42 (Based on 44(d) Priority Application) Cloud computing featuring software for use in tracking compliance and monitoring regulations and laws in the field of data privacy, information security, cybersecurity, data governance, data protection and information risk management; Computer programming services for data privacy, information security, cybersecurity, data governance, data protection and information risk management; Computer security consultancy; Computer security consultancy in the field of data privacy, information security, cybersecurity, data governance, data protection and information risk management; Computer security threat analysis for protecting data; Computer systems analysis; Consulting in the field of information technology; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Data security consultancy; Design and development of electronic data security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations; Internet security consultancy; Maintenance of on-line databases for others; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Platform as a service (PAAS) featuring computer software platforms for data privacy, information security, cybersecurity, data governance, data protection and information risk management; Providing a web site featuring temporary use of non-downloadable software for tracking compliance and monitoring regulations and laws in the field of data privacy, information security, cybersecurity, data governance, data; Rental of computer software, data processing equipment and computer peripheral devices; Scientific and technological services, namely, research and design in the field of data privacy, information security, cybersecurity, data governance, data protection and information risk management; Software as a service (SAAS) services featuring software for data privacy, information security, cybersecurity, data governance, data protection and information risk management; Software as a service (SAAS) services featuring software for implementing controls, assessments, and policies, and to monitor, report, and communicate privacy practices to others, all in the field of data privacy, information security, cybersecurity and data governance; Software as a service (SAAS) services featuring software for tracking compliance and monitoring regulations and laws in the field of data privacy, information security, cybersecurity, data governance, data protection and information risk management; Software as a service (SAAS) services featuring software using artificial intelligence for data privacy, information security, cybersecurity, data governance, data protection and information risk management; Technology consultation in the field of cybersecurity; Troubleshooting of computer software problems; Computer services, namely, data recovery services; Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of data privacy, information security, cybersecurity, data governance, data protection and information risk management(Based on 44(e)) Cloud computing featuring software for use in tracking compliance and monitoring regulations and laws in the field of data privacy, information security, cybersecurity, data governance, data protection and information risk management; Computer programming services for data privacy, information security, cybersecurity, data governance, data protection and information risk management; Computer security consultancy; Computer security consultancy in the field of data privacy, information security, cybersecurity, data governance, data protection and information risk management; Computer security threat analysis for protecting data; Computer systems analysis; Consulting in the field of information technology; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Data security consultancy; Design and development of electronic data security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations; Internet security consultancy; Maintenance of on-line databases for others; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Platform as a service (PAAS) featuring computer software platforms for data privacy, information security, cybersecurity, data governance, data protection and information risk management; Providing a web site featuring temporary use of non-downloadable software for tracking compliance and monitoring regulations and laws in the field of data privacy, information security, cybersecurity, data governance, data; Rental of computer software, data processing equipment and computer peripheral devices; Scientific and technological services, namely, research and design in the field of data privacy, information security, cybersecurity, data governance, data protection and information risk management; Software as a service (SAAS) services featuring software for data privacy, information security, cybersecurity, data governance, data protection and information risk management; Software as a service (SAAS) services featuring software for implementing controls, assessments, and policies, and to monitor, report, and communicate privacy practices to others, all in the field of data privacy, information security, cybersecurity and data governance; Software as a service (SAAS) services featuring software for tracking compliance and monitoring regulations and laws in the field of data privacy, information security, cybersecurity, data governance, data protection and information risk management; Software as a service (SAAS) services featuring software using artificial intelligence for data privacy, information security, cybersecurity, data governance, data protection and information risk management; Technology consultation in the field of cybersecurity; Troubleshooting of computer software problems; Computer services, namely, data recovery services; Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of data privacy, information security, cybersecurity, data governance, data protection and information risk management