Trademark: 97263815
Word
CODE42
Status
Registered
Status Code
700
Status Date
Tuesday, September 12, 2023
Serial Number
97263815
Registration Number
7165761
Registration Date
Tuesday, September 12, 2023
Mark Type
4000
Filing Date
Friday, February 11, 2022
Published for Opposition
Tuesday, January 3, 2023

Trademark Owner History
Code42 Software, Inc. - Original Registrant

Classifications
41 Educational services, namely, conducting courses, workshops, trainings and seminars in the fields of technology, computer software, computer systems, computer facilities and networks, data storage, data security, computer security, and information security and distribution of course and educational materials in connection therewith; Providing a website featuring blogs and non-downloadable publications in the nature of articles in the fields of technology, computer software, computer systems, computer facilities and networks, data storage, data security, computer security, and information security; Training services in the fields of information risk management and computer data security
9 Downloadable computer application software for electronic devices, mobile phones, and handheld computers, namely, software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device, and cloud application content; downloadable computer software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device and cloud application content; Downloadable computer software for encryption; Downloadable computer software for litigation hold and electronic discovery; Downloadable computer software for monitoring properties of files; Downloadable computer software for analyzing file properties and determining if file properties have changed; Downloadable computer software for creating reports regarding properties of files and changes in the properties of files; Downloadable computer software for identifying when files have been moved to removable media or cloud applications; Downloadable computer software for creating audit trails relating to file properties; Downloadable computer software for generating reports regarding ownership history of files, movement history of files, and content history of files; Downloadable computer software for tracking and identifying unusual activity relating digital content and files; Downloadable computer software for analyzing file properties and generating file property reports; Downloadable computer software for tracking, identifying, searching, and reporting on file activity data; Downloadable computer software for tracking activity across computers, email and the cloud; Downloadable software for use in connection with data security, computer security, cybersecurity, software threats, and prevention of computer risks
42 File protection services, namely, back-up services for computer hard drive and cloud data; data warehousing; remote computer backup services; remote online backup of computer and cloud data; software as a service (SAAS) services featuring software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device and cloud application content; Providing temporary use of non-downloadable cloud-based software for monitoring files and properties of files; Providing temporary use of non-downloadable cloud-based software for analyzing file properties and determining if file properties have changed; Providing temporary use of non-downloadable cloud-based software for creating reports regarding properties of files and changes in the properties of files; Data encryption services, Data encryption and decoding services; Computer services, namely, encrypted data recovery and data security services in the nature of data security consultancy and computer security threat analysis for protecting data; Providing temporary use of non-downloadable computer software for litigation hold and electronic discovery; Cross-platform conversion of digital content into other forms of digital content; Providing temporary use of non-downloadable computer software for identifying when files have been moved to removable media or cloud-based applications or storage; Providing temporary use of non-downloadable computer software for creating audit trails relating to file properties; Providing temporary use of non-downloadable computer software for generating reports regarding ownership history of files, movement history of files, and content history of files; Providing temporary use of non-downloadable computer software for tracking and identifying unusual activity relating digital content and files; Providing temporary use of non-downloadable computer software for analyzing file properties and generating file property reports; Providing temporary use of non-downloadable computer software for tracking, identifying, searching, and reporting on file activity data; Software as a service (SAAS) services featuring software for data security and for assistance and support in the prevention of unauthorized network data exfiltration on computers, computer systems, computer networks and digital devices; Software as a service (SAAS) services featuring software for computer system, corporate cloud and email risk detection; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; data security consulting services in the fields of information risk management and computer data security; technical consulting services related to designing, developing, customizing, configuring, deploying, analyzing, and managing of data security systems for others; Computer security consultancy in the field of insider threat management, in the nature of insider risk monitoring and reduction; Computer security consultancy in the nature of advanced cybersecurity services featuring the application and implementation of techniques, tools and expertise to detect, investigate and remediate advanced persistent threats and insider threats and include offensive cyber capabilities
CODE FOUR TWO; CODE FORTY TWO

Trademark Events
Oct 19, 2023
Teas Change Of Correspondence Received
Oct 19, 2023
Attorney/Dom.Rep.Revoked And/Or Appointed
Oct 19, 2023
Teas Revoke/App/Change Addr Of Atty/Dom Rep Received
Oct 19, 2023
Applicant/Correspondence Changes (Non-Responsive) Entered
Oct 19, 2023
Teas Change Of Owner Address Received
Sep 12, 2023
Notice Of Registration Confirmation Emailed
Sep 12, 2023
Registered-Principal Register
Aug 5, 2023
Notice Of Acceptance Of Statement Of Use E-Mailed
Aug 4, 2023
Allowed Principal Register - Sou Accepted
Jul 18, 2023
Statement Of Use Processing Complete
Jun 16, 2023
Use Amendment Filed
Jul 14, 2023
Case Assigned To Intent To Use Paralegal
Jun 16, 2023
Teas Statement Of Use Received
Feb 28, 2023
Noa E-Mailed - Sou Required From Applicant
Jan 3, 2023
Official Gazette Publication Confirmation E-Mailed
Jan 3, 2023
Published For Opposition
Dec 14, 2022
Notification Of Notice Of Publication E-Mailed
Dec 1, 2022
Approved For Pub - Principal Register
Dec 1, 2022
Examiner's Amendment Entered
Dec 1, 2022
Notification Of Examiners Amendment E-Mailed
Dec 1, 2022
Examiners Amendment E-Mailed
Dec 1, 2022
Examiners Amendment -Written
Nov 28, 2022
Assigned To Examiner
Feb 16, 2022
New Application Office Supplied Data Entered
Feb 15, 2022
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24