ABSOLUTE SOFTWARE CORPORATION
55 Marks
Corp.
First Filed:Sep 1, 1994Latest Filed:Mar 17, 2026Address:980 Howe Street, Vancouver, BC V6Z 0C8, CA
Portfolio Overview
Registered
16(29%)Pending
12(22%)Dead
27(49%)Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchClass 45
Personal servicesTTAB Proceedings
Total Proceedings
3As Plaintiff
2(67%)As Defendant
1(33%)Top Firms
DONAHUE FITZGERALD LLP(Nov 2025)
25
Christensen O'Connor Johnson...(Jan 2016)
13
Womble Bond Dickinson (US) L...(Apr 2016)
10
Carr & Ferrell LLP(May 2024)
2
Trademark Activity Timeline(1994 – 2026)
- Filings
- Registrations
Trademark Portfolio
55 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
55
0
Status
16
12
8
19
0
Mark Type
52
0
1
1
0
50
3
2
24
19
Goods & Services
Class 035: Business data analysis in the field of cyber security, network security, computer security; benchmarking services; benchmarking services for business management purposes; business consultancy in the field of cybersecurity; cybersecurity risk assessment and analysis services for business purposes; preparation and compilation of business reports; providing business and commercial information in the field of cyber security, network security, computer security.; Class 041: Arranging and conducting seminars, webinars, conferences, and workshops in the field of cyber security, network security, computer security; business training in the field of information technology and cyber security; professional coaching services in the fields of business risk management, leadership development, information technology, and cyber security; education services namely, providing non-downloadable webinars, videos, and podcasts in the fields of business risk management, leadership development, information technology, and cyber security; providing online electronic publications, non downloadable, in the field of business risk management, information technology, and cyber security; providing analysis and commentary in the field of business risk management, information technology, and cyber security via podcasts, television shows, blogs and websites via the internet; providing recognition and incentives by the way of awards to promote excellence in the field of business risk management, information technology, and cyber security.; Class 042: Computer software installation, implementation, configuration, maintenance, and technical support services; maintenance and updating of computer software for computer and network security and prevention of computer risks; computer security services, namely, testing, monitoring, and prevention of unauthorized access to hard dives, computer networks, and data; software as a service (SaaS) services featuring non-downloadable software for computer, network, and data security, endpoint device management, data protection, and creation of secure distributed network environments; providing temporary use of non-downloadable software for detecting, reporting, and responding to security incidents and threats; computer security consultancy.
Goods & Services
Class 035: Business data analysis in the field of cyber security, network security, computer security; benchmarking services; benchmarking services for business management purposes; business consultancy in the field of cybersecurity; cybersecurity risk assessment and analysis services for business purposes; preparation and compilation of business reports; providing business and commercial information in the field of cyber security, network security, computer security.; Class 041: Arranging and conducting seminars, webinars, conferences, and workshops in the field of cyber security, network security, computer security; business training in the field of information technology and cyber security; education services namely, providing non-downloadable webinars, videos, and podcasts in the fields of business risk management, leadership development, information technology, and cyber security; providing online electronic publications, non downloadable, in the field of business risk management, information technology, and cyber security; providing analysis and commentary in the field of business risk management, information technology, and cyber security via podcasts, television shows, blogs and websites via the internet; providing recognition and incentives by the way of awards to promote excellence in the field of business risk management, information technology, and cyber security.; Class 042: Computer software installation, implementation, configuration, maintenance, and technical support services; maintenance and updating of computer software for computer and network security and prevention of computer risks; computer security services, namely, testing, monitoring, and prevention of unauthorized access to hard dives, computer networks, and data; Software as a Service (SaaS) services featuring non-downloadable software for computer, network, and data security, endpoint device management, data protection, and creation of secure distributed network environments; providing temporary use of non-downloadable software for detecting, reporting, and responding to security incidents and threats; computer security consultancy.
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
Goods & Services
Downloadable computer security software; downloadable computer security monitoring and tracking software; downloadable computer security software for monitoring and tracking computer security and prevention of computer risks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and security software for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable and recorded computer operating software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring recorded computer security operating software and electronic erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals in electronic format sold together as a unit therewith;; Installation, implementation and ongoing support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; automatic back-up of information on personal computers; installation, removal and updating of computer software on a personal computer; security testing of computer software applications; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services;
Goods & Services
Downloadable computer security software; downloadable computer security monitoring and tracking software; downloadable computer security software for monitoring and tracking computer security and prevention of computer risks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and security software for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable and recorded computer operating software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring recorded computer security operating software and electronic erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals in electronic format sold together as a unit therewith;; Installation, implementation and ongoing support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; automatic back-up of information on personal computers; installation, removal and updating of computer software on a personal computer; security testing of computer software applications; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services;
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; installation, removal and updating of computer software on a personal computer; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
Goods & Services
Downloadable computer security software; downloadable computer security monitoring and tracking software; downloadable computer security software for monitoring and tracking computer security and prevention of computer risks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and security software for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable and recorded computer operating software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring recorded computer security operating software and electronic erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals in electronic format sold together as a unit therewith
Goods & Services
Downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptop personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (eproms) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; and instruction manuals sold together as a unit therewith; Providing investigation, surveillance and security services for the purpose of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purpose of protection of personal property, namely, monitoring and tracking of location of personal computers; surveillance services relating to the tracking of lost and stolen personal property; security services for the purpose of protection of personal property, namely, notification of law enforcement if personal computers are lost or stolen; "SOFTWARE"; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; technical support services, namely, installation, removal and updating of computer software on a personal computer
Goods & Services
Downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptop personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (eproms) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; and instruction manuals sold together as a unit therewith; Providing investigation, surveillance and security services for the purpose of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purpose of protection of personal property, namely, monitoring and tracking of location of personal computers; surveillance services relating to the tracking of lost and stolen personal property; security services for the purpose of protection of personal property, namely, notification of law enforcement if personal computers are lost or stolen; "PROTECT"; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; technical support services, namely, installation, removal and updating of computer software on a personal computer
Goods & Services
Downloadable Security software in the field of generation of security access codes for accessing self-encrypting drives; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptop personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMS) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; and instruction manuals sold together as a unit therewith; Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; automatic deletion of files on personal computers and notification of law enforcement if personal computers are lost or stolen; "SECURE"; Installation, implementation, maintenance and ongoing technical support services in the nature of troubleshooting problems of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation, maintenance and ongoing technical support services in the nature of troubleshooting problems of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation, maintenance and ongoing technical support services in the nature of troubleshooting problems of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation, maintenance and ongoing technical support services in the nature of troubleshooting problems of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation, maintenance and ongoing technical support services in the nature of troubleshooting problems of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, users, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; computer security services, namely, monitoring and tracking of location of personal computers; automatic back-up of information on personal computers; installation, removal and updating of computer software on a personal computer; Computer security services, namely providing validation of identity of end users of personal computers; computer monitoring services which track application software performance, perform periodic maintenance, and provide reports and alerts concerning such performance

Goods & Services
Downloadable computer software, namely, a feature of downloadable computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software downloaded to personal mobile devices, namely, a feature of computer software downloaded to personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software for computers, namely, a feature of security software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and manuals sold as a unit for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; "APPLICATION"

Goods & Services
Class 042: Installation, implementation and troubleshooting of computer software problems and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and troubleshooting of computer software problems and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; Class 045: Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices

Goods & Services
Downloadable computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software downloaded to personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and manuals sold as a unit for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; Installation, implementation and troubleshooting of computer software problems and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures

Goods & Services
Computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and instructional manuals for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices sold as a unit | Installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures | services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices

Goods & Services
Computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and instructional manuals for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices sold as a unit | Installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures | services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices

Goods & Services
Computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and instructional manuals for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices sold as a unit | Installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures | services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices

Goods & Services
Computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and instructional manuals for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices sold as a unit | Installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures | services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices

Goods & Services
Computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and instructional manuals for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices sold as a unit; Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; "SECURITY"; Installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures

Goods & Services
Embedded software for use in operational and security monitoring, alerting, repairing, cyber defense and cyber-security of computer systems, laptops, mobile devices and tablet computers, in the nature of endpoints, including identifying unauthorized, new or unknown software, data files, and executable files and blocking unauthorized software executions and data access

Goods & Services
"LOCK"





Goods & Services
Computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; computer software for tracking and managing information for use in the field of information technology service management; computer software for tracking and managing information for use in the field of information technology asset management for mobile devices; computer software that generates security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; computer security software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMS) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; and instruction manuals sold together as a unit therewith; (Based on Section 44) Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services for security purposes wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service center on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; Installation, implementation and maintenance of computer software for use in the field of information technology asset and lifecycle management and power management; installation, implementation and maintenance of computer software for use in the field of information technology service management; installation, implementation and maintenance of computer software for use in the field of information technology asset management for mobile devices; installation, implementation and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures



Goods & Services
Computer software for tracking and managing information, installation and system configuration, installation and deployment of software updates, encryption, access control, monitoring and protection of information in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures | Installation, implementation and ongoing support in the nature of troubleshooting of software and hardware problems and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing support in the nature of troubleshooting of software and hardware problems and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures


Goods & Services
"SERVICE"


Goods & Services
Security software, computer disks and erasable programmable read only memories (EPROMS) for security systems for computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices, and manuals sold as a unit therewith; Monitoring and tracking services for locating lost or stolen computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices programmed with software designed to contact the monitoring service center on a regular basis or in the event of theft or loss of the computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices



Goods & Services
"MOBILE THEFT MANAGEMENT"


Goods & Services
"MDM"

Goods & Services
"SECURE PASS"

Goods & Services
"SECURE DRIVE"


Goods & Services
Class 009: Computer software for use in the field of information technology asset and lifecycle management, namely, computer software for tracking, managing and auditing computer software licenses and compliance; computer software for tracking and managing information on computer hardware assets, user, installation and system configuration and installation and deployment of computer software and software updates by local or remote means; computer software for power management

Goods & Services
Class 009: Computer software for securing computer hardware and software from theft, provided in a hard disk or downloadable format; computer software for providing asset tracking and management of computer hardware and software, provided in a hard disk or downloadable format; Class 045: Monitoring of computer systems for security purposes related to the recovery or attempted recovery of lost or stolen computer hardware; and tracking services for retrieval of encoded computer hardware products



Goods & Services
"LAPTOP"

Goods & Services
computer services, namely, monitoring and tracking of location of personal computers; monitoring and tracking of information, data and status of software and other programs on personal computers; validation of identity of end users of personal computers; automatic deletion of files on personal computers and notification of law enforcement if personal computers are lost or stolen; automatic back-up of information on personal computers; installation, removal, and updating of computer software on a personal computer

Goods & Services
computer software for use in tracing locations of lost or stolen computers; monitoring of computers by telephone to determine the location of lost or stolen computers

