Response to Office Action

IRONNINE

Simpson, David

Response to Office Action

Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1957 (Rev 10/2011)
OMB No. 0651-0050 (Exp 09/20/2020)

Response to Office Action


The table below presents the data as entered.

Input Field
Entered
SERIAL NUMBER 88345794
LAW OFFICE ASSIGNED LAW OFFICE 128
MARK SECTION
MARK http://uspto.report/TM/88345794/mark.png
LITERAL ELEMENT IRONNINE
STANDARD CHARACTERS YES
USPTO-GENERATED IMAGE YES
MARK STATEMENT The mark consists of standard characters, without claim to any particular font style, size or color.
GOODS AND/OR SERVICES SECTION (042)(current)
INTERNATIONAL CLASS 042
DESCRIPTION
Consulting services in the field of Cyber Security and Privacy ; Consulting services online training software in the fields of cybersecurity, education, technology, legal compliance, ethics, business, background investigation, information technology skills and certification; Consulting services in the fields of policy, procedures and regulatory development; namely, reviewing standards and practices to assure compliance with laws and regulations; Computer security consultancy in the nature of advanced cybersecurity services featuring the application of techniques, tools and expertise to detect and remediate advanced persistent threats and insider threats and include offensive cyber capabilities; threat analysis for protecting data, administering digital certificates, scanning and penetration testing of computers and networks to assess information security vulnerability, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials. Computer security consultancy in the fields of identity and access management software solutions, electronic signature verification services using technology to authenticate user identity solutions, multi-factor authentication, issuance and validation of digital certificates, public key infrastructure (PKI), security operating center tools, namely, security information and event management, endpoint protection, intrusion detection, compliance management, treat intelligence, incident investigation, SOC automation, enterprise mobility management, mobile device management and API gateways; Encryption, decryption and authentication of data; Computer server hosting services, namely, creating online virtual desktop environments through use of hosted computer hardware and computer software resources for secure remote encrypted access to mission applications and information; Data migration services; Installation and maintenance of computer software; Information technology consulting services; Computer network, and information technology systems security and mobile device security consultancy
FILING BASIS Section 1(b)
GOODS AND/OR SERVICES SECTION (042)(proposed)
INTERNATIONAL CLASS 042
TRACKED TEXT DESCRIPTION
Consulting services in the field of Cyber Security and Privacy; Consulting services in the field of computer cyber security; Consulting services online training software in the fields of cybersecurity, education, technology, legal compliance, ethics, business, background investigation, information technology skills and certification; Providing online non-downloadable training software for {Information Technology computer, Network and security Certification Training and practice test} in the fields of computer cybersecurity, computer education, information technology, computer cybersecurity legal compliance, computer ethics, business computer information security, computer technology for performing background investigations, information technology skills, and information technology certification; Consulting services in the fields of policy, procedures and regulatory development; Consulting services in the fields of {Information Technology design, installation and security, Policy, procedure, Laws, Regulations implementation and compliance } procedures; namely, reviewing standards and practices to assure compliance with laws and regulations; Computer security consultancy in the nature of advanced cybersecurity to detect and remediate advanced persistent threats and insider threats and include offensive cyber capabilities; Computer security consultancy in the nature of advanced cybersecurity services featuring the application of techniques, tools and expertise to detect and remediate advanced persistent threats and insider threats and include offensive cyber capabilities; Computer security threat analysis for protecting data; threat analysis for protecting data, administering digital certificates, scanning and penetration testing of computers and networks to assess information security vulnerability, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials. Computer security consultancy in the fields of identity and access management software solutions, electronic signature verification services using technology to authenticate user identity solutions, multi-factor authentication, issuance and validation of digital certificates, public key infrastructure (PKI), security operating center tools, namely, security information and event management, endpoint protection, intrusion detection, compliance management, treat intelligence, incident investigation, SOC automation, enterprise mobility management, mobile device management and API gateways; Computer security services in the nature of administering digital certificates; Encryption, decryption and authentication of data; Encryption and decryption of data; Computer server hosting services, namely, creating online virtual desktop environments through use of hosted computer hardware and computer software resources for secure remote encrypted access to mission applications and information; Authentication of data, namely, of digital certificates; Scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security consultancy in the fields of identity and access management software solutions; Computer network, and information technology systems security and mobile device security consultancy; Electronic signature verification services using technology to authenticate user identity through multi-factor authentication, issuance and validation of digital certificates, public key infrastructure (PKI), and security operating center tools; Computer server hosting services, namely, hosting online virtual desktop environments through use of hosted computer hardware and computer software resources for secure remote encrypted access to mission applications and information; Data migration services; Installation and maintenance of computer software; Information technology consulting services; Computer network security, information technology systems security, and mobile device software security consultancy
FINAL DESCRIPTION
Consulting services in the field of computer cyber security; Providing online non-downloadable training software for {Information Technology computer, Network and security Certification Training and practice test} in the fields of computer cybersecurity, computer education, information technology, computer cybersecurity legal compliance, computer ethics, business computer information security, computer technology for performing background investigations, information technology skills, and information technology certification; Consulting services in the fields of {Information Technology design, installation and security, Policy, procedure, Laws, Regulations implementation and compliance } procedures; Computer security consultancy in the nature of advanced cybersecurity to detect and remediate advanced persistent threats and insider threats and include offensive cyber capabilities; Computer security threat analysis for protecting data; Computer security services in the nature of administering digital certificates; Encryption and decryption of data; Authentication of data, namely, of digital certificates; Scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security consultancy in the fields of identity and access management software solutions; Electronic signature verification services using technology to authenticate user identity through multi-factor authentication, issuance and validation of digital certificates, public key infrastructure (PKI), and security operating center tools; Computer server hosting services, namely, hosting online virtual desktop environments through use of hosted computer hardware and computer software resources for secure remote encrypted access to mission applications and information; Data migration services; Installation and maintenance of computer software; Information technology consulting services; Computer network security, information technology systems security, and mobile device software security consultancy
FILING BASIS Section 1(b)
GOODS AND/OR SERVICES SECTION (045)(class added)
INTERNATIONAL CLASS 045
DESCRIPTION
Consulting services in the field of computer privacy laws; Consulting services in the field of regulatory development, namely, reviewing standards and practices to assure compliance with {NIST, ISO, SCF, PCI DSS, COBIT 5, ENISA, FISMA, FedRAMP, OWASP, PCI, DoD, NAVY, ARMY, Risk Management Framework (RMF), OMB M-19-03, HIPAA, OMB, Homeland Security Act, Gramm-Leach Bliley Act, PII, PIA, FIPS, NSTISSP, NASA, FAR, CFAA,} laws and regulations; Reviewing information technology standards and practices to assure compliance with laws and regulations
FILING BASIS Section 1(b)
PAYMENT SECTION
NUMBER OF CLASSES 1
APPLICATION FOR REGISTRATION PER CLASS 275
TOTAL FEES DUE 275
SIGNATURE SECTION
DECLARATION SIGNATURE /David Simpson/
SIGNATORY'S NAME David Simpson
SIGNATORY'S POSITION Owner
SIGNATORY'S PHONE NUMBER 5408990551
DATE SIGNED 08/16/2019
RESPONSE SIGNATURE /David Simpson/
SIGNATORY'S NAME David Simpson
SIGNATORY'S POSITION Owner
SIGNATORY'S PHONE NUMBER 5404082982
DATE SIGNED 08/16/2019
AUTHORIZED SIGNATORY YES
FILING INFORMATION SECTION
SUBMIT DATE Fri Aug 16 11:29:31 EDT 2019
TEAS STAMP USPTO/ROA-XX.XXX.XXX.XX-2
0190816112931938705-88345
794-610b86feebfb15ea65be7
4aacebbf9091ea4ec18e5bd84
d5bf6873b53985f43e-CC-290
75658-2019081610164087440
3



Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1957 (Rev 10/2011)
OMB No. 0651-0050 (Exp 09/20/2020)

Response to Office Action


To the Commissioner for Trademarks:

Application serial no. 88345794 IRONNINE(Standard Characters, see http://uspto.report/TM/88345794/mark.png) has been amended as follows:

CLASSIFICATION AND LISTING OF GOODS/SERVICES

Applicant proposes to amend the following class of goods/services in the application:
Current: Class 042 for Consulting services in the field of Cyber Security and Privacy ; Consulting services online training software in the fields of cybersecurity, education, technology, legal compliance, ethics, business, background investigation, information technology skills and certification; Consulting services in the fields of policy, procedures and regulatory development; namely, reviewing standards and practices to assure compliance with laws and regulations; Computer security consultancy in the nature of advanced cybersecurity services featuring the application of techniques, tools and expertise to detect and remediate advanced persistent threats and insider threats and include offensive cyber capabilities; threat analysis for protecting data, administering digital certificates, scanning and penetration testing of computers and networks to assess information security vulnerability, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials. Computer security consultancy in the fields of identity and access management software solutions, electronic signature verification services using technology to authenticate user identity solutions, multi-factor authentication, issuance and validation of digital certificates, public key infrastructure (PKI), security operating center tools, namely, security information and event management, endpoint protection, intrusion detection, compliance management, treat intelligence, incident investigation, SOC automation, enterprise mobility management, mobile device management and API gateways; Encryption, decryption and authentication of data; Computer server hosting services, namely, creating online virtual desktop environments through use of hosted computer hardware and computer software resources for secure remote encrypted access to mission applications and information; Data migration services; Installation and maintenance of computer software; Information technology consulting services; Computer network, and information technology systems security and mobile device security consultancy
Original Filing Basis:
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.

Proposed:
Tracked Text Description: Consulting services in the field of Cyber Security and Privacy; Consulting services in the field of computer cyber security; Consulting services online training software in the fields of cybersecurity, education, technology, legal compliance, ethics, business, background investigation, information technology skills and certification; Providing online non-downloadable training software for {Information Technology computer, Network and security Certification Training and practice test} in the fields of computer cybersecurity, computer education, information technology, computer cybersecurity legal compliance, computer ethics, business computer information security, computer technology for performing background investigations, information technology skills, and information technology certification; Consulting services in the fields of policy, procedures and regulatory development; Consulting services in the fields of {Information Technology design, installation and security, Policy, procedure, Laws, Regulations implementation and compliance } procedures; namely, reviewing standards and practices to assure compliance with laws and regulations; Computer security consultancy in the nature of advanced cybersecurity to detect and remediate advanced persistent threats and insider threats and include offensive cyber capabilities; Computer security consultancy in the nature of advanced cybersecurity services featuring the application of techniques, tools and expertise to detect and remediate advanced persistent threats and insider threats and include offensive cyber capabilities; Computer security threat analysis for protecting data; threat analysis for protecting data, administering digital certificates, scanning and penetration testing of computers and networks to assess information security vulnerability, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials. Computer security consultancy in the fields of identity and access management software solutions, electronic signature verification services using technology to authenticate user identity solutions, multi-factor authentication, issuance and validation of digital certificates, public key infrastructure (PKI), security operating center tools, namely, security information and event management, endpoint protection, intrusion detection, compliance management, treat intelligence, incident investigation, SOC automation, enterprise mobility management, mobile device management and API gateways; Computer security services in the nature of administering digital certificates; Encryption, decryption and authentication of data; Encryption and decryption of data; Computer server hosting services, namely, creating online virtual desktop environments through use of hosted computer hardware and computer software resources for secure remote encrypted access to mission applications and information; Authentication of data, namely, of digital certificates; Scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security consultancy in the fields of identity and access management software solutions; Computer network, and information technology systems security and mobile device security consultancy; Electronic signature verification services using technology to authenticate user identity through multi-factor authentication, issuance and validation of digital certificates, public key infrastructure (PKI), and security operating center tools; Computer server hosting services, namely, hosting online virtual desktop environments through use of hosted computer hardware and computer software resources for secure remote encrypted access to mission applications and information; Data migration services; Installation and maintenance of computer software; Information technology consulting services; Computer network security, information technology systems security, and mobile device software security consultancyClass 042 for Consulting services in the field of computer cyber security; Providing online non-downloadable training software for {Information Technology computer, Network and security Certification Training and practice test} in the fields of computer cybersecurity, computer education, information technology, computer cybersecurity legal compliance, computer ethics, business computer information security, computer technology for performing background investigations, information technology skills, and information technology certification; Consulting services in the fields of {Information Technology design, installation and security, Policy, procedure, Laws, Regulations implementation and compliance } procedures; Computer security consultancy in the nature of advanced cybersecurity to detect and remediate advanced persistent threats and insider threats and include offensive cyber capabilities; Computer security threat analysis for protecting data; Computer security services in the nature of administering digital certificates; Encryption and decryption of data; Authentication of data, namely, of digital certificates; Scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security consultancy in the fields of identity and access management software solutions; Electronic signature verification services using technology to authenticate user identity through multi-factor authentication, issuance and validation of digital certificates, public key infrastructure (PKI), and security operating center tools; Computer server hosting services, namely, hosting online virtual desktop environments through use of hosted computer hardware and computer software resources for secure remote encrypted access to mission applications and information; Data migration services; Installation and maintenance of computer software; Information technology consulting services; Computer network security, information technology systems security, and mobile device software security consultancy
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.

Applicant hereby adds the following class of goods/services to the application:
New: Class 045 for Consulting services in the field of computer privacy laws; Consulting services in the field of regulatory development, namely, reviewing standards and practices to assure compliance with {NIST, ISO, SCF, PCI DSS, COBIT 5, ENISA, FISMA, FedRAMP, OWASP, PCI, DoD, NAVY, ARMY, Risk Management Framework (RMF), OMB M-19-03, HIPAA, OMB, Homeland Security Act, Gramm-Leach Bliley Act, PII, PIA, FIPS, NSTISSP, NASA, FAR, CFAA,} laws and regulations; Reviewing information technology standards and practices to assure compliance with laws and regulations
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.

FEE(S)
Fee(s) in the amount of $275 is being submitted.

SIGNATURE(S)
Declaration Signature

DECLARATION: The signatory being warned that willful false statements and the like are punishable by fine or imprisonment, or both, under 18 U.S.C. § 1001, and that such willful false statements and the like may jeopardize the validity of the application or submission or any registration resulting therefrom, declares that, if the applicant submitted the application or allegation of use (AOU) unsigned, all statements in the application or AOU and this submission based on the signatory's own knowledge are true, and all statements in the application or AOU and this submission made on information and belief are believed to be true.

STATEMENTS FOR UNSIGNED SECTION 1(a) APPLICATION/AOU: If the applicant filed an unsigned application under 15 U.S.C. §1051(a) or AOU under 15 U.S.C. §1051(c), the signatory additionally believes that: the applicant is the owner of the mark sought to be registered; the mark is in use in commerce and was in use in commerce as of the filing date of the application or AOU on or in connection with the goods/services/collective membership organization in the application or AOU; the original specimen(s), if applicable, shows the mark in use in commerce as of the filing date of the application or AOU on or in connection with the goods/services/collective membership organization in the application or AOU; for a collective trademark, collective service mark, collective membership mark application, or certification mark application, the applicant is exercising legitimate control over the use of the mark in commerce and was exercising legitimate control over the use of the mark in commerce as of the filing date of the application or AOU; for a certification mark application, the applicant is not engaged in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant. To the best of the signatory's knowledge and belief, no other persons, except, if applicable, authorized users, members, and/or concurrent users, have the right to use the mark in commerce, either in the identical form or in such near resemblance as to be likely, when used on or in connection with the goods/services/collective membership organization of such other persons, to cause confusion or mistake, or to deceive.

STATEMENTS FOR UNSIGNED SECTION 1(b)/SECTION 44 APPLICATION AND FOR SECTION 66(a) COLLECTIVE/CERTIFICATION MARK APPLICATION: If the applicant filed an unsigned application under 15 U.S.C. §§ 1051(b), 1126(d), and/or 1126(e), or filed a collective/certification mark application under 15 U.S.C. §1141f(a), the signatory additionally believes that: for a trademark or service mark application, the applicant is entitled to use the mark in commerce on or in connection with the goods/services specified in the application; the applicant has a bona fide intention to use the mark in commerce and had a bona fide intention to use the mark in commerce as of the application filing date; for a collective trademark, collective service mark, collective membership mark, or certification mark application, the applicant has a bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce and had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce as of the application filing date; the signatory is properly authorized to execute the declaration on behalf of the applicant; for a certification mark application, the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant. To the best of the signatory's knowledge and belief, no other persons, except, if applicable, authorized users, members, and/or concurrent users, have the right to use the mark in commerce, either in the identical form or in such near resemblance as to be likely, when used on or in connection with the goods/services/collective membership organization of such other persons, to cause confusion or mistake, or to deceive.



Signature: /David Simpson/      Date: 08/16/2019
Signatory's Name: David Simpson
Signatory's Position: Owner
Signatory's Phone Number: 5408990551


Response Signature
Signature: /David Simpson/     Date: 08/16/2019
Signatory's Name: David Simpson
Signatory's Position: Owner

Signatory's Phone Number: 5404082982

The signatory has confirmed that he/she is not represented by an authorized attorney, and that he/she is either: (1) the owner/holder ; or (2) a person or persons with legal authority to bind the owner/holder; and if he/she had previously been represented by an attorney in this matter, either he/she revoked their power of attorney by filing a signed revocation with the USPTO or the USPTO has granted this attorney's withdrawal request.

        
RAM Sale Number: 88345794
RAM Accounting Date: 08/16/2019
        
Serial Number: 88345794
Internet Transmission Date: Fri Aug 16 11:29:31 EDT 2019
TEAS Stamp: USPTO/ROA-XX.XXX.XXX.XX-2019081611293193
8705-88345794-610b86feebfb15ea65be74aace
bbf9091ea4ec18e5bd84d5bf6873b53985f43e-C
C-29075658-20190816101640874403


Response to Office Action [image/jpeg]


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed