Mark For: AZTS® trademark registration is intended to cover the categories of (Based on Use in Commerce) administering and maintaining databases and virtual computing environments for others, namely, development, updating and maintenance of software and database systems, technical support services in the nature of diagnosing computer hardware and software problems, and providing virtual computer systems and virtual computer environments through cloud computing; technical support services in the nature of installation, administration, and troubleshooting of web and database applications; application service provider (ASP), namely, hosting computer software applications and maintenance of online databases of others, electronic storage services for archiving databases, and rental of a database server to third parties; cloud computing featuring software for use in providing virtual computer environments for software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) and desktop-as-a-service (DaaS) functions; cloud hosting of electronic databases and virtual computing environments, namely, cloud hosting provider services; cloud-based network services providing network connectivity and management, security, continuity and productivity enhancements, namely, network analysis, computer network design, wireless engineering, virtualization, computer project management, computer network configuration services, technical support services in the nature of diagnosing computer hardware and software problems, and computer security services, namely, restricting unauthorized access to hard drives, computer networks and websites; computer security services, namely, identification of cyber threats through multi-source threat intelligence and analysis, development of mitigation strategies to minimize risk of computer system infection and data exfiltration, remote configuration of pre-integrated security tools to protect computer software and electronic data from computer viruses and cyber security threats, and infrastructure and security tool notification and configuration to return infrastructure to compliant state, all of the foregoing being in the nature of computer security consultancy relating to computer data, programming, equipment and software; cloud computing featuring software for computer services, namely, providing desktop-as-a-service (DaaS) and virtual servers to others; Technology consulting and providing technological information in the fields of information technology, cloud computing, web services, software, software-as-a-service (SaaS), data processing and analytics, data storage, data warehousing, data archiving, data and information security, networking, mobile computing, and the Internet of Things (IoT); hosting the software, websites and other computer applications of others on a virtual private server; IT security services, namely, IT security risk assessments, network vulnerability assessments and testing to assess information security vulnerability, penetration testing of computers to assess information security vulnerability, network architecture review and design, regulatory and compliance assistance for quality control purposes, policy and procedure review in the nature of computer security consultancy, Service Organization Controls (SOC) cybersecurity technological reports, and Payment Card Industry (PCI) compliance testing, assessment and planning to assure compliance with industry standards, all of the foregoing in the nature of computer security consultancy; providing virtual computer systems and virtual computer environments through cloud computing; software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) and desktop-as-a-service (DaaS) featuring computer software for managing virtual desktop environments, data storage and backup, database management, cloud computing, accounting and bookkeeping, data protection and security, monitoring cloud and application performance, cloud infrastructure management and automation, virtualization, networking, user authentication, Software Defined Networking (SDN), remote access, remote support, data sharing, and data, desktop and application streaming; software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) and desktop-as-a-service (DaaS) featuring computer software platforms for the protection and defense against and response to data, computer network, and cyber breaches, threats, and invasions, and related technical support in the nature of help desk services for IT infrastructure, operating systems, database systems, and web applications; technical consulting, computer system analysis, technical advice, help desk services support, and managed computer security consultancy services in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, and network architecture, all of the foregoing in the nature of consulting in the field of information technology and internet security; computer services, namely, remote management of the information technology (IT) systems of others; planning, design and management of information technology systems; providing virtual IT support staff services for businesses, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications. [all]
Status
2020-04-11 UTC
LIVE APPLICATION Under Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and that this application has been assigned to an examiner.
(Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed Use
Yes
Current Use
Yes
Intent To Use
Yes
Filed ITU
No
44D Filed
No
44E Current
No
66A Current
No
Current Basis
No
No Basis
No
Attorney Name
Robert C. Griffin
Attorney Docket Number
011314-012
Law Office Assigned
N20
Employee Name
YOO, JEANE
Timeline
2017-10-29
Date of First Use
2017-10-29
Date of Use In Commerce
2019-06-13
Application Filed
2019-08-15
Location: TMO LAW OFFICE 120 - EXAMINING ATTORNEY ASSIGNED
ROBERT C. GRIFFIN CROWLEY FLECK PLLP 490 N. 31ST STREET BILLINGS, MT 59101
Good, Services, and Codes
IC 035. US 100 101 102. G & S: (Based on Use in Commerce) Retail store services featuring computer software and hardware; disaster recovery services, namely, business planning and business continuity consulting. FIRST USE: 20171029. FIRST USE IN COMMERCE: 20171029 IC 041. US 100 101 107. G & S: (Based on Intent to Use) Training in the field of information security IC 042. US 100 101. G & S: (Based on Use in Commerce) administering and maintaining databases and virtual computing environments for others, namely, development, updating and maintenance of software and database systems, technical support services in the nature of diagnosing computer hardware and software problems, and providing virtual computer systems and virtual computer environments through cloud computing; technical support services in the nature of installation, administration, and troubleshooting of web and database applications; application service provider (ASP), namely, hosting computer software applications and maintenance of online databases of others, electronic storage services for archiving databases, and rental of a database server to third parties; cloud computing featuring software for use in providing virtual computer environments for software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) and desktop-as-a-service (DaaS) functions; cloud hosting of electronic databases and virtual computing environments, namely, cloud hosting provider services; cloud-based network services providing network connectivity and management, security, continuity and productivity enhancements, namely, network analysis, computer network design, wireless engineering, virtualization, computer project management, computer network configuration services, technical support services in the nature of diagnosing computer hardware and software problems, and computer security services, namely, restricting unauthorized access to hard drives, computer networks and websites; computer security services, namely, identification of cyber threats through multi-source threat intelligence and analysis, development of mitigation strategies to minimize risk of computer system infection and data exfiltration, remote configuration of pre-integrated security tools to protect computer software and electronic data from computer viruses and cyber security threats, and infrastructure and security tool notification and configuration to return infrastructure to compliant state, all of the foregoing being in the nature of computer security consultancy relating to computer data, programming, equipment and software; cloud computing featuring software for computer services, namely, providing desktop-as-a-service (DaaS) and virtual servers to others; Technology consulting and providing technological information in the fields of information technology, cloud computing, web services, software, software-as-a-service (SaaS), data processing and analytics, data storage, data warehousing, data archiving, data and information security, networking, mobile computing, and the Internet of Things (IoT); hosting the software, websites and other computer applications of others on a virtual private server; IT security services, namely, IT security risk assessments, network vulnerability assessments and testing to assess information security vulnerability, penetration testing of computers to assess information security vulnerability, network architecture review and design, regulatory and compliance assistance for quality control purposes, policy and procedure review in the nature of computer security consultancy, Service Organization Controls (SOC) cybersecurity technological reports, and Payment Card Industry (PCI) compliance testing, assessment and planning to assure compliance with industry standards, all of the foregoing in the nature of computer security consultancy; providing virtual computer systems and virtual computer environments through cloud computing; software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) and desktop-as-a-service (DaaS) featuring computer software for managing virtual desktop environments, data storage and backup, database management, cloud computing, accounting and bookkeeping, data protection and security, monitoring cloud and application performance, cloud infrastructure management and automation, virtualization, networking, user authentication, Software Defined Networking (SDN), remote access, remote support, data sharing, and data, desktop and application streaming; software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) and desktop-as-a-service (DaaS) featuring computer software platforms for the protection and defense against and response to data, computer network, and cyber breaches, threats, and invasions, and related technical support in the nature of help desk services for IT infrastructure, operating systems, database systems, and web applications; technical consulting, computer system analysis, technical advice, help desk services support, and managed computer security consultancy services in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, and network architecture, all of the foregoing in the nature of consulting in the field of information technology and internet security; computer services, namely, remote management of the information technology (IT) systems of others; planning, design and management of information technology systems; providing virtual IT support staff services for businesses, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications. FIRST USE: 20171029. FIRST USE IN COMMERCE: 20171029
International Codes:
35
U.S. Codes:
100,101,102
International Codes:
41
U.S. Codes:
100,101,107
International Codes:
42
U.S. Codes:
100,101
Type Code
Type
GS0351
providing virtual IT support staff services for businesses; retail store services featuring computer software and hardware
GS0351
Retail store services featuring computer software and hardware; disaster recovery services, namely, business planning and business continuity consulting
Trademark Filing History
Description
Date
Proceeding Number
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
2020-04-06
6328
EXAMINERS AMENDMENT E-MAILED
2020-04-06
6328
EXAMINERS AMENDMENT -WRITTEN
2020-04-06
92577
EXAMINER'S AMENDMENT ENTERED
2020-04-06
88888
APPROVED FOR PUB - PRINCIPAL REGISTER
2020-04-06
TEAS/EMAIL CORRESPONDENCE ENTERED
2020-02-22
70138
CORRESPONDENCE RECEIVED IN LAW OFFICE
2020-02-22
70138
ASSIGNED TO LIE
2020-02-19
70138
TEAS RESPONSE TO OFFICE ACTION RECEIVED
2020-02-12
NOTIFICATION OF NON-FINAL ACTION E-MAILED
2019-08-15
6325
NON-FINAL ACTION WRITTEN
2019-08-15
92577
NON-FINAL ACTION E-MAILED
2019-08-15
6325
ASSIGNED TO EXAMINER
2019-08-08
92577
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
2019-06-26
NEW APPLICATION ENTERED IN TRAM
2019-06-17
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.