AMAZON MACIE

Amazon Technologies, Inc.

Application Filed: 2017-08-14
Trademark Application Details
Trademark Logo AMAZON MACIE
730
Live/Pending
FIRST EXTENSION - GRANTED
Research OneLook Acronym Finder
Serial Number87567293
Registration Number5723036
Mark Drawing Code4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form
Attorney NameJames F. Struthers
Attorney Docket NumberTMKM12185
Law Office AssignedL50
Employee NameBUTTON, JENNIFER JO

Timeline

2017-08-14Application Filed
2017-12-26Published for Opposition
2018-06-05Status: Live/Pending
2019-02-11Location: INTENT TO USE SECTION
2019-02-11Transaction Date
2019-04-09Trademark Registered

Trademark Applicants & Owners

Owner: Amazon Technologies, Inc.
Address410 Terry Ave N Seattle NV 98109
Legal Entity TypeCorporation
Legal Entity StateNV

Documents

Click the blue "Refresh" button to load certificates, specimines, application, and other documents.

Attorney of Record

JAMES F. STRUTHERS
Richard Law Group
13355 Noel Road, Suite 1350
Dallas TX 75240

Good, Services, and Codes

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:42
U.S. Codes:100,101
Type CodeType
GS0421Consultation in the field of cloud computing; research and development in the field of data security and data loss prevention; research and development in the field of software; research and development in the field of information technology; computer systems analysis; computer systems, software and hardware consulting; computer technology consulting; computer security consulting; IT consulting; data security consulting; computer network security consulting; consulting in the field of data loss prevention; software as a service (SaaS) featuring software for data processing; application service provider (ASP) services featuring software for data processing; platform as a service (PaaS) services featuring software for data processing; providing temporary use of non-downloadable software featuring software for data processing; software rental; software as a service (SaaS) featuring software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information; software as a service (SaaS) featuring software for IT security; software as a service (SaaS) featuring software for network security; software as a service (SaaS) featuring software for data protection; software as a service (SaaS) featuring software for data security; software as a service (SaaS) featuring software for data analytics; software as a service (SaaS) featuring software for preventing attacks on networks and data; software as a service (SaaS) featuring software for insider threat detection and prevention; software as a service (SaaS) featuring software for data loss prevention and remediation; software as a service (SaaS) featuring software for preventing theft of data and intellectual property; software as a service (SaaS) featuring software for tracking intellectual property across an organization's network; software as a service (SaaS) featuring software for identifying an organization's sensitive documents; software as a service (SaaS) featuring software for identifying an organization's intellectual property; software as a service (SaaS) featuring software for identifying business risk arising from data that is being exposed or shared outside the organization; software as a service (SaaS) featuring software for assessing the business importance of data and determining how said data is accessed; software as a service (SaaS) featuring software for protecting user accounts from compromise; software as a service (SaaS) featuring software for identifying which users are accessing certain documents; software as a service (SaaS) featuring software for detecting changes in groups of users; software as a service (SaaS) featuring software for detecting changes in users' behavior; software as a service (SaaS) featuring software for reading and analyzing computer event logs; software as a service (SaaS) featuring software for monitoring computer network access and activity; software as a service (SaaS) featuring software for setting data access and sharing policies; software installation, maintenance and update services; remote computer and network monitoring services
GS0421Computer systems analysis; software as a service (SaaS) featuring software for data processing; application service provider (ASP) services featuring software for data processing; platform as a service (PaaS) services featuring software for data processing; providing temporary use of non-downloadable software featuring software for data processing; software rental; software as a service (SaaS) featuring software for the collection and organizing of data and information; software as a service (SaaS) featuring software for IT security; software as a service (SaaS) featuring software for network security; software as a service (SaaS) featuring software for data protection; software as a service (SaaS) featuring software for data security; software as a service (SaaS) featuring software for data analytics; software as a service (SaaS) featuring software for preventing attacks on networks and data; software as a service (SaaS) featuring software for insider threat detection and prevention; software as a service (SaaS) featuring software for data loss prevention and remediation; software as a service (SaaS) featuring software for preventing theft of data and intellectual property; software as a service (SaaS) featuring software for tracking intellectual property across an organization's network; software as a service (SaaS) featuring software for identifying an organization's sensitive documents; software as a service (SaaS) featuring software for identifying an organization's intellectual property; software as a service (SaaS) featuring software for identifying business risk arising from data that is being exposed or shared outside the organization; software as a service (SaaS) featuring software for assessing the business importance of data and determining how said data is accessed; software as a service (SaaS) featuring software for protecting user accounts from compromise; software as a service (SaaS) featuring software for identifying which users are accessing certain documents; software as a service (SaaS) featuring software for detecting changes in groups of users; software as a service (SaaS) featuring software for detecting changes in users' behavior; software as a service (SaaS) featuring software for reading and analyzing computer event logs; software as a service (SaaS) featuring software for monitoring computer network access and activity; software as a service (SaaS) featuring software for setting data access and sharing policies

Trademark Filing History

DescriptionDateEvent Coding
NEW APPLICATION ENTERED IN TRAM2017-08-171 NWAP I:Incoming Correspondence
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2017-08-182 NWOS I:Incoming Correspondence
ASSIGNED TO EXAMINER2017-09-293 DOCK D:Assigned to Examiner
NON-FINAL ACTION WRITTEN2017-10-134 CNRT R:Renewal
NON-FINAL ACTION E-MAILED2017-10-135 GNRT F:First Action
NOTIFICATION OF NON-FINAL ACTION E-MAILED2017-10-136 GNRN O:Outgoing Correspondence
TEAS RESPONSE TO OFFICE ACTION RECEIVED2017-11-017 TROA I:Incoming Correspondence
CORRESPONDENCE RECEIVED IN LAW OFFICE2017-11-018 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2017-11-029 TEME I:Incoming Correspondence
APPROVED FOR PUB - PRINCIPAL REGISTER2017-11-0310 CNSA P:
ASSIGNED TO LIE2017-11-1511 ALIE A:Allowance for Publication
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2017-12-0612 NONP E:E-Mail
PUBLISHED FOR OPPOSITION2017-12-2613 PUBO A:Allowance for Publication
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2017-12-2614 NPUB E:E-Mail
NOA E-MAILED - SOU REQUIRED FROM APPLICANT2018-02-2015 NOAM E:E-Mail
TEAS CHANGE OF CORRESPONDENCE RECEIVED2018-04-2916 TCCA I:Incoming Correspondence
TEAS EXTENSION RECEIVED2018-06-0517 EEXT I:Incoming Correspondence
EXTENSION 1 FILED2018-06-0518 EXT1 S:
EXTENSION 1 GRANTED2018-06-0519 EX1G S:
NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED2018-06-0720 EXRA E:E-Mail
TEAS STATEMENT OF USE RECEIVED2019-01-2121 EISU I:Incoming Correspondence
CASE ASSIGNED TO INTENT TO USE PARALEGAL2019-02-1122 AITU A:Allowance for Publication
USE AMENDMENT FILED2019-01-2123 IUAF S:
STATEMENT OF USE PROCESSING COMPLETE2019-02-1224 SUPC I:Incoming Correspondence
TEAS EXTENSION RECEIVED2019-02-1825 EEXT I:Incoming Correspondence
ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED2019-03-0526 CNPR P:
NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED2019-03-0627 SUNA E:E-Mail
REGISTERED-PRINCIPAL REGISTER2019-04-0928 R.PR A:Allowance for Publication
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2021-01-0529 REAP I:Incoming Correspondence
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2021-01-0530 ARAA I:Incoming Correspondence
TEAS CHANGE OF CORRESPONDENCE RECEIVED2021-01-0531 TCCA I:Incoming Correspondence
COURTESY REMINDER - SEC. 8 (6-YR) E-MAILED2024-04-0932 REM1 E:E-Mail

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed