Trademark: 88823211
Word
EPHISHINT
Status
Dead
Status Code
606
Status Date
Monday, October 23, 2023
Serial Number
88823211
Mark Type
4000
Filing Date
Thursday, March 5, 2020
Published for Opposition
Tuesday, July 28, 2020
Abandoned Date
Monday, October 23, 2023

Trademark Owner History
Software 1, LLC - Owner At Publication

Classifications
41 Training services in the field of security awareness for the prevention of security breaches targeting protected information and access to infrastructure; Training services in the field of security awareness training, simulation of security attacks, and vulnerability assessments for employer implementation of security awareness to employees offered via online videos, online games, online seminars, online trainings, in-person seminars, in-person trainings
9 Downloadable computer software for providing security awareness training and tools to assist in IT risk management and regulatory compliance, simulation of security attacks, and vulnerability assessments to collect data on user responses in order to assess user training necessities and test user training progress; Downloadable multimedia files containing videos, text, images, and audio relating to security awareness training for the prevention of security breaches targeting protected information and access to infrastructure; Downloadable software in the nature of a mobile application for use in the field of cyber security that allows users to upload, post, download, manage, access, display, and edit digital content; Downloadable computer software for searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications; downloadable computer software used to maintain security over or in computer networks, web applications and digital data; Downloadable computer software for providing network, Internet, and computer security; downloadable computer software for emulating attack methods used by computer hackers; Downloadable software in the nature of a mobile application for searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications; Downloadable software in the nature of a mobile application for simulating phishing attacks, and reviewing and managing educational quizzes, tests, and employee training results; Downloadable computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; Downloadable computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; Downloadable computer software for computer security risk and threat analysis, assessment, and management; Downloadable computer software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; Downloadable computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; Downloadable computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; Downloadable computer software for detecting, blocking, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications
42 Computer security consultancy in the field of computer security, network security, network security protocols, and cybersecurity; Computer services, namely, Software-as-a-Service services featuring software for online videos, online games, online seminars, online trainings, in-person seminars, in-person trainings in the field of providing internet security in the form of integrated security awareness training as well as simulated attacks to assess vulnerabilities; Providing temporary use of on-line non-downloadable software for security awareness training, simulation of security attacks, and vulnerability assessments; Computer services, namely, providing application service provider services featuring application programming interface (API) software for interfaces for customized searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing information, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and work group communications; software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of nondownloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SaaS), namely, providing temporary use of non-downloadable software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; Providing temporary use of non-downloadable software for searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications for use with a mobile application; providing temporary use of non-downloadable software for simulating phishing attacks, and reviewing and managing educational quizzes, tests, and employee training results for use with a mobile application

Trademark Events
Oct 23, 2023
Abandonment Notice E-Mailed - No Use Statement Filed
Oct 23, 2023
Abandonment - No Use Statement Filed
Dec 30, 2022
Notice Of Approval Of Extension Request E-Mailed
Dec 29, 2022
Sou Extension 5 Granted
Dec 12, 2022
Sou Extension 5 Filed
Dec 29, 2022
Case Assigned To Intent To Use Paralegal
Dec 12, 2022
Sou Teas Extension Received
Sep 3, 2022
Notice Of Approval Of Extension Request E-Mailed
Sep 1, 2022
Sou Extension 4 Granted
Sep 1, 2022
Sou Extension 4 Filed
Sep 1, 2022
Sou Teas Extension Received
Feb 26, 2022
Notice Of Approval Of Extension Request E-Mailed
Feb 24, 2022
Sou Extension 3 Granted
Feb 24, 2022
Sou Extension 3 Filed
Feb 24, 2022
Sou Teas Extension Received
Sep 24, 2021
Notice Of Approval Of Extension Request E-Mailed
Sep 22, 2021
Sou Extension 2 Granted
Sep 22, 2021
Sou Extension 2 Filed
Sep 22, 2021
Sou Teas Extension Received
Mar 9, 2021
Notice Of Approval Of Extension Request E-Mailed
Mar 5, 2021
Sou Extension 1 Granted
Mar 5, 2021
Sou Extension 1 Filed
Mar 5, 2021
Sou Teas Extension Received
Sep 22, 2020
Noa E-Mailed - Sou Required From Applicant
Jul 28, 2020
Official Gazette Publication Confirmation E-Mailed
Jul 28, 2020
Published For Opposition
Jul 8, 2020
Notification Of Notice Of Publication E-Mailed
Jun 23, 2020
Approved For Pub - Principal Register
Jun 17, 2020
Teas/Email Correspondence Entered
Jun 17, 2020
Correspondence Received In Law Office
Jun 17, 2020
Teas Response To Office Action Received
Jun 2, 2020
Notification Of Non-Final Action E-Mailed
Jun 2, 2020
Non-Final Action E-Mailed
Jun 2, 2020
Non-Final Action Written
May 25, 2020
Assigned To Examiner
Mar 11, 2020
New Application Office Supplied Data Entered
Mar 9, 2020
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24