Trademark: 86422063
Word
PHAROS
Status
Dead
Status Code
710
Status Date
Friday, September 23, 2022
Serial Number
86422063
Registration Number
4911987
Registration Date
Tuesday, March 8, 2016
Mark Type
3000
Filing Date
Monday, October 13, 2014
Published for Opposition
Tuesday, September 22, 2015
Cancellation Date
Friday, September 23, 2022

Trademark Owner History
Pharos Security Limited - Original Registrant

Classifications
41 Training services in the field of security risk; Training of personnel in relation to security, risk assessments and risk mitigation of property and individuals; Security awareness training and security skills assessments; Training in relation to IT and computer security; Information, advisory and consultancy services relating to the aforesaid services
9 Computer software for managing security strategy and resources relating to the security risk industry; Downloadable electronic publications in the nature of e-books, digital magazines, catalogues and digital publishing material relating to the security risk industry; Apparatus, instruments and media for recording, storing, carrying, transmission, reproduction and retrieval of data, signals, information, codes, images, text, video, sounds and audio; Computer programs for managing security strategy and resources for use in the security risk industry; Computer hardware relating to the security risk industry; Downloadable databases relating to the security risk industry; Electronic databases relating to the security risk industry recorded on computer media; Computer database management software for use in the security risk industry; Interactive computer software for managing security strategy and resources relating to the security risk industry; Computer database servers relating to the security risk industry; Computer network servers relating to the security risk industry; Downloadable computer programs for managing security strategy and resources for use in the security risk industry; Computer programs and computer software for providing online databases relating to the security risk industry; Electronic publications downloadable from the Internet relating to the security risk industry; Downloadable software for managing security strategy and resources relating to the security risk industry; Computer application software for mobile phones, portable media players, handheld computers, desktop computers, tablets, printers and other technological equipment, namely, software for use in data management, electronic storage of data, media storage and application, documentation, resource planning, project management, educational applications and computer simulation, relating to the security risk industry; Computer application software and computer software for mobile phones, portable media players, handheld computers, desktop computers, tablets, printers and other technological equipment, namely, software for allowing data retrieval, upload, download, access and management; Computer software for application and database integration relating to the security risk industry; Computer software for provision and display of data from local and global computer networks and for receiving, exchange and display of messages, images or data for use in the security risk industry; Computer software for the creation of data, storage of data and manipulation of data for use in the security risk industry; Computer software enabling parties to store and organize data relating to the security risk industry; Parts and fittings for all of the aforesaid goods
36 Financial risk management services; Strategic corporate financial advisory services Financial due diligence, analysis and investigations; Financial asset evaluation; Financial asset management, namely, asset recovery services; Business credit verification services; Information, advisory and consultancy services relating to the aforesaid services
35 Business investigation services; Business risk management; Business strategy development services; Business intelligence services; Business management assistance and consultancy; Business consultancy and management; Business risk appraisals; Business efficiency expert services; Corporate enquiries and investigations; Business failure analysis services; Business services, namely, screening, credentialing and organizing third party vendors, suppliers, contractors and other parties on behalf of others; Business management consulting and advisory services for the security risk industry; Forensic accounting services; Business auditing; Compilation, systemization and management of data; Collating of data in computer databases; provision of business information via global computer networks; Compilation of information into computer databases; Business consulting services, namely, providing assessment and development of strategy, business case and implementation of security programs; Providing business assessment and intelligence services; Information, advisory and consultancy services relating to the aforesaid services
45 Security consulting services, namely, providing security assessments for businesses and governmental agencies; Security consultancy; Advisory services in the field of home security systems; consultancy services relating to the provision of home security; Security services for the protection of property and individuals; Monitoring of security systems; Provision of security information; Security consulting services, namely, providing assessment of security risks for businesses and governmental agencies; Advisory services in the field of home security risk strategies; Security consulting services, namely, providing security assessments, security risk management, security strategy alignment, security control optimization and security protection assurance for governmental agencies, businesses and individuals; Security services relating to corporate strategy, namely, security and auditing assessments; Assessment of compliance to risk and security policy, standards, regulations and procedures, namely, regulatory compliance consulting in the field of security services for individuals, businesses and governmental agencies; Security consulting services in the field of business security, namely, assessment and development of strategy, business case security analysis and prioritization of project objectives and implementation of security programs; Security consulting services, namely, assessment of protection of physical facilities, assessment of security and protection measures for information, documents and materials; Security services, namely, providing executive protection and protection of individuals and property; Security services, namely, providing security assessments of protection of personnel for businesses and governmental agencies; Private investigation and enquiry services; Risk, security and crisis advisory and consultancy services; Provision of security information; Security consulting services, namely, assessment of security risks and assessment of security operations; Security services, namely, conducting recovery operations for the recovery of property and personnel; Security services, namely, providing executive protection; Security services, namely, threat vulnerability analysis and mitigation, and emergency and crisis response and management; Security services, namely, security vulnerability assessment and intelligence services; Security services, namely, providing impact assessments of protective measures, strategy and intelligence related to physical locations, information systems, information, documents and materials and working environments; Security consulting services, namely, assessments of physical locations, information systems and working environments for individuals, businesses and governmental agencies; Investigation of assets, credit reports, fiscal assessments and collection reports for security or authentication purposes; Information, advisory and consultancy security services relating to the aforesaid services
42 Computer consultation in the field of computer security compliance and risk consultancy and advisory services; industrial analysis and research services; Quality control for others; Corporate computer security and contingency planning services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security consultancy and advisory services relating to IT systems and computer security; Computer security consultancy services relating to the provision of IT systems and computer security; Information technology support services, namely, monitoring of IT systems and computer security systems; Computer security consultancy and advisory services relating to risk strategies of computers and IT systems; Information technology risk management services in relation to IT systems and computers, namely, cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; Information technology security consulting services, namely, advising companies in the development and implementation of security strategy alignment, security control optimization and security protection assurance in relation to IT systems and computers; Consulting services relating to corporate strategy and information technology IT systems and computers security control and optimization; Computer security services, namely, security assessments for businesses and individuals in relation to IT systems and computers; Computer security services, namely, assessment, design and development of security services software, systems, applications, procedures, controls, projects and organizations for computers or IT systems; Computer disaster recovery planning; Computer services, namely, data recovery services; Computer forensic services; Consultancy and advisory services relating to computer security and telecommunications technology systems security; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Information technology security services in the nature of providing cyber-threat intelligence, cyber-attack verification, and security analysis of network traffic, emails, files, media computer software, and mobile applications; Data security services, namely, design and development of electronic data security systems; Computer consultancy and advisory services in the field of computer information systems security, namely, data security and information systems risk consultancy and advisory services; Design and development of computer hardware and software relating to the security risk industry; Consultancy, advice, assistance, analysis, design, evaluation and programming services relating to computer software, firmware and hardware relating to the security risk industry; Maintenance of computer software relating to the security risk industry; Computer security consultancy; Information, advisory and consultancy security services relating to the aforesaid services
The mark consists of the word "pharos" in stylized font beginning from the center of an oval shape comprised of varying lengths of broken lines which are shorter at the bottom left and get progressively longer in both directions around the oval.
Color is not claimed as a feature of the mark.
The wording "PHAROS" has no meaning in a foreign language.

Trademark Events
Sep 23, 2022
Cancelled Sec. 8 (6-Yr)
Mar 8, 2021
Courtesy Reminder - Sec. 8 (6-Yr) E-Mailed
Mar 8, 2016
Registered-Principal Register
Jan 19, 2016
1(B) Basis Deleted; Proceed To Registration
Nov 24, 2015
Notice Of Allowance Cancelled
Jan 16, 2016
Case Assigned To Intent To Use Paralegal
Nov 24, 2015
Teas Post Publication Amendment Received
Nov 17, 2015
Noa E-Mailed - Sou Required From Applicant
Sep 22, 2015
Official Gazette Publication Confirmation E-Mailed
Sep 22, 2015
Published For Opposition
Sep 2, 2015
Notification Of Notice Of Publication E-Mailed
Aug 17, 2015
Law Office Publication Review Completed
Aug 14, 2015
Approved For Pub - Principal Register
Aug 14, 2015
Examiner's Amendment Entered
Aug 14, 2015
Notification Of Examiners Amendment E-Mailed
Aug 14, 2015
Examiners Amendment E-Mailed
Aug 14, 2015
Examiners Amendment -Written
Jul 24, 2015
Teas/Email Correspondence Entered
Jul 23, 2015
Correspondence Received In Law Office
Jul 23, 2015
Teas Response To Office Action Received
Feb 5, 2015
Notification Of Non-Final Action E-Mailed
Feb 5, 2015
Non-Final Action E-Mailed
Feb 5, 2015
Non-Final Action Written
Jan 31, 2015
Assigned To Examiner
Nov 20, 2014
Preliminary/Voluntary Amendment - Entered
Nov 13, 2014
Assigned To Lie
Nov 11, 2014
Teas Voluntary Amendment Received
Oct 21, 2014
Notice Of Design Search Code E-Mailed
Oct 20, 2014
New Application Office Supplied Data Entered In Tram
Oct 16, 2014
New Application Entered In Tram

Trademark Alertz updated from USPTO on 2030-01-24