Mark For: BULLPHISH™ trademark registration is intended to cover the categories of
Research | OneLook Acronym Finder |
Serial Number | 88255536 |
Mark Literal Elements | BULLPHISH |
Mark Drawing Type | 4 - STANDARD CHARACTER MARK |
Mark Type | SERVICE MARK |
Register | PRINCIPAL |
Current Location | TMO LAW OFFICE 128 - EXAMINING ATTORNEY ASSIGNED 2019-10-25 |
Basis | 1(b) |
Class Status | ACTIVE |
Primary US Classes |
|
Primary International Class |
|
Filed Use | No |
Current Use | No |
Intent To Use | Yes |
Filed ITU | Yes |
44D Filed | No |
44E Current | No |
66A Current | No |
Current Basis | No |
No Basis | No |
Attorney Name | Gregory M. Stone |
Attorney Docket Number | 095094.00001 |
Law Office Assigned | O10 |
Employee Name | HOFFMAN, CHRISTOPHER J |
2019-01-09 | Application Filed |
2019-10-01 | Abandon |
2019-10-25 | Location: TMO LAW OFFICE 128 - EXAMINING ATTORNEY ASSIGNED |
2019-10-25 | Status: Abandoned because the applicant failed to respond or filed a late response to an Office action. To view all documents in this fi |
2019-10-25 | Status: Dead/Abandoned |
2019-10-25 | Transaction Date |
Party: | KASEYA LIMITED |
Address | ONE CUSTOM HOUSE PLAZA, IFSC DUBLIN IRELAND D01 H5Y9 |
Legal Entity Type | Public Company Limited By Shares |
Legal Entity State | IRELAND |
Drawing | JPEG | 2019-01-09 |
TEAS RF New Application | MULTI | 2019-01-09 |
XSearch Search Summary | XML | 2019-03-25 |
Offc Action Outgoing | MULTI | 2019-03-29 |
Notice of Abandonment | XML | 2019-10-25 |
(ABANDONED)
IC 042. US 100 101. G & S: Software as a service (SAAS) featuring software for providing and visualizing phishing campaigns and for providing security awareness training compaigns; software as a service (SAAS) featuring software for use in measuring security awareness, email security awareness, and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SAAS) featuring computer software and applications for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SAAS) featuring computer software and applications for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SAAS) featuring computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats
International Codes: | 42 |
U.S. Codes: | 100,101 |
Type Code | Type |
---|---|
GS0421 | Software as a service (SAAS) featuring software for providing and visualizing phishing campaigns and for providing security awareness training compaigns; software as a service (SAAS) featuring software for use in measuring security awareness, email security awareness, and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SAAS) featuring computer software and applications for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SAAS) featuring computer software and applications for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SAAS) featuring computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats |
Description | Date | Proceeding Number |
---|---|---|
ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | 2019-10-25 | |
ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | 2019-10-25 | |
NOTIFICATION OF NON-FINAL ACTION E-MAILED | 2019-03-29 | 6325 |
NON-FINAL ACTION WRITTEN | 2019-03-29 | 94479 |
NON-FINAL ACTION E-MAILED | 2019-03-29 | 6325 |
ASSIGNED TO EXAMINER | 2019-03-25 | 94479 |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2019-01-30 | |
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP | 2019-01-30 | |
NEW APPLICATION ENTERED IN TRAM | 2019-01-12 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.