; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information about accessing computer security, preventing computer threats and design and development of computer security hardware and software applications
The mark consists of a circle with a checkmark in the center of the circle.
Color is not claimed as a feature of the mark.

Trademark Events
Dec 13, 2023
Teas Section 8 & 9 Received
Mar 8, 2023
Automatic Update Of Assignment Of Ownership
Dec 7, 2022
Assignment Of Ownership Not Updated Automatically
Nov 16, 2022
Assignment Of Ownership Not Updated Automatically
Jun 18, 2022
Courtesy Reminder - Sec. 8 (10-Yr)/Sec. 9 E-Mailed
May 12, 2021
Teas Change Of Correspondence Received
May 12, 2021
Attorney/Dom.Rep.Revoked And/Or Appointed
May 12, 2021
Teas Revoke/App/Change Addr Of Atty/Dom Rep Received
Feb 18, 2021
Applicant/Correspondence Changes (Non-Responsive) Entered
Feb 18, 2021
Teas Change Of Correspondence Received
Feb 18, 2021
Attorney/Dom.Rep.Revoked And/Or Appointed
Feb 18, 2021
Teas Revoke/App/Change Addr Of Atty/Dom Rep Received
Feb 18, 2021
Teas Change Of Owner Address Received
Nov 13, 2019
Assignment Of Ownership Not Updated Automatically
Oct 3, 2019
Notice Of Acceptance Of Sec. 8 & 15 - E-Mailed
Oct 3, 2019
Registered - Sec. 8 (6-Yr) Accepted & Sec. 15 Ack.
Sep 30, 2019
Teas Response To Office Action-Post Reg Received
Sep 24, 2019
Attorney/Dom.Rep.Revoked And/Or Appointed
Sep 24, 2019
Teas Revoke/App/Change Addr Of Atty/Dom Rep Received
Jul 12, 2019
Post Registration Action Mailed - Sec. 8 & 15
Jul 11, 2019
Case Assigned To Post Registration Paralegal
Jun 18, 2019
Teas Section 8 & 15 Received
Jun 18, 2018
Courtesy Reminder - Sec. 8 (6-Yr) E-Mailed
Jun 18, 2013
Registered-Principal Register
May 14, 2013
Notice Of Acceptance Of Statement Of Use E-Mailed
May 13, 2013
Law Office Registration Review Completed
May 10, 2013
Assigned To Lie
May 10, 2013
Allowed Principal Register - Sou Accepted
May 8, 2013
Statement Of Use Processing Complete
May 7, 2013
Use Amendment Filed
May 7, 2013
Teas Statement Of Use Received
Nov 16, 2012
Notice Of Approval Of Extension Request E-Mailed
Nov 15, 2012
Sou Extension 2 Granted
Nov 8, 2012
Sou Extension 2 Filed
Nov 8, 2012
Sou Teas Extension Received
Jun 1, 2012
Notice Of Approval Of Extension Request E-Mailed
May 31, 2012
Sou Extension 1 Granted
May 8, 2012
Sou Extension 1 Filed
May 31, 2012
Case Assigned To Intent To Use Paralegal
May 8, 2012
Sou Teas Extension Received
Nov 8, 2011
Noa E-Mailed - Sou Required From Applicant
Sep 13, 2011
Official Gazette Publication Confirmation E-Mailed
Sep 13, 2011
Published For Opposition
Aug 9, 2011
Law Office Publication Review Completed
Aug 9, 2011
Assigned To Lie
Jul 27, 2011
Approved For Pub - Principal Register
Jul 20, 2011
Teas/Email Correspondence Entered
Jul 19, 2011
Correspondence Received In Law Office
Jul 19, 2011
Teas Response To Office Action Received
Jan 19, 2011
Notification Of Non-Final Action E-Mailed
Jan 19, 2011
Non-Final Action E-Mailed
Jan 19, 2011
Non-Final Action Written
Jan 12, 2011
Assigned To Examiner
Oct 22, 2010
Notice Of Design Search Code Mailed
Oct 21, 2010
New Application Office Supplied Data Entered
Oct 19, 2010
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24