Serial Number
97263815
Owner
CODE42 SOFTWARE, INC.Attorney
Mark LeonardoFirst Use Date
Jan 31, 2007
Filing Date
Feb 11, 2022
CODE42 Trademark
Serial Number: 97263815 • Registration: 7165761
Trademark Classes
Class 9 - Computers & Electronics
Scientific, nautical, surveying, photographic, cinematographic, optical apparatus and instruments
Class 41 - Education & Entertainment
Education; providing of training; entertainment; sporting and cultural activities
Class 42 - Computer & Scientific
Scientific and technological services; industrial analysis and research services
Owner Contact Info
100 WASHINGTON AVENUE SOUTH
MINNEAPOLIS, MN 55404
Entity Type: 03
Legal Representation
Correspondence Address
Mark Leonardo Nutter, McClennen & Fish, LLP
155 Seaport Boulevard
Seaport West
Boston, MA 02210
United States
Trademark Details
Filing Date
February 11, 2022
Registration Date
September 12, 2023
First Use Anywhere
January 31, 2007
First Use in Commerce
January 31, 2007
Published for Opposition
January 3, 2023
Goods & Services
Educational services, namely, conducting courses, workshops, trainings and seminars in the fields of technology, computer software, computer systems, computer facilities and networks, data storage, data security, computer security, and information security and distribution of course and educational materials in connection therewith; Providing a website featuring blogs and non-downloadable publications in the nature of articles in the fields of technology, computer software, computer systems, computer facilities and networks, data storage, data security, computer security, and information security; Training services in the fields of information risk management and computer data security
Downloadable computer application software for electronic devices, mobile phones, and handheld computers, namely, software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device, and cloud application content; downloadable computer software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device and cloud application content; Downloadable computer software for encryption; Downloadable computer software for litigation hold and electronic discovery; Downloadable computer software for monitoring properties of files; Downloadable computer software for analyzing file properties and determining if file properties have changed; Downloadable computer software for creating reports regarding properties of files and changes in the properties of files; Downloadable computer software for identifying when files have been moved to removable media or cloud applications; Downloadable computer software for creating audit trails relating to file properties; Downloadable computer software for generating reports regarding ownership history of files, movement history of files, and content history of files; Downloadable computer software for tracking and identifying unusual activity relating digital content and files; Downloadable computer software for analyzing file properties and generating file property reports; Downloadable computer software for tracking, identifying, searching, and reporting on file activity data; Downloadable computer software for tracking activity across computers, email and the cloud; Downloadable software for use in connection with data security, computer security, cybersecurity, software threats, and prevention of computer risks
File protection services, namely, back-up services for computer hard drive and cloud data; data warehousing; remote computer backup services; remote online backup of computer and cloud data; software as a service (SAAS) services featuring software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device and cloud application content; Providing temporary use of non-downloadable cloud-based software for monitoring files and properties of files; Providing temporary use of non-downloadable cloud-based software for analyzing file properties and determining if file properties have changed; Providing temporary use of non-downloadable cloud-based software for creating reports regarding properties of files and changes in the properties of files; Data encryption services, Data encryption and decoding services; Computer services, namely, encrypted data recovery and data security services in the nature of data security consultancy and computer security threat analysis for protecting data; Providing temporary use of non-downloadable computer software for litigation hold and electronic discovery; Cross-platform conversion of digital content into other forms of digital content; Providing temporary use of non-downloadable computer software for identifying when files have been moved to removable media or cloud-based applications or storage; Providing temporary use of non-downloadable computer software for creating audit trails relating to file properties; Providing temporary use of non-downloadable computer software for generating reports regarding ownership history of files, movement history of files, and content history of files; Providing temporary use of non-downloadable computer software for tracking and identifying unusual activity relating digital content and files; Providing temporary use of non-downloadable computer software for analyzing file properties and generating file property reports; Providing temporary use of non-downloadable computer software for tracking, identifying, searching, and reporting on file activity data; Software as a service (SAAS) services featuring software for data security and for assistance and support in the prevention of unauthorized network data exfiltration on computers, computer systems, computer networks and digital devices; Software as a service (SAAS) services featuring software for computer system, corporate cloud and email risk detection; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; data security consulting services in the fields of information risk management and computer data security; technical consulting services related to designing, developing, customizing, configuring, deploying, analyzing, and managing of data security systems for others; Computer security consultancy in the field of insider threat management, in the nature of insider risk monitoring and reduction; Computer security consultancy in the nature of advanced cybersecurity services featuring the application and implementation of techniques, tools and expertise to detect, investigate and remediate advanced persistent threats and insider threats and include offensive cyber capabilities