BULLPHISH

Kaseya Limited

Application Filed: 2019-01-09
Trademark Application Details
Trademark Logo BULLPHISH

Mark For: BULLPHISH™ trademark registration is intended to cover the categories of software as a service (SAAS) featuring software for providing and visualizing phishing campaigns and for providing security awareness training compaigns; software as a service (SAAS) featuring software for use in measuring security awareness, email security awareness, and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SAAS) featuring computer software and applications for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SAAS) featuring computer software and applications for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SAAS) featuring computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats. [all]

Status

2020-12-01 UTC
DEAD APPLICATION Refused Dismissed or Invalidated
This trademark application was refused, dismissed, or invalidated by the Office and this application is no longer active.


Research OneLook Acronym Finder
Serial Number88255536
Mark Literal ElementsBULLPHISH
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeSERVICE MARK
RegisterPRINCIPAL
Current LocationTMO LAW OFFICE 128 - EXAMINING ATTORNEY ASSIGNED 2019-10-25
Basis1(b)
Class StatusACTIVE
Primary US Classes
  • 100: Miscellaneous
  • 101: Advertising and Business
Primary International Class
  • 042 - Primary Class
  • (Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed UseNo
Current UseNo
Intent To UseYes
Filed ITUYes
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameGregory M. Stone
Attorney Docket Number095094.00001
Law Office AssignedO10
Employee NameHOFFMAN, CHRISTOPHER J

Timeline

2019-01-09Application Filed
2019-10-01Abandon
2019-10-25Location: TMO LAW OFFICE 128 - EXAMINING ATTORNEY ASSIGNED
2019-10-25Status: Abandoned because the applicant failed to respond or filed a late response to an Office action. To view all documents in this fi
2019-10-25Status: Dead/Abandoned
2019-10-25Transaction Date

Trademark Parties (Applicants & Owners)

Party: KASEYA LIMITED
AddressONE CUSTOM HOUSE PLAZA, IFSC DUBLIN IRELAND D01 H5Y9
Legal Entity TypePublic Company Limited By Shares
Legal Entity StateIRELAND

Documents

DrawingJPEG2019-01-09
TEAS RF New ApplicationMULTI2019-01-09
XSearch Search SummaryXML2019-03-25
Offc Action OutgoingMULTI2019-03-29
Notice of AbandonmentXML2019-10-25

Attorney of Record

GREGORY M. STONE
WHITEFORD, TAYLOR & PRESTON, LLP
SEVEN SAINT PAUL STREET
BALTIMORE, MD 21202-1636

Good, Services, and Codes

(ABANDONED)
IC 042. US 100 101. G & S: Software as a service (SAAS) featuring software for providing and visualizing phishing campaigns and for providing security awareness training compaigns; software as a service (SAAS) featuring software for use in measuring security awareness, email security awareness, and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SAAS) featuring computer software and applications for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SAAS) featuring computer software and applications for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SAAS) featuring computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats

International Codes:42
U.S. Codes:100,101
Type CodeType
GS0421Software as a service (SAAS) featuring software for providing and visualizing phishing campaigns and for providing security awareness training compaigns; software as a service (SAAS) featuring software for use in measuring security awareness, email security awareness, and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SAAS) featuring computer software and applications for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SAAS) featuring computer software and applications for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SAAS) featuring computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats

Trademark Filing History

DescriptionDateProceeding Number
ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND2019-10-25
ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE2019-10-25
NOTIFICATION OF NON-FINAL ACTION E-MAILED2019-03-296325
NON-FINAL ACTION WRITTEN2019-03-2994479
NON-FINAL ACTION E-MAILED2019-03-296325
ASSIGNED TO EXAMINER2019-03-2594479
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2019-01-30
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP2019-01-30
NEW APPLICATION ENTERED IN TRAM2019-01-12

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed