Trademark: 85406646
Word
FRONTIER RESCUETECH
Status
Dead
Status Code
602
Status Date
Tuesday, January 8, 2013
Serial Number
85406646
Mark Type
4000
Filing Date
Wednesday, August 24, 2011
Abandoned Date
Tuesday, December 11, 2012

Trademark Owner History

Classifications
42 technical consultation services, namely, help desk and on-call technical support services in the technology fields of computer hardware, computer software, computer networking, mobile computer devices, and connectivity to a global computer network; computer diagnostic services, namely, troubleshooting in the nature of diagnosing computer hardware problems, computer software problems, computer network problems, mobile computer device problems, and internet connectivity problems for others; maintaining computer software for others; technological consulting services in the field of optimizing the performance of computer hardware, computer software, computer networks, mobile computer devices, and internet connections; computer services, namely, the design, monitoring, and management of computer networks for others; troubleshooting in the nature of diagnosing and repair of computer networking software problems for others; computer services, namely, troubleshooting in the nature of diagnosing printer, scanner, and other computer peripheral problems; computer services, namely, data backup and recovery services for computer hard drive data; data backup and recovery services in the field of computers and mobile computing devices; computer services, namely, providing technical assistance in the uploading and retrieval of digital data to on-site storage devices and remote servers; computer services, namely, providing technical assistance with temporary use of downloadable and non-downloadable software for the backup, storage, and recovery of computer data; computer services, namely, diagnostic consultation services in the field of computer security; computer security consultation services in the fields of assessing and protecting against attacks on, intrusions upon, and misuse of computer data, networks, servers, applications, desktops and mobile computing devices; computer system security services, namely, providing technical assistance relating to the deployment and use of software for restricting access to computers, computer networks, and mobile computing devices by undesired web sites, software programs, and individuals; computer system security services, namely, providing technical assistance relating to the deployment and use of software for restricting access by computers, computer networks, and mobile computing devices to undesired web sites, software programs, and individual computers; providing technical support relating to the temporary use of downloadable and non-downloadable software for protecting computers and mobile computing devices against hackers, viruses, spyware, spam, and other internet threats to computer security; providing an internet website featuring information, news, resources and educational materials in the field of preventing and managing personal exposure to cybercrime and computer risks; installation, repair and maintenance of computer network protection and security software; computer services, namely, providing technical support relating to the deployment and subscription-based use of downloadable and online, non-downloadable software for detecting hackers, viruses, spyware, spam, and other internet threats to the security of computers and mobile computing devices; computer services, namely, providing technical support relating to the temporary, subscription-based use of downloadable and online, non-downloadable software for monitoring and improving the performance of high speed internet connections; installation, maintenance, and repair of computer software; providing technical support services relating to the installation, maintenance, and repair of computer software; computer services, namely, providing technical support relating to the monitoring, regulation, and analysis of computer and internet usage; computer services, namely, providing technical support relating to the monitoring, management, categorization, filtering, and analysis of electronic communications and data transfer; computer services, namely, providing technical support relating to the monitoring, management, categorization, filtering, and analysis of Internet content; computer services, namely, providing technical support relating to the validation of data and video usage; providing technical support relating to the collection, analysis, and reporting of computer and Internet security information relating to computer and internet usage, computer and internet security, electronic communications, electronic data transfer, the optimization of Internet connections, and the management and administration of computer networks; providing technical support relating to the temporary use of on-line, non-downloadable software for monitoring, managing, categorizing, filtering, and analyzing electronic communications and electronic data transfers; Computer services, namely, providing consulting services designed to assist users in the set up, use, securitization, and management of the software components of social network accounts, portable computing devices, and pre-recorded digital audio and audiovisual media; computer services, namely, providing technical support in the deployment and use of tools to facilitate the parental monitoring and/or restriction of online activity of minors; providing consultation services relating to diagnosis of problems with remote home security systems to prevent and combat burglaries, fires, floods, carbon monoxide build-up, and personal medical emergencies; providing consultation services relating to the installation, maintenance, and repair of remote home security system software to prevent and combat burglaries, fires, floods, carbon monoxide build-up, and personal medical emergencies; technological support services, namely, troubleshooting in the nature of diagnosing problems with the installation and maintenance of home computer networks, computer hardware, fax machines, television sets, and computer peripherals such as printers and scanners
Color is not claimed as a feature of the mark.
FRONTIER RESCUE TECH

Trademark Events
Jan 8, 2013
Abandonment Notice Mailed - Failure To Respond
Jan 8, 2013
Abandonment - Failure To Respond Or Late Response
Jun 11, 2012
Non-Final Action Mailed
Jun 9, 2012
Non-Final Action Written
May 17, 2012
Teas/Email Correspondence Entered
May 17, 2012
Correspondence Received In Law Office
May 11, 2012
Assigned To Lie
May 1, 2012
Teas Response To Office Action Received
Nov 1, 2011
Non-Final Action Mailed
Nov 1, 2011
Non-Final Action Written
Oct 21, 2011
Assigned To Examiner
Aug 31, 2011
Notice Of Pseudo Mark Mailed
Aug 30, 2011
New Application Office Supplied Data Entered In Tram
Aug 27, 2011
New Application Entered In Tram

GTL
E
Trademark Alertz updated from USPTO on 2030-01-24