Trademarkia Logo

Canada

C$
AMAZON MACIE
REGISTERED

on 3 Jun 2020

Last Applicant/ Owned by

AMAZON TECHNOLOGIES INC.

410 Terry Ave NSeattle, WA 98109

US

Serial Number

1872792 filed on 13th Dec 2017

Registration Number

TMA1079296 registered on 3rd Jun 2020

Registration expiry Date

3rd Jun 2030

Correspondent Address

CLARK WILSON LLP

900 - 885 WEST GEORGIA STREETVANCOUVER

BRITISH COLUMBIA

CA

V6C3H1

AMAZON MACIE

Trademark usage description

computer software for data processing, namely, software that uses machine learning to automatically discover, classify, and protect the sensitive data Read More

Classification Information


Class [009]
Computer software for data processing, namely, software that uses machine learning to automatically discover, classify, and protect the sensitive data of third party users of the software; computer hardware; computer software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information, namely, sensitive data of third party users of the software; computer software for IT security; computer software for network security; computer software for data protection; computer software for data security; computer software for preventing attacks on networks and data; computer software for insider threat detection and prevention; computer software for data loss prevention and remediation; computer software for preventing theft of data and intellectual property; computer software for tracking intellectual property across an organization's network; computer software for identifying an organization's sensitive documents; computer software for identifying an organization's intellectual property; computer software for identifying business risk arising from data that is being exposed and shared outside the organization; computer software for assessing the business importance of data and determining how said data is accessed; computer software for protecting user accounts from compromise; computer software for identifying which users are accessing certain documents; computer software for detecting changes in groups of users to prevent and mitigate unauthorized access and data leaks in relation to the sensitive data of third party users of the software; computer software for detecting changes in users' behavior to prevent and mitigate unauthorized access and data leaks in relation to the sensitive data of third party users of the software; computer software for reading and analyzing computer event logs; computer software for monitoring computer network access and activity; computer software for setting data access and sharing policies


Classification kind code

11

Class [042]
Consultation in the field of cloud computing; research and development in the field of data security and data loss prevention; research and development in the field of software; research and development in the field of computer security technology; computer systems analysis; computer systems, software and hardware consulting; computer security consulting; data security consulting; computer network security consulting; consulting in the field of data loss prevention; software as a service (SaaS) featuring software for data processing, namely, software that uses machine learning to automatically discover, classify, and protect sensitive data of third party users of the service; application service provider (ASP) services featuring software for data processing, namely, software that uses machine learning to automatically discover, classify, and protect sensitive data of third party users of the service; platform as a service (PaaS) services featuring software for data processing, namely, software that uses machine learning to automatically discover, classify, and protect sensitive data of third party users of the service; providing temporary use of non-downloadable software featuring software for data processing, namely, software that uses machine learning to automatically discover, classify, and protect sensitive data of third party users of the software; software rental; software as a service (SaaS) featuring software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information, namely, sensitive data of third party users of the service; software as a service (SaaS) featuring software for IT security; software as a service (SaaS) featuring software for network security; software as a service (SaaS) featuring software for data protection; software as a service (SaaS) featuring software for data security; software as a service (SaaS) featuring software for preventing attacks on networks and data; software as a service (SaaS) featuring software for insider threat detection and prevention; software as a service (SaaS) featuring software for data loss prevention and remediation; software as a service (SaaS) featuring software for preventing theft of data and intellectual property; software as a service (SaaS) featuring software for tracking intellectual property across an organization's network; software as a service (SaaS) featuring software for identifying an organization's sensitive documents; software as a service (SaaS) featuring software for identifying an organization's intellectual property; software as a service (SaaS) featuring software for identifying business risk arising from data that is being exposed and shared outside the organization; software as a service (SaaS) featuring software for assessing the business importance of data and determining how said data is accessed; software as a service (SaaS) featuring software for protecting user accounts from compromise; software as a service (SaaS) featuring software for identifying which users are accessing certain documents; software as a service (SaaS) featuring software for detecting changes in groups of users to prevent and mitigate unauthorized access and data leaks in relation to the sensitive data of third party users of the service; software as a service (SaaS) featuring software for detecting changes in users' behavior to prevent and mitigate unauthorized access and data leaks in relation to the sensitive data of third party users of the service; software as a service (SaaS) featuring software for reading and analyzing computer event logs; software as a service (SaaS) featuring software for monitoring computer network access and activity; software as a service (SaaS) featuring software for setting data access and sharing policies; software installation, maintenance and update services; remote computer and network monitoring services; software as a service (SaaS) featuring software for the collection and organizing of data and information, namely, sensitive data of third party users of the service


Classification kind code

11

Mark Details


Serial Number

1872792

Mark Type

Trademark

Legal History


Show more

Action TakenStatus
Submitted for opposition 42
on 31st Jul 2019
Advertised
Submitted for opposition 26
on 11th Jul 2019
Approved
Submitted for opposition 27
on 22nd May 2019
Approval Notice Sent
Submitted for opposition 15
on 25th Apr 2019
Correspondence Created
Submitted for opposition 27
on 28th Feb 2019
Approval Notice Sent
Submitted for opposition 22
on 19th Jul 2018
Search Recorded
Submitted for opposition 20
on 19th Jul 2018
Examiner's First Report
Submitted for opposition 1
on 14th Dec 2017
Created
Submitted for opposition 31
on 14th Dec 2017
Formalized
Submitted for opposition 30
on 13th Dec 2017
Filed