FULL STACK SECURITY - Trademark Details
Status: 606 - Abandoned - No Statement Of Use Filed
Serial Number
86661180
Word Mark
FULL STACK SECURITY
Status
606 - Abandoned - No Statement Of Use Filed
Status Date
2017-01-23
Filing Date
2015-06-12
Mark Drawing
4000 - Standard character mark
Typeset
Published for Opposition Date
2016-04-26
Attorney Name
Law Office Assigned Location Code
L20
Employee Name
REEVES, APRIL ELIZABET
Statements
Disclaimer with Predetermined Text
"SECURITY"
Goods and Services
Cyber security software; computer software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber risks, threats, events, intrusions, breaches and attacks; computer software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; computer software for ensuring the security of computer software, computer hardware, and computer networks; computer software for ensuring the security of IT systems and infrastructure; computer software for ensuring the security of servers; computer software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; computer software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; computer software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; computer software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; computer software for monitoring IT systems and infrastructure to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks
Goods and Services
Software as a service (SAAS) featuring cyber security software; software as a service (SAAS) featuring software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of IT systems and infrastructures; software as a service (SAAS) featuring software for server security; software as a service (SAAS) featuring software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; software as a service (SAAS) featuring software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; software as a service (SAAS) featuring software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; software as a service (SAAS) featuring software for monitoring IT system and infrastructure security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; technology consultation in the field of cyber security, computer software security, computer hardware security, computer network security, and IT systems and infrastructure security; cyber risks and security consultancy services
Classification Information
International Class
009 - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus. - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
US Class Codes
021, 023, 026, 036, 038
Class Status Code
6 - Active
Class Status Date
2015-06-17
Primary Code
009
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2016-03-23
Primary Code
042
Correspondences
Name
Ira Heffan
Address
Please log in with your Justia account to see this address.
Trademark Events
Event Date | Event Description |
2015-06-16 | NEW APPLICATION ENTERED IN TRAM |
2015-06-17 | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM |
2015-09-22 | ASSIGNED TO EXAMINER |
2015-09-22 | ASSIGNED TO EXAMINER |
2015-10-01 | NON-FINAL ACTION WRITTEN |
2015-10-01 | NON-FINAL ACTION E-MAILED |
2015-10-01 | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
2016-02-26 | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
2016-02-26 | CORRESPONDENCE RECEIVED IN LAW OFFICE |
2016-02-27 | TEAS/EMAIL CORRESPONDENCE ENTERED |
2016-02-29 | NON-FINAL ACTION WRITTEN |
2016-02-29 | NON-FINAL ACTION E-MAILED |
2016-02-29 | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
2016-03-03 | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
2016-03-16 | ASSIGNED TO LIE |
2016-03-23 | CORRESPONDENCE RECEIVED IN LAW OFFICE |
2016-03-23 | TEAS/EMAIL CORRESPONDENCE ENTERED |
2016-03-23 | APPROVED FOR PUB - PRINCIPAL REGISTER |
2016-03-24 | LAW OFFICE PUBLICATION REVIEW COMPLETED |
2016-04-06 | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
2016-04-26 | PUBLISHED FOR OPPOSITION |
2016-04-26 | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
2016-06-21 | NOA E-MAILED - SOU REQUIRED FROM APPLICANT |
2016-12-19 | TEAS REVOKE/APPOINT ATTORNEY RECEIVED |
2016-12-19 | ATTORNEY REVOKED AND/OR APPOINTED |
2016-12-21 | AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP |
2017-01-23 | ABANDONMENT - NO USE STATEMENT FILED |
2017-01-23 | ABANDONMENT NOTICE MAILED - NO USE STATEMENT FILED |