To: | F5 Networks, Inc. (officeactions@rosenlewis.com) |
Subject: | U.S. TRADEMARK APPLICATION NO. 88347183 - PRIVILEGED USER ACCESS - N/A |
Sent: | 5/28/2019 7:27:24 PM |
Sent As: | ECOM115@USPTO.GOV |
Attachments: | Attachment - 1 Attachment - 2 Attachment - 3 Attachment - 4 Attachment - 5 Attachment - 6 Attachment - 7 Attachment - 8 Attachment - 9 |
UNITED STATES PATENT AND TRADEMARK OFFICE (USPTO)
OFFICE ACTION (OFFICIAL LETTER) ABOUT APPLICANT’S TRADEMARK APPLICATION
U.S. APPLICATION SERIAL NO. 88347183
MARK: PRIVILEGED USER ACCESS
|
|
CORRESPONDENT ADDRESS: |
CLICK HERE TO RESPOND TO THIS LETTER: http://www.gov.uspto.report/trademarks/teas/response_forms.jsp
|
APPLICANT: F5 Networks, Inc.
|
|
CORRESPONDENT’S REFERENCE/DOCKET NO: CORRESPONDENT E-MAIL ADDRESS: |
|
OFFICE ACTION
TO AVOID ABANDONMENT OF APPLICANT’S TRADEMARK APPLICATION, THE USPTO MUST RECEIVE APPLICANT’S COMPLETE RESPONSE TO THIS LETTER WITHIN 6 MONTHS OF THE ISSUE/MAILING DATE BELOW. A RESPONSE TRANSMITTED THROUGH THE TRADEMARK ELECTRONIC APPLICATION SYSTEM (TEAS) MUST BE RECEIVED BEFORE MIDNIGHT EASTERN TIME OF THE LAST DAY OF THE RESPONSE PERIOD.
ISSUE/MAILING DATE: 5/28/2019
The referenced application has been reviewed by the assigned trademark examining attorney. Applicant must respond timely and completely to the issues below. 15 U.S.C. §1062(b); 37 C.F.R. §§2.62(a), 2.65(a); TMEP §§711, 718.03.
Search Results
The trademark examining attorney has searched the Office’s database of registered and pending marks and has found no conflicting marks that would bar registration under Trademark Act Section 2(d). TMEP §704.02; see 15 U.S.C. §1052(d).
Section 2(e)(1) Refusal - Merely Descriptive
However, registration is refused because the applied-for mark merely describes the purpose, function, or use of applicant’s computer software goods and services. Trademark Act Section 2(e)(1), 15 U.S.C. §1052(e)(1); see TMEP §§1209.01(b), 1209.03 et seq.
In this case, the applicant has applied to register PRIVILEGED USER ACCESS (Standard Characters) for “Computer software for managing secure application access and authentication credentials for computer networks and applications communicating across networks” in Class 9 and “Software as a service for managing secure application access and authentication credentials for computer networks and applications communicating across networks” in Class 42.
From http://blog.netwrix.com/2017/10/19/what-to-know-about-the-threat-of-privileged-users/ (copy attached):
What is a privileged user account?
A privileged user account is an account that has unlimited permissions to systems (such as cloud services or industrial control systems), user endpoints (such as PCs and mobile devices) or data (such as unstructured corporate intelligence files or customer data stored in databases).
* * *
What are the challenges in managing the accounts properly?
Who gets to have these types of privileged user accounts? Network administrators, database administrators, application developers and C-level executives are all often granted elevated privileges because they need to work directly with critical data and infrastructure.
[emphasis added].
From http://security.berkeley.edu/privileged-accounts-guidelines (copy attached):
Background and description of risk
Privileged access gives a user the ability to perform any task on a device without restriction and is necessary for the provisioning and administration of the device. For the following reasons this access should only be used for the duration of those activities that require it:
Accidental Use
Privileged access bypasses access controls, so errors made by a privileged user may have catastrophic consequences, resulting in data loss or significant downtime. For example, on a Unix system, an extra space may turn “rm –Rf /tmp/olddata” into “rm –Rf / tmp/olddata”, deleting the entire file system. Limiting the use of privileged access to only those times when that access is required reduces the likelihood of this type of error.
Malware
Many types of malware infect and spread by changing system configurations and installing new services, two activities that are generally limited to privileged users. When reading email, browsing the web, or accessing files as a privileged user, any malware a user encounters will also run as a privileged user, bypassing all access and security controls.
Besides the risk associated with unnecessary use of privilege by a user, network services that run as privileged accounts present as significant risk as well. If exploited, a vulnerability in a network service running as a privileged user will grant the attacker privileged access to the device, bypassing all access and security controls.
[emphasis added].
“Access” is “The action or process of obtaining or retrieving information stored in a computer's memory.” See the attached excerpt from http://en.oxforddictionaries.com/definition/us/access.
The wording as a whole is merely descriptive because the function, purpose, or use of the applicant’s computer software is to manage “privileged user access” to computer networks and applications communicating across networks. When descriptive terms are combined, the determination of whether the composite mark also has a descriptive significance turns upon the question of whether the combination of terms evokes a new and unique commercial impression. TMEP §1209.03(d). If each component retains its descriptive significance in relation to the goods and services, as is the case here, the combination results in a composite that is itself descriptive. Duopross Meditech Corp. v. Inviro Medical Devices, Ltd., 695 F.3d 1247, 103 USPQ2d 1753 (Fed. Cir. 2012); In re Oppedahl & Larson LLP, 373 F.3d 1171, 71 USPQ2d 1370 (Fed. Cir. 2004); In re Gould Paper Corp., 834 F.2d 1017, 1018, 5 USPQ2d 1110, 1111–1112 (Fed. Cir. 1987).
Section 1(b) Applications NOT Eligible for Registration on the Supplemental Register
If applicant files an acceptable allegation of use and also amends to the Supplemental Register, the application effective filing date will be the date applicant met the minimum filing requirements under 37 C.F.R. §2.76(c) for an amendment to allege use. TMEP §§816.02, 1102.03; see 37 C.F.R. §2.75(b). In addition, the undersigned trademark examining attorney will conduct a new search of the USPTO records for conflicting marks based on the later application filing date. TMEP §§206.01, 1102.03.
Disclaimer Advisory
Applicant may submit a disclaimer in the following format:
No claim is made to the exclusive right to use “ACCESS” apart from the mark as shown.
TMEP §1213.08(a)(i).
For an overview of disclaimers and instructions on how to satisfy this issue using the Trademark Electronic Application System (TEAS), see the Disclaimer webpage.
If applicant responds to the refusal, applicant also must respond to the requirements set forth below.
1. Class 9 Identification of Goods
a. The wording “Computer software” in International Class 9 is indefinite and too broad and must be clarified to specify whether the format is downloadable, recorded, or online non-downloadable. See 37 C.F.R. §2.32(a)(6); TMEP §§1402.03(d), 1402.11(a). Downloadable and recorded goods are in International Class 9, whereas providing their temporary, online non-downloadable use is a service in International Class 42. See TMEP §1402.03(d).
b. Effective January 1, 2019, a new version of the Nice Agreement Eleventh Edition changed the classification of certain goods and services. See Nice Classification, 11th ed., version 2019 (Nice 11-2019). Applications filed on or after January 1, 2019 must comply with this new version. See 37 C.F.R. §2.85(e)(1); TMEP §1401.09. Applications filed prior to January 1, 2019 must comply with the edition/version of the Nice Agreement in effect as of the application filing date; however, applicants of such applications can choose to comply with the new version. See 37 C.F.R. §2.85(e)(1)-(2); TMEP §1401.09. If applicant chooses to comply with the new version, the entire identification must comply with this version. See 37 C.F.R. §2.85(e)(2); TMEP §1401.09. The USPTO’s online U.S. Acceptable Identification of Goods and Services Manual provides classification information for the new version as well as information for previous editions/versions in notes to specific entries. See TMEP §1402.04.
c. Applicant may adopt the following identification of goods in International Class 9, if accurate: Recorded computer software for managing secure application access and authentication credentials for computer networks and applications communicating across networks. See TMEP §1402.01.
2. Class 42 Identification of Services
a. Applicant must clarify the identification of services by indicating that the “Software as a service” services feature “software” for performing the functions indicated. See TMEP §1402.01.
b. Applicant may adopt the following identification of services in International Class 42, if accurate: Software as a service featuring software for managing secure application access and authentication credentials for computer networks and applications communicating across networks. See TMEP §1402.01.
TEAS PLUS OR TEAS REDUCED FEE (TEAS RF) APPLICANTS – TO MAINTAIN LOWER FEE, ADDITIONAL REQUIREMENTS MUST BE MET, INCLUDING SUBMITTING DOCUMENTS ONLINE: Applicants who filed their application online using the lower-fee TEAS Plus or TEAS RF application form must (1) file certain documents online using TEAS, including responses to Office actions (see TMEP §§819.02(b), 820.02(b) for a complete list of these documents); (2) maintain a valid e-mail correspondence address; and (3) agree to receive correspondence from the USPTO by e-mail throughout the prosecution of the application. See 37 C.F.R. §§2.22(b), 2.23(b); TMEP §§819, 820. TEAS Plus or TEAS RF applicants who do not meet these requirements must submit an additional processing fee of $125 per class of goods and/or services. 37 C.F.R. §§2.6(a)(1)(v), 2.22(c), 2.23(c); TMEP §§819.04, 820.04. However, in certain situations, TEAS Plus or TEAS RF applicants may respond to an Office action by authorizing an examiner’s amendment by telephone or e-mail without incurring this additional fee.
If the applicant has any questions or needs assistance in responding to this Office action, please call the assigned examining attorney.
A prompt response to this Office action will expedite the handling of this matter.
/Barbara A. Gaynor/
Barbara A. Gaynor
Trademark Examining Attorney
Law Office 115
(571) 272-9164
Barbara.gaynor@uspto.gov
TO RESPOND TO THIS LETTER: Go to http://www.gov.uspto.report/trademarks/teas/response_forms.jsp. Please wait 48-72 hours from the issue/mailing date before using the Trademark Electronic Application System (TEAS), to allow for necessary system updates of the application. For technical assistance with online forms, e-mail TEAS@uspto.gov. For questions about the Office action itself, please contact the assigned trademark examining attorney. E-mail communications will not be accepted as responses to Office actions; therefore, do not respond to this Office action by e-mail.
All informal e-mail communications relevant to this application will be placed in the official application record.
WHO MUST SIGN THE RESPONSE: It must be personally signed by an individual applicant or someone with legal authority to bind an applicant (i.e., a corporate officer, a general partner, all joint applicants). If an applicant is represented by an attorney, the attorney must sign the response.
PERIODICALLY CHECK THE STATUS OF THE APPLICATION: To ensure that applicant does not miss crucial deadlines or official notices, check the status of the application every three to four months using the Trademark Status and Document Retrieval (TSDR) system at http://tsdr.gov.uspto.report/. Please keep a copy of the TSDR status screen. If the status shows no change for more than six months, contact the Trademark Assistance Center by e-mail at TrademarkAssistanceCenter@uspto.gov or call 1-800-786-9199. For more information on checking status, see http://www.gov.uspto.report/trademarks/process/status/.
TO UPDATE CORRESPONDENCE/E-MAIL ADDRESS: Use the TEAS form at http://www.gov.uspto.report/trademarks/teas/correspondence.jsp.