42 Computer security consultancy; Computer security consultancy in the field of Information Technology infrastructure, hard drives, software applications, computer networks, websites, and cloud-based data and applications; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to Information Technology infrastructure, hard drives, software applications, computer networks, websites, and cloud-based data and applications; Computer security services, namely, restricting unauthorized network access by Information Technology infrastructure, hard drives, software applications, computer networks, websites, and cloud-based data and applications; Computer services, namely, remote management of information technology (IT) systems of others comprised of Information Technology infrastructure, hard drives, software applications, computer networks, websites, and cloud-based data and applications; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, on-site management of information technology (IT) systems of others comprised of Information Technology infrastructure, hard drives, software applications, computer networks, websites, and cloud-based data and applications; Computer services, namely, remote management of the information technology (IT) systems of others; Consulting in the field of IT project management; Data security consultancy; Engineering services for building and property condition assessment, facility management, repair and restoration and building instrumentation; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems