42 Information technology consulting services; Information technology security consulting services relating to protecting data and digital information from unauthorized access; Information technology security consulting services, namely, assessing and auditing the security controls of others relating to security in the nature of protecting data and digital information from unauthorized access; Information technology security consulting services, namely, assessing, auditing, and providing recommendations regarding data protection compliance; Information technology security consulting services, namely, assessing and providing recommendations regarding compliance with processes for protecting data from unauthorized access; IT security services in the nature of data protection, namely protecting data from unauthorized access; IT security services in the nature of protection and recovery of computer data; Computer network security consulting services; Computer network design for others; Computer network configuration and computer software updating services; Monitoring of computer systems and computer networks to detect unauthorized access or unauthorized activity, and to detect software, system, or network issues; Installation and maintenance of computer software; IT services, namely, software development, programming and implementation, computer hardware development, and cloud storage services for electronic data for infrastructure, platforms, and software for others; computer services, namely, providing management, optimization, unification, and integration of software applications, computer systems and computer networks, and internet resources; Computer disaster recovery planning