JANUSNET PTY LTD
3 Marks
Proprietary Limite…
First Filed:Sep 26, 2018Latest Filed:Sep 26, 2018Address:Suite 1302, 99 Mount Street, AU
Portfolio Overview
Registered
3(100%)Top Classes
Class 9
Electronics, Software & Scientific EquipmentTTAB Proceedings
No litigation activity
Top Firms
Hayes Soloway P.C.(Sep 2018)
3
Trademark Portfolio
3 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
3
0
Status
3
0
0
0
0
Mark Type
3
0
0
0
0
3
Goods & Services
Application software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; application software for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; application software for limiting the distribution of sensitive information and for use in data security; computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; computer software for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; computer software for limiting the distribution of sensitive information and for use in data security; downloadable computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; downloadable computer software for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; downloadable computer software for limiting the distribution of sensitive information and for use in data security; computer software for business purposes, namely, for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; computer software for business purposes, namely, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; computer software for business purposes, namely, for limiting the distribution of sensitive information and for use in data security; computer software for authorising access to data bases; computer software products, namely, computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; computer software products, namely, computer software for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; computer software products, namely, computer software for limiting the distribution of sensitive information and for use in data security; computer software programs for email management; interactive computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; interactive computer software for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; interactive computer software for limiting the distribution of sensitive information and for use in data security; computer software downloaded from the Internet controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; computer software downloaded from the Internet for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; computer software downloaded from the Internet for limiting the distribution of sensitive information and for use in data security; computer software for use in data security; computer software for use in protection of data; computer software for use in secure communication; computer software for use in management of Internet security
Goods & Services
[ Application software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; computer software programs for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; recorded computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; downloadable computer software controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security for business purposes; ] computer software for authorising access to data bases; [ computer software products, for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; ] computer software programs for email management; interactive computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; [ computer software downloaded from the internet for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; ] active electronic labels containing coded information; apparatus for electronic digital processing, namely, data processors and digital signal processors; computer software for data security; computer software for protection of data; computer software for secure communication; computer software for internet security | online retail store services featuring computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; online wholesale store services featuring computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security | Computer security services, namely, design and development of security computer software and systems; computer security services, namely, computer programming and software installation, repair and maintenance services; authentication services for electronic documents; authentication services for email; digitization of documents; [ computer software advisory services; computer software development; computer software engineering; computer software programming; computer software consultancy; computer support services, namely, computer software design and development advisory and information services; computer support services, namely, computer programming and software installation, repair and maintenance services; ] computerised business information storage, namely, electronic storage of files and documents; computerised data storage services including online, namely, electronic data storage; [ hosting of software as a service in the nature of software as a service (SAAS) services, namely, hosting software for use by others for use in security services, for controlling information flow, for controlling information access, for integration of business systems with email flow, for automatically classifying data, for limiting the distribution of sensitive information, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems to enforce security classification policy; information technology consulting services; data security consultancy; ] data security services, namely, design and development of electronic data security systems; internet security consultancy; network security services in the nature of test and risk assessment of electronic networks, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; security assessment services for computer networks, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability and in the field of data security and privacy
Goods & Services
Application software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; application software for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; application software for limiting the distribution of sensitive information and for use in data security; computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; computer software for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; computer software for limiting the distribution of sensitive information and for use in data security; downloadable computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; downloadable computer software for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; downloadable computer software for limiting the distribution of sensitive information and for use in data security; computer software for business purposes, namely, for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; computer software for business purposes, namely, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; computer software for business purposes, namely, for limiting the distribution of sensitive information and for use in data security; computer software for authorising access to data bases; computer software products, namely, computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; computer software products, namely, computer software for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; computer software products, namely, computer software for limiting the distribution of sensitive information and for use in data security; computer software programs for email management; interactive computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; interactive computer software for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; interactive computer software for limiting the distribution of sensitive information and for use in data security; computer software downloaded from the Internet controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems in the nature of email systems and document management systems for controlling information access; computer software downloaded from the Internet for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems in the nature of email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data; computer software downloaded from the Internet for limiting the distribution of sensitive information and for use in data security; computer software for use in data security; computer software for use in protection of data; computer software for use in secure communication; computer software for use in management of Internet security