Trademark: 86291495
Word
RADICALLY OPEN SECURITY
Status
Dead
Status Code
602
Status Date
Tuesday, April 14, 2015
Serial Number
86291495
Mark Type
4000
Filing Date
Monday, May 26, 2014
Abandoned Date
Tuesday, March 17, 2015

Trademark Owner History

Classifications
42 Computer consultation in the field of computer security; Computer forensic services; Computer hardware and software design; Computer network configuration services; Computer network design and computer software design for the computer security; Computer programming and computer system analysis; Computer programming and software design; Computer programming consultancy; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design for others; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of computer security; Computer software development, computer programming and maintenance of computer software for computer security; Computer systems analysis; Computer virus protection services; Consulting in the field of configuration management for computer hardware and software; Design and development of computer software; Design and development of computers and programs for computers; Design and development of electronic data security systems; Development and creation of computer programmes for data processing; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit Computer consultation in the field of computer security; Computer forensic services; Computer hardware and software design; Computer network configuration services; Computer network design and computer software design for the computer security; Computer programming and computer system analysis; Computer programming and software design; Computer programming consultancy; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design for others; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of computer security; Computer software development, computer programming and maintenance of computer software for computer security; Computer systems analysis; Computer virus protection services; Consulting in the field of configuration management for computer hardware and software; Design and development of computer software; Design and development of computers and programs for computers; Design and development of electronic data security systems; Development and creation of computer programmes for data processing; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Planning, design and implementation of computer technologies for others; Programming of computer software for others; Recovery of computer data; Rental of computers relating to computer security and prevention of computer risks; Research and development of computer software; Research in the field of intelligence and security technology; Technical advice relating to operation of computers; Technical support, namely, monitoring technological functions of computer network systems; Technological consultation in the technology field of computer security; Technological planning and consulting services in the field of computer security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risksplanning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Planning, design and implementation of computer technologies for others; Programming of computer software for others; Recovery of computer data; Rental of computers relating to computer security and prevention of computer risks; Research and development of computer software; Research in the field of intelligence and security technology; Technical advice relating to operation of computers; Technical support, namely, monitoring technological functions of computer network systems; Technological consultation in the technology field of computer security; Technological planning and consulting services in the field of computer security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks

Trademark Events
Apr 14, 2015
Abandonment Notice Mailed - Failure To Respond
Apr 14, 2015
Abandonment - Failure To Respond Or Late Response
Sep 16, 2014
Notification Of Non-Final Action E-Mailed
Sep 16, 2014
Non-Final Action E-Mailed
Sep 16, 2014
Non-Final Action Written
Sep 9, 2014
Assigned To Examiner
Jun 9, 2014
New Application Office Supplied Data Entered In Tram
May 29, 2014
New Application Entered In Tram

Trademark Alertz updated from USPTO on 2030-01-24