42 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of information security; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to client information, classified data, etc.; Computer security services, namely, restricting unauthorized network access by unauthorized users; Computer security threat analysis for protecting data; Computer consultation in the field of computer security; Computer consultation in the field of access control and information security; Data security consultancy; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Design and development of electronic data security systems; Design and development of home security systems; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Engineering and system analysis in the field of home security systems; Food safety testing and consultation related thereto; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Internet security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks; Providing a secure electronic online system featuring technology which allows for secure, private transfer of data; Providing a secure, web-based service enabling individuals to store and transmit information, including forensic tools, to assist law enforcement and search personnel should a child or dependent adult become a missing person; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested; Providing a secured-access website that gives registered Internet networked institutions the ability to upload, view, copy, print, download and share documents and images for the purposes of conducting consumer-driven transactions; Providing a secured-access, members only website featuring technology that gives members the ability to review, comment, post and access private data; Providing a secured-access, members only website featuring technology that gives registered Internet networked dental professionals the ability to communicate and share data for the purposes of designing and manufacturing dental restorations; Providing a website featuring technology enabling users to remotely view, monitor, program, operate and control large and small appliances, electrical systems and security systems in homes, offices and vehicles; Providing a website that features technology that enables the secure exchange of information by users; Providing technology information updates for home security systems via the global computer network; Recording software protection programs and security programs onto magnetic media; Rental of computers relating to computer security and prevention of computer risks; Technical support, namely, monitoring technological functions of computer network systems; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks