About 450 Trademarks found for “det*”
Filters
Also try searching for:
*det
Mark | Details | Status | Class/Description | |
---|---|---|---|---|
DETAIL MASTER L'OREAL SOCIÉTÉ ANONYME 1641782 3 Sept 2013 | REGISTERED on 9 Mar 2016 | Produit pour le coiffage des cheveux, nommément spray. Class 003 Class 003 Cosmetics and Cleaning Products Produit pour le coiffage des cheveux, nommément spray. | ||
![]() | DETNET DESIGN DETNET SOUTH AFRICA (PROPRIETARY) LIMITED 1641272 28 Aug 2013 | REGISTERED on 23 Sept 2015 | Hand-held electronic controllers, computer operating systems and compu... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Hand-held electronic controllers, computer operating systems and computer software programs for controlling blasting operations in the mining industry; detonators; electronic detonators; electronic delay detonators for use in blasting operations in the mining industry; explosive boxes. Class 013 Class 013 Firearm Products | |
DETAIL DOCTOR RONDON GROUP LTD. 1632711 26 Jun 2013 | ABANDONED SECTION 36 on 30 Dec 2014 | Vehicle and boat washing, cleaning, and detailing.,Vehicle washing, cl... Class 035 Class 035 Advertising, Business & Retail Services Vehicle washing, cleaning, detailing, and servicing product sales. Class 037 Class 037 Construction and Repair Services Vehicle and boat washing, cleaning, and detailing. | ||
DETH BATH NEXON AMERICA INC. 1629627 5 Jun 2013 | ABANDONED SECTION 40(3) on 29 Jun 2016 | Entertainment services, namely, providing online computer games and in... Class 041 Class 041 Education and Entertainment Services Entertainment services, namely, providing online computer games and interactive online computer games; providing computer games that may be accessed network-wide by network users; providing virtual environments in which users interact through online social games for recreational, leisure or entertainment purposes; and providing information on-line relating to computer games and computer enhancements for games | ||
DETOUR Lakes of Muskoka Cottage Brewery Inc. 1616788 5 Mar 2013 | REGISTERED on 27 Oct 2014 | Brewed alcoholic beverages Class 032 Class 032 Light Beverage Products Brewed alcoholic beverages | ||
DETAILZ DETAILZ INC. 1615125 21 Feb 2013 | ABANDONED SECTION 36 on 20 Jan 2015 | Furniture and furniture accessories, namely, chairs, chair covers, cha... Class 006 Class 006 Metal Products Furniture and furniture accessories, namely, chairs, chair covers, chair pads, cushions, seat cushions, sashes, overlays, table linen, columns, candelabras, arches, backdrops, centrepieces, benches, tables, end tables, tray tables, podiums, statues, pillows, decorative pillows, figurines, table runners, wall drapes, wall screens, vinyl floor coverings, display boards, floor display units, tableware, linen fabrics, table linen, decorative boxes, and decorative wall plaques Class 008 Class 008 Hand Tool Products Furniture rental; furniture assembly; furniture delivery; storage of furniture; rental services offering furniture accessories, namely, chair covers, chair pads, and cushions; event planning; event decoration services, namely decorating event sites; consultation in the field of event planning; education in the field of event planning; organizing, producing and operation of shows and events that offers products and services to people planning events; organizing, planning and conducting tradeshows exhibiting event planning services; consultation in the field of event planning; business information services in the field of event planning; management services in the field of event planning; providing on-line electronic bulletin boards and chat rooms regarding event planning services; providing online journals, namely blogs and a live video blog network regarding event planning services; and operation of an internet website providing information on event planning services ... Class 014 Jewelry Products Rental services offering sashes, overlays, table linen, columns, candelabras, arches, backdrops, centrepieces, benches, tables, podiums, statues, figurines, table runners, wall drapes, wall screens, vinyl floor coverings, display boards, floor display units, tableware, linen fabrics, and table linen; retail sales and wholesale distribution of furniture; retail sales and wholesale distribution of chair covers, sashes, overlays, table linen, columns, candelabras, arches, backdrops, centrepieces, benches, tables, podiums, statues, figurines, table runners, wall drapes, wall screens, vinyl floor coverings, display boards, floor display units, tableware, linen fabrics, table linen, chair pads, and cushions Class 016 Paper Goods and Printed Material Class 017 Rubber Products Class 019 Non-Metallic Building Material Products Class 020 Furniture Products Class 021 Houseware and Glass Products Class 024 Fabrics Class 027 Floor Covering products Class 035 Advertising, Business & Retail Services Class 038 Communications Services Class 039 Transportation & Storage Services Class 040 Treatment & Processing of Materials Services Class 041 Education and Entertainment Services Class 042 Computer & Software Services & Scientific Services Class 043 Restaurant and Hotel Services | ||
![]() | DETANK DESIGN CHERY HEAVY INDUSTRY CO. LTD. 1610752 22 Jan 2013 | REGISTERED on 28 Oct 2015 | Agricultural cultivators; Agricultural tractors; Agricultural equipmen... Class 006 Class 006 Metal Products Agricultural cultivators; Agricultural tractors; Agricultural equipment for seeding; Agricultural irrigation equipment; Agricultural land fertilizing equipment; Agricultural plows; Excavators; Cranes; Loading docks. Tractors; Trucks; Automobiles; Cars; Hand trucks; Child car seats; Boats; Tires; Airplanes; Gearboxes. Class 007 Class 007 Machinery Products ... Class 011 Environmental Control Instrument Products lighting heating cooling cooking Class 012 Vehicles and Products for locomotion by land, air or water Class 019 Non-Metallic Building Material Products | |
DETECTRON 9256-2669 QUEBEC INC 1609246 9 Jan 2013 | ABANDONED SECTION 36 on 28 Oct 2014 | Apparatus combining a smoke alarm and/or detector and a clock Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Class 014 Class 014 Jewelry Products Apparatus combining a smoke alarm and/or detector and a clock | ||
DETREX DETREX CORPORATION (A MICHIGAN CORPORATION) 1607310 19 Dec 2012 | REGISTERED on 29 Jan 2014 | Solvent-type processing compositions for use in the electronics indust... Class 001 Class 001 Chemical Products Solvent-type processing compositions for use in the electronics industry, namely, hydrochloric acid | ||
DETICA BAE SYSTEMS PLC 1606146 11 Dec 2012 | ABANDONED SECTION 36 on 11 Aug 2015 | Compilation and systematization of information into computer databases... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Class 016 Class 016 Paper Goods and Printed Material ... Class 035 Advertising, Business & Retail Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 036 Insurance & Financial Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 037 Construction and Repair Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 041 Education and Entertainment Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. Class 042 Computer & Software Services & Scientific Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. Class 045 Personal & Legal & Social Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. |
on 9 Mar 2016
L'OREAL SOCIÉTÉ ANONYME
1641782 · 3 Sept 2013
003
Class 003
Cosmetics and Cleaning Products
Produit pour le coiffage des cheveux, nommément spray.
Produit pour le coiffage des cheveux, nommément spray.
on 23 Sept 2015
DETNET SOUTH AFRICA (PROPRIETARY) LIMITED
1641272 · 28 Aug 2013
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Hand-held electronic controllers, computer operating systems and computer software programs for controlling blasting operations in the mining industry; detonators; electronic detonators; electronic delay detonators for use in blasting operations in the mining industry; explosive boxes.
013
Class 013
Firearm Products
Hand-held electronic controllers, computer operating systems and compu...
on 30 Dec 2014
RONDON GROUP LTD.
1632711 · 26 Jun 2013
035
Class 035
Advertising, Business & Retail Services
Vehicle washing, cleaning, detailing, and servicing product sales.
037
Class 037
Construction and Repair Services
Vehicle and boat washing, cleaning, and detailing.
Vehicle and boat washing, cleaning, and detailing.,Vehicle washing, cl...
on 29 Jun 2016
NEXON AMERICA INC.
1629627 · 5 Jun 2013
041
Class 041
Education and Entertainment Services
Entertainment services, namely, providing online computer games and interactive online computer games; providing computer games that may be accessed network-wide by network users; providing virtual environments in which users interact through online social games for recreational, leisure or entertainment purposes; and providing information on-line relating to computer games and computer enhancements for games
Entertainment services, namely, providing online computer games and in...
on 27 Oct 2014
Lakes of Muskoka Cottage Brewery Inc.
1616788 · 5 Mar 2013
032
Class 032
Light Beverage Products
Brewed alcoholic beverages
Brewed alcoholic beverages
on 20 Jan 2015
DETAILZ INC.
1615125 · 21 Feb 2013
006
Class 006
Metal Products
Furniture and furniture accessories, namely, chairs, chair covers, chair pads, cushions, seat cushions, sashes, overlays, table linen, columns, candelabras, arches, backdrops, centrepieces, benches, tables, end tables, tray tables, podiums, statues, pillows, decorative pillows, figurines, table runners, wall drapes, wall screens, vinyl floor coverings, display boards, floor display units, tableware, linen fabrics, table linen, decorative boxes, and decorative wall plaques
008
Class 008
Hand Tool Products
Furniture rental; furniture assembly; furniture delivery; storage of furniture; rental services offering furniture accessories, namely, chair covers, chair pads, and cushions; event planning; event decoration services, namely decorating event sites; consultation in the field of event planning; education in the field of event planning; organizing, producing and operation of shows and events that offers products and services to people planning events; organizing, planning and conducting tradeshows exhibiting event planning services; consultation in the field of event planning; business information services in the field of event planning; management services in the field of event planning; providing on-line electronic bulletin boards and chat rooms regarding event planning services; providing online journals, namely blogs and a live video blog network regarding event planning services; and operation of an internet website providing information on event planning services
...
Class 014
Jewelry Products
Rental services offering sashes, overlays, table linen, columns, candelabras, arches, backdrops, centrepieces, benches, tables, podiums, statues, figurines, table runners, wall drapes, wall screens, vinyl floor coverings, display boards, floor display units, tableware, linen fabrics, and table linen; retail sales and wholesale distribution of furniture; retail sales and wholesale distribution of chair covers, sashes, overlays, table linen, columns, candelabras, arches, backdrops, centrepieces, benches, tables, podiums, statues, figurines, table runners, wall drapes, wall screens, vinyl floor coverings, display boards, floor display units, tableware, linen fabrics, table linen, chair pads, and cushions
Class 016
Paper Goods and Printed Material
Class 017
Rubber Products
Class 019
Non-Metallic Building Material Products
Class 020
Furniture Products
Class 021
Houseware and Glass Products
Class 024
Fabrics
Class 027
Floor Covering products
Class 035
Advertising, Business & Retail Services
Class 038
Communications Services
Class 039
Transportation & Storage Services
Class 040
Treatment & Processing of Materials Services
Class 041
Education and Entertainment Services
Class 042
Computer & Software Services & Scientific Services
Class 043
Restaurant and Hotel Services
Furniture and furniture accessories, namely, chairs, chair covers, cha...
on 28 Oct 2015
CHERY HEAVY INDUSTRY CO. LTD.
1610752 · 22 Jan 2013
006
Class 006
Metal Products
Agricultural cultivators; Agricultural tractors; Agricultural equipment for seeding; Agricultural irrigation equipment; Agricultural land fertilizing equipment; Agricultural plows; Excavators; Cranes; Loading docks. Tractors; Trucks; Automobiles; Cars; Hand trucks; Child car seats; Boats; Tires; Airplanes; Gearboxes.
007
Class 007
Machinery Products
...
Class 011
Environmental Control Instrument Products lighting heating cooling cooking
Class 012
Vehicles and Products for locomotion by land, air or water
Class 019
Non-Metallic Building Material Products
Agricultural cultivators; Agricultural tractors; Agricultural equipmen...
on 28 Oct 2014
9256-2669 QUEBEC INC
1609246 · 9 Jan 2013
009
Class 009
Computer & Software Products & Electrical & Scientific Products
014
Class 014
Jewelry Products
Apparatus combining a smoke alarm and/or detector and a clock
Apparatus combining a smoke alarm and/or detector and a clock
on 29 Jan 2014
DETREX CORPORATION (A MICHIGAN CORPORATION)
1607310 · 19 Dec 2012
001
Class 001
Chemical Products
Solvent-type processing compositions for use in the electronics industry, namely, hydrochloric acid
Solvent-type processing compositions for use in the electronics indust...
on 11 Aug 2015
BAE SYSTEMS PLC
1606146 · 11 Dec 2012
009
Class 009
Computer & Software Products & Electrical & Scientific Products
016
Class 016
Paper Goods and Printed Material
...
Class 035
Advertising, Business & Retail Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 036
Insurance & Financial Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 037
Construction and Repair Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 041
Education and Entertainment Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Class 042
Computer & Software Services & Scientific Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Class 045
Personal & Legal & Social Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Compilation and systematization of information into computer databases...
Owners
Detroit diesel corporation (21)
Detector electronics, llc (6)
Detroit pistons basketball company (5)
Arena football one llc a louisiana limited liability company (4)
Bae systems plc (4)
Detect inc. (4)
Eti canada inc. (4)
Forward foods llc (4)
Industries dettson inc. (4)
Reckitt & colman (overseas) health limited (4)
Categories
Class 9 (135)
Class 5 (87)
Class 16 (62)
Class 41 (60)
Class 35 (56)
Class 25 (53)
Class 3 (52)
Class 12 (49)
Class 42 (48)
Class 21 (47)
Class 7 (45)
Class 37 (44)
Class 28 (39)
Class 11 (37)
Class 18 (36)
Class 14 (35)
Class 1 (34)
Class 20 (34)
Class 24 (31)
Class 6 (29)
Class 10 (29)
Class 13 (23)
Class 26 (22)
Class 30 (22)
Class 8 (21)
Class 36 (20)
Class 40 (20)
Class 32 (18)
Class 19 (17)
Class 43 (17)
Class 44 (17)
Class 4 (16)
Class 29 (16)
Class 38 (16)
Class 27 (15)
Class 34 (15)
Class 17 (14)
Class 45 (13)
Class 31 (12)
Class 39 (12)
Class 22 (11)
Class 2 (10)
Class 33 (8)
Class 15 (6)
Class 23 (6)
Correspondents
Smart & biggar lp (60)
Gowling wlg (canada) llp (28)
Osler, hoskin & harcourt llp (18)
Robic agence pi s.E.C./ robic ip agency lp (16)
Stikeman elliott llp (15)
Marks & clerk (12)
Borden ladner gervais llp (10)
R. william wray & associates (7)
Amy croll (6)
Apply for Trademark
Select countries to protect your logo trademark
Trademark Name
Country Selected
Canada
$599 / 1 class + gov fee
United States
$99 / 1 class + gov fee
Canada
$599 / 1 class + gov fee
Mexico
$499 / 1 class + gov fee
European Union
$700 / 1 class + gov fee
China
$499 / 1 class + gov fee
South Korea
$699 / 1 class + gov fee
Japan
$799 / 1 class + gov fee
India
$99 / 1 class + gov fee
United Kingdom
$499 / 1 class + gov fee
Australia
$299 / 1 class + gov fee
Israel
$699 / 1 class + gov fee
United Arab Emirates
$699 / 1 class + gov fee
New Zealand
$699 / 1 class + gov fee
Brazil
$499 / 1 class + gov fee
Taiwan
$799 / 1 class + gov fee
Ukraine
$799 / 1 class + gov fee
Indonesia
$699 / 1 class + gov fee
South Africa
$499 / 1 class + gov fee
Singapore
$799 / 1 class + gov fee
Saudi Arabia
$799 / 1 class + gov fee
Afghanistan
$799 / 1 class + gov fee
Algeria
$799 / 1 class + gov fee
Argentina
$399 / 1 class + gov fee
Austria
$899 / 1 class + gov fee
Bahrain
$699 / 1 class + gov fee
Bangladesh
$599 / 1 class + gov fee
Benelux
$999 / 1 class + gov fee
Bhutan
$899 / 1 class + gov fee
Bolivia
$799 / 1 class + gov fee
Botswana
$1299 / 1 class + gov fee
British Virgin Islands
$1199 / 1 class + gov fee
Bulgaria
$799 / 1 class + gov fee
Cambodia
$799 / 1 class + gov fee
Chile
$499 / 1 class + gov fee
Colombia
$699 / 1 class + gov fee
Congo
$1199 / 1 class + gov fee
Costa Rica
$899 / 1 class + gov fee
Croatia
$899 / 1 class + gov fee
Cyprus
$999 / 1 class + gov fee
Czech Republic
$899 / 1 class + gov fee
Denmark
$799 / 1 class + gov fee
Dominican Republic
$899 / 1 class + gov fee
Ecuador
$799 / 1 class + gov fee
Egypt
$699 / 1 class + gov fee
El Salvador
$799 / 1 class + gov fee
Ethiopia
$1099 / 1 class + gov fee
France
$899 / 1 class + gov fee
Gaza
$799 / 1 class + gov fee
Germany
$899 / 1 class + gov fee
Greece
$799 / 1 class + gov fee
Guatemala
$899 / 1 class + gov fee
Haiti
$899 / 1 class + gov fee
Honduras
$899 / 1 class + gov fee
Hong Kong (SAR)
$899 / 1 class + gov fee
Hungary
$1099 / 1 class + gov fee
Iraq
$1499 / 1 class + gov fee
Italy
$899 / 1 class + gov fee
Jordan
$799 / 1 class + gov fee
Kazakhstan
$799 / 1 class + gov fee
Kenya
$899 / 1 class + gov fee
Kuwait
$799 / 1 class + gov fee
Laos
$699 / 1 class + gov fee
Lebanon
$999 / 1 class + gov fee
Lesotho
$1199 / 1 class + gov fee
Libya
$899 / 1 class + gov fee
Madrid Protocol (WIPO)
$1999 / 1 class + gov fee
Malawi
$1099 / 1 class + gov fee
Malaysia
$699 / 1 class + gov fee
Maldives
$999 / 1 class + gov fee
Morocco
$999 / 1 class + gov fee
Mozambique
$899 / 1 class + gov fee
Myanmar
$799 / 1 class + gov fee
Namibia
$799 / 1 class + gov fee
Nepal
$699 / 1 class + gov fee
Nicaragua
$899 / 1 class + gov fee
Norway
$899 / 1 class + gov fee
Oman
$1099 / 1 class + gov fee
Pakistan
$799 / 1 class + gov fee
Panama
$899 / 1 class + gov fee
Paraguay
$899 / 1 class + gov fee
Peru
$799 / 1 class + gov fee
Philippines
$899 / 1 class + gov fee
Poland
$499 / 1 class + gov fee
Portugal
$899 / 1 class + gov fee
Puerto Rico
$899 / 1 class + gov fee
Qatar
$799 / 1 class + gov fee
Romania
$899 / 1 class + gov fee
Serbia
$899 / 1 class + gov fee
Slovakia
$899 / 1 class + gov fee
Spain
$899 / 1 class + gov fee
Sri Lanka
$699 / 1 class + gov fee
Swaziland
$1299 / 1 class + gov fee
Sweden
$799 / 1 class + gov fee
Switzerland
$899 / 1 class + gov fee
Thailand
$799 / 1 class + gov fee
Tunisia
$899 / 1 class + gov fee
Turkey
$799 / 1 class + gov fee
Uganda
$699 / 1 class + gov fee
United Republic of Tanzania
$699 / 1 class + gov fee
Uruguay
$799 / 1 class + gov fee
Venezuela
$899 / 1 class + gov fee
Vietnam
$799 / 1 class + gov fee
West Bank, Palestine
$799 / 1 class + gov fee
Yemen
$1699 / 1 class + gov fee
Albania
$899 / 1 class + gov fee
Andorra
$899 / 1 class + gov fee
Angola
$1299 / 1 class + gov fee
Antigua and Barbuda
$1299 / 1 class + gov fee
Armenia
$799 / 1 class + gov fee
Azerbaijan
$799 / 1 class + gov fee
Bahamas
$1399 / 1 class + gov fee
Barbados
$1299 / 1 class + gov fee
Belgium
$999 / 1 class + gov fee
Belize
$1299 / 1 class + gov fee
Benin
$799 / 1 class + gov fee
Bosnia and Herzegovina
$999 / 1 class + gov fee
Brunei
$1299 / 1 class + gov fee
Burkina Faso
$799 / 1 class + gov fee
Burundi
$1199 / 1 class + gov fee
Cabo Verde
$899 / 1 class + gov fee
Cameroon
$799 / 1 class + gov fee
Central African Republic (CAR)
$799 / 1 class + gov fee
Chad
$799 / 1 class + gov fee
Comoros
$799 / 1 class + gov fee
Cote d'Ivoire
$799 / 1 class + gov fee
Czechia
$999 / 1 class + gov fee
Djibouti
$1199 / 1 class + gov fee
Dominica
$1299 / 1 class + gov fee
Equatorial Guinea
$799 / 1 class + gov fee
Eritrea
$999 / 1 class + gov fee
Estonia
$1299 / 1 class + gov fee
Eswatini
$1299 / 1 class + gov fee
Fiji
$899 / 1 class + gov fee
Finland
$699 / 1 class + gov fee
Gabon
$799 / 1 class + gov fee
Gambia
$899 / 1 class + gov fee
Georgia
$799 / 1 class + gov fee
Ghana
$999 / 1 class + gov fee
Grenada
$1299 / 1 class + gov fee
Guinea
$799 / 1 class + gov fee
Guinea-Bissau
$799 / 1 class + gov fee
Guyana
$1299 / 1 class + gov fee
Iceland
$1299 / 1 class + gov fee
Ireland
$899 / 1 class + gov fee
Jamaica
$1199 / 1 class + gov fee
Kiribati
$999 / 1 class + gov fee
Kosovo
$899 / 1 class + gov fee
Kyrgyzstan
$899 / 1 class + gov fee
Latvia
$699 / 1 class + gov fee
Liberia
$999 / 1 class + gov fee
Liechtenstein
$999 / 1 class + gov fee
Lithuania
$699 / 1 class + gov fee
Luxembourg
$999 / 1 class + gov fee
Madagascar
$999 / 1 class + gov fee
Mali
$799 / 1 class + gov fee
Malta
$599 / 1 class + gov fee
Marshall Islands
$999 / 1 class + gov fee
Mauritania
$799 / 1 class + gov fee
Mauritius
$999 / 1 class + gov fee
Micronesia
$999 / 1 class + gov fee
Moldova
$999 / 1 class + gov fee
Monaco
$1399 / 1 class + gov fee
Mongolia
$599 / 1 class + gov fee
Montenegro
$899 / 1 class + gov fee
Nauru
$999 / 1 class + gov fee
Netherlands
$999 / 1 class + gov fee
Niger
$799 / 1 class + gov fee
Nigeria
$399 / 1 class + gov fee
North Macedonia
$899 / 1 class + gov fee
Palau
$999 / 1 class + gov fee
Palestine
$999 / 1 class + gov fee
Papua New Guinea
$799 / 1 class + gov fee
Rwanda
$999 / 1 class + gov fee
Saint Kitts and Nevis
$1299 / 1 class + gov fee
Saint Lucia
$1299 / 1 class + gov fee
Saint Vincent and the Grenadines
$1299 / 1 class + gov fee
Samoa
$1199 / 1 class + gov fee
San Marino
$999 / 1 class + gov fee
Sao Tome and Principe
$999 / 1 class + gov fee
Senegal
$799 / 1 class + gov fee
Seychelles
$999 / 1 class + gov fee
Sierra Leone
$999 / 1 class + gov fee
Slovenia
$899 / 1 class + gov fee
Solomon Islands
$999 / 1 class + gov fee
Somalia
$999 / 1 class + gov fee
South Sudan
$999 / 1 class + gov fee
Suriname
$1599 / 1 class + gov fee
Tajikistan
$799 / 1 class + gov fee
Tanzania
$699 / 1 class + gov fee
Timor-Leste
$999 / 1 class + gov fee
Togo
$799 / 1 class + gov fee
Tonga
$1299 / 1 class + gov fee
Trinidad and Tobago
$1399 / 1 class + gov fee
Turkmenistan
$799 / 1 class + gov fee
Tuvalu
$999 / 1 class + gov fee
Uzbekistan
$699 / 1 class + gov fee
Vanuatu
$1199 / 1 class + gov fee
Zambia
$899 / 1 class + gov fee
Zimbabwe
$899 / 1 class + gov fee
OAPI
$899 / 1 class + gov fee
ARIPO
$999 / 1 class + gov fee