Trademark: 85918350
Word
AURORA INFORMATION SECURITY & RISK
Status
Dead
Status Code
710
Status Date
Friday, April 22, 2022
Serial Number
85918350
Registration Number
4827470
Registration Date
Tuesday, October 6, 2015
Mark Type
3000
Filing Date
Tuesday, April 30, 2013
Published for Opposition
Tuesday, December 23, 2014
Cancellation Date
Friday, April 22, 2022

Trademark Owner History

Classifications
9 Customized computer software for recovery and organization of computer files for use in computer forensic investigations to obtain and secure relevant electronic evidence; customized e-Discovery and cyber forensics computer program; customized computer programs for assessing critical infrastructure; customized computer network security, system security, file security, and data security software; customized computer software for data and file security; customized computer security software in relation to the security of data, computers and computer networks; customized firewall software; customized diagnostic software for identifying data security issues
35 Business management consulting services in the field of critical infrastructure protection, namely, protection of high value manufacturing facilities, roadways and railways, power grids and telecommunications grids through the integration of existing and new security networks among different targets and different protective systems; business consulting and advisory services on matters of homeland security and critical infrastructure protection to maritime, mass transit, aviation, railway, pipeline, technology, and defense companies
45 Litigation consulting services; forensic evidence evaluation and analysis services; electronic discovery and investigation services, namely, reviewing electronically stored information that could be relevant in a lawsuit; litigation support services, namely, evidence evaluation, analysis services, electronic legal discovery and investigation services; providing a database in the legal field accessible over electronic or optical communications networks; legal research and services; Security services, namely, providing security assessments of physical locations, information systems, and working environments; Security services, namely, providing security assessments for businesses and governmental agencies; Consulting services in the field of state and federal regulatory compliance requirements for personnel safety; security consulting services, namely, security risk evaluations in the field of civil infrastructures; security consultation services, namely, threat and vulnerability assessments in the field of physical security, disaster recovery, weapons of mass destruction, chemical, biological, radiological, nuclear and explosive threats; building security services, namely, control of building environmental and security systems; infrastructure security services for buildings, namely, physical protection of critical infrastructure and assets; providing security services and consultation and information in the field of emergency and crisis response plans, continuity of government and continuity of operations plans design and development; Security services for the protection of property and individuals provided on-line through the internet and other communications media, namely, providing user authorization and fraud detection services for monitoring of security systems; monitoring and surveillance services in relation to computer networks and systems, namely, monitoring of computer systems for security purposes; monitoring and surveillance services in relation to computers and computer networks and systems, namely, computer network monitoring service which tracks network performance and processes for security purposes and provides reports and alerts concerning such activities; security guard services for the protection of property and individuals; consultation and services in the field of security, namely, security guard services, security patrol services, security equipment leasing and security alarm monitoring; monitoring of computer systems for security purposes; fraud prevention services, namely, fraud and identity theft protection; fraud prevention services, namely, fraud and identity theft protection; fraud detection services, namely, anti-corruption, anticounterfeiting and anti-money laundering services; crime prevention consultancy, namely, security consultancy; risk analysis, namely, security threat analysis for personal and business protection purposes; international asset protection, namely, investigation of assets for security purposes; security services, namely, industrial espionage detection and prevention; private investigative services; identity theft and fraud protection services; crisis management planning, namely, security threat analysis for protecting public safety; computerized security services for business establishments, namely, electronically monitoring, detecting and reporting on suspicious or abnormal activity indicating theft, fraud, or other criminal activity; monitoring of security systems; security guard services for facilities, personal protection and for protecting property; consultation services concerning homeland safety and security issues, namely, government advisory and consultancy services relating to security sector reform and law enforcement; information services, namely, provision of a website featuring non-downloadable on-line reports relating to security, travel security and other security risks; litigation support services; litigation support services, namely, electronic legal discovery; providing a website featuring information in the field of security; security services, namely, security clearance services in the nature of personal background investigations; security due diligence services, namely, security threat analysis for public safety; security assessment of risks; security services, namely, security integrity risk assessment and management; security threat analysis for public safety, namely, consultancy services in the field of preventing crime, including counter-terrorism, piracy, kidnap, extortion, threat, bribery and illegal detention; providing security information regarding understanding and preventing crime, including terrorism, piracy, kidnap, extortion, threat, bribery and illegal detention; security services, namely, executive personal protection; personal background investigations; information, advice and consultancy relating to all the aforesaid services; preemployment background investigation and screening; computer crime investigations; monitoring and providing electronic reports of computer systems for security purposes; computer firewall security monitoring services; Background investigation and research services; Background investigation services; Pre-employment background investigation services; Pre-employment background screening; Day and night guards; Emergency response alarm monitoring services, namely, monitoring of alert devices by a remote monitoring center for the dispatch of emergency public health and security services and notification to third parties; Monitoring burglar and security alarms; Personal body guarding; Personal security consultation; Providing information in the field of personal physical security; Security consultancy; Security due diligence services for individuals or businesses traveling or opening an office overseas, in the nature of detailed foreign country briefings, vetting of local personnel, establishing host country government contacts, and providing information on sustainable security measures overseas; Security guarding for facilities; Security services for individuals and business persons traveling internationally and domestically, namely, providing foreign country security briefings, embassy information for security purposes and security reports; Security services, namely, armed escorts
42 Technology consultation in the field of computer forensics investigation; technology consultation in the field of the identification, collection and preservation of electronically stored information; providing temporary use of non-downloadable computer software for accessing, collecting, storing, organizing, aggregating, managing, and analyzing electronic documents and data for use in the legal field; providing temporary use of non-downloadable litigation-support computer software and computer software for regulatory compliance management; providing temporary use of nondownloadable computer software to create charts, graphs, statistical summaries and diagrams to visualize sequences of events for use in the legal field; providing temporary use of non-downloadable computer software to reconstruct complex evidence and sequences of events for use in the legal field; technical analysis of buildings, material, equipment and processes for the performance of threat and vulnerability assessments for critical infrastructure protection, international commerce security, and enhancement of critical communication between incident manager at operations centers and the first responders at the incident scene for defense, intelligence and response communities; data mining services for the defense, intelligence and response communities; providing computer consultation services, namely, computer security assessment, risk management and critical infrastructure for others; computer security service, namely, hard drive erasure; design and development of electronic data security systems; design and development of electronic data security systems; development of security systems and contingency planning for information systems; consultation and services in the field of computer forensic services, namely, data and computer security services, namely, hard drive erasure, restricting access to and by computer networks; recovery of electronic data; computer security consultancy; computer forensic services; electronic computer data forensic services; testing of security systems; computer disaster recovery planning; computer consultation in the field of computer security, namely, providing computer security technical support in the nature of assessing, identifying and correcting threats to a computer network, incident responses in the nature of a 24/7 service to address compromises in computer networks; computer security consulting in the field of computer security policy development; computer security services, namely, computer firewall security programming services, computer virus protection services, anti-phishing incident response services, intrusion prevention services, web content filtering services, computer security testing; consultation in the field of computer security and assessment of computer security needs; computer security consulting, namely, penetration testing in the field of computer security and risk assessment, namely, providing a detailed analysis of risks to a business and recommendations to reduce or eliminate such risks; back-up services for computer hard drive data; forensic analysis of computer data; forensic analysis of electronically stored information; Information security consulting services in the fields of computer and network incident response and digital forensics, vulnerability tracking and patch management, risk assessment certification and accreditation, application security assessment, network security assessment, wireless network security assessment, and security computer program development
The mark consists of the words "AURORA INFORMATION SECURITY & RISK". The first letter "A" in "AURORA" appears in white within a stylized triangle design comprised of three different shades of blue while the remaining lettering appears to the right of the triangle design in blue. The wording "INFORMATION SECURITY & RISK" appears in black beneath the wording "URORA" in "AURORA".
AURORA INFORMATION SECURITY AND RISK
The color(s) blue, white and black is/are claimed as a feature of the mark.
"INFORMATION SECURITY & RISK"

Trademark Events
Oct 27, 2023
Teas Change Of Correspondence Received
Oct 27, 2023
Attorney/Dom.Rep.Revoked And/Or Appointed
Oct 27, 2023
Teas Revoke/App/Change Addr Of Atty/Dom Rep Received
Apr 22, 2022
Cancelled Sec. 8 (6-Yr)
Oct 6, 2020
Courtesy Reminder - Sec. 8 (6-Yr) E-Mailed
Oct 6, 2015
Registered-Principal Register
Sep 1, 2015
Notice Of Acceptance Of Statement Of Use E-Mailed
Aug 31, 2015
Allowed Principal Register - Sou Accepted
Aug 29, 2015
Statement Of Use Processing Complete
Aug 17, 2015
Use Amendment Filed
Aug 29, 2015
Case Assigned To Intent To Use Paralegal
Aug 17, 2015
Teas Statement Of Use Received
Feb 17, 2015
Noa E-Mailed - Sou Required From Applicant
Dec 23, 2014
Official Gazette Publication Confirmation E-Mailed
Dec 23, 2014
Published For Opposition
Dec 3, 2014
Notification Of Notice Of Publication E-Mailed
Nov 19, 2014
Law Office Publication Review Completed
Nov 19, 2014
Approved For Pub - Principal Register
Nov 19, 2014
Examiner's Amendment Entered
Nov 19, 2014
Notification Of Examiners Amendment E-Mailed
Nov 19, 2014
Examiners Amendment E-Mailed
Nov 19, 2014
Examiners Amendment -Written
Nov 14, 2014
Teas/Email Correspondence Entered
Nov 14, 2014
Correspondence Received In Law Office
Nov 10, 2014
Teas Request For Reconsideration Received
May 9, 2014
Notification Of Final Refusal Emailed
May 9, 2014
Final Refusal E-Mailed
May 9, 2014
Final Refusal Written
Mar 13, 2014
Teas/Email Correspondence Entered
Mar 13, 2014
Correspondence Received In Law Office
Mar 3, 2014
Assigned To Lie
Feb 24, 2014
Teas Response To Office Action Received
Aug 23, 2013
Notification Of Non-Final Action E-Mailed
Aug 23, 2013
Non-Final Action E-Mailed
Aug 23, 2013
Non-Final Action Written
Aug 19, 2013
Assigned To Examiner
May 7, 2013
Notice Of Design Search Code E-Mailed
May 6, 2013
New Application Office Supplied Data Entered
May 3, 2013
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24