Response to Office Action

AMYNA

Amyna Systems Inc.

Response to Office Action

PTO- 1957
Approved for use through 11/30/2023. OMB 0651-0050
Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.

Response to Office Action


The table below presents the data as entered.

Input Field
Entered
SERIAL NUMBER 90067385
LAW OFFICE ASSIGNED LAW OFFICE 109
MARK SECTION
MARK mark
LITERAL ELEMENT AMYNA
STANDARD CHARACTERS YES
USPTO-GENERATED IMAGE YES
MARK STATEMENT The mark consists of standard characters, without claim to any particular font style, size or color.
GOODS AND/OR SERVICES SECTION (009) (current)
INTERNATIONAL CLASS 009
DESCRIPTION
Hubs; modems; network switches; repeaters; routers, switches; wireless access points; embedded and standalone network devices and infrastructure; computer hardware; computer network interface cards; computer network adapters; computer servers; communications servers; computer hardware including network and computer security functionality, including firewalls; data encryption, and interoperability with network security protocols; downloadable cloud-computing software for deploying virtual machines to a cloud computing platform, managing virtual machines on a cloud computing platform; downloadable software for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable software for use in data centers for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable podcasts in the fields of cybersecurity, information security and risk assessment
FILING BASIS Section 1(b)
GOODS AND/OR SERVICES SECTION (009) (proposed)
INTERNATIONAL CLASS 009
TRACKED TEXT DESCRIPTION
Hubs; Communication and computer network hubs; modems; network switches; computer network switches; repeaters; Ethernet repeaters; routers, switches; wireless network repeaters; wireless access points; network, wireless, and computer network routers; embedded and standalone network devices and infrastructure; ethernet and telecommunication switches; wireless access point devices; embedded and standalone computer network interface devices; computer hardware; computer network interface cards; computer network adapters; computer hardware including network and computer security functionality, including firewalls; computer servers; data encryption, and interoperability with network security protocols; communications servers; downloadable cloud-computing software for deploying virtual machines to a cloud computing platform, managing virtual machines on a cloud computing platform; computer hardware for network and computer security functionality, namely, for firewalls, data encryption, and interoperability with network security protocols; downloadable cloud-computing software for deploying virtual machines to a cloud computing platform and for managing virtual machines on a cloud computing platform; downloadable software for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable software for use in data centers for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable podcasts in the fields of cybersecurity, information security and risk assessment
FINAL DESCRIPTION
Communication and computer network hubs; modems; computer network switches; Ethernet repeaters; wireless network repeaters; network, wireless, and computer network routers; ethernet and telecommunication switches; wireless access point devices; embedded and standalone computer network interface devices; computer hardware; computer network interface cards; computer network adapters; computer servers; communications servers; computer hardware for network and computer security functionality, namely, for firewalls, data encryption, and interoperability with network security protocols; downloadable cloud-computing software for deploying virtual machines to a cloud computing platform and for managing virtual machines on a cloud computing platform; downloadable software for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable software for use in data centers for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable podcasts in the fields of cybersecurity, information security and risk assessment
        WEBPAGE URL None Provided
        WEBPAGE DATE OF ACCESS None Provided
FILING BASIS Section 1(b)
GOODS AND/OR SERVICES SECTION (041) (current)
INTERNATIONAL CLASS 041
DESCRIPTION
Continuing education services, namely, providing live and on-line continuing professional education seminars in the fields of networking, computing systems, cybersecurity, risk assessment, and information security; providing online publications in the fields of networking, computing systems, cybersecurity, risk assessment, information security; organizing events and conferences in the fields of networking, computing systems, cybersecurity, information security, and risk assessment; online journals, namely, blogs in the fields of networking, computing systems, cybersecurity, information security and risk assessment; entertainment services, namely, providing audio material, video material, and podcasts in the fields of networking, computing systems, cybersecurity, information security and risk assessment
FILING BASIS Section 1(b)
GOODS AND/OR SERVICES SECTION (041) (proposed)
INTERNATIONAL CLASS 041
TRACKED TEXT DESCRIPTION
Continuing education services, namely, providing live and on-line continuing professional education seminars in the fields of networking, computing systems, cybersecurity, risk assessment, and information security; providing online publications in the fields of networking, computing systems, cybersecurity, risk assessment, information security; providing online non-downloadable electronic publications in the nature of educational blogs, podcasts ,instructional materials, online books and magazines, and brochures presented in typographical, audio or video formats in the fields of networking, computing systems, cybersecurity, risk assessment, information security; organizing events and conferences in the fields of networking, computing systems, cybersecurity, information security, and risk assessment; Educational services, namely, organizing events and conferences in the fields of networking, computing systems, cybersecurity, information security, and risk assessment; online journals, namely, blogs in the fields of networking, computing systems, cybersecurity, information security and risk assessment; entertainment services, namely, providing audio material, video material, and podcasts in the fields of networking, computing systems, cybersecurity, information security and risk assessment; entertainment services, namely, providing online non-downloadable audio material, video material, and podcasts in the fields of networking, computing systems, cybersecurity, information security and risk assessment
FINAL DESCRIPTION
Continuing education services, namely, providing live and on-line continuing professional education seminars in the fields of networking, computing systems, cybersecurity, risk assessment, and information security; providing online non-downloadable electronic publications in the nature of educational blogs, podcasts ,instructional materials, online books and magazines, and brochures presented in typographical, audio or video formats in the fields of networking, computing systems, cybersecurity, risk assessment, information security; Educational services, namely, organizing events and conferences in the fields of networking, computing systems, cybersecurity, information security, and risk assessment; online journals, namely, blogs in the fields of networking, computing systems, cybersecurity, information security and risk assessment; entertainment services, namely, providing online non-downloadable audio material, video material, and podcasts in the fields of networking, computing systems, cybersecurity, information security and risk assessment
        WEBPAGE URL None Provided
        WEBPAGE DATE OF ACCESS None Provided
FILING BASIS Section 1(b)
GOODS AND/OR SERVICES SECTION (042) (current)
INTERNATIONAL CLASS 042
DESCRIPTION
Application service provider, namely, hosting, managing, developing and maintaining applications, software and a web site featuring a wide variety of educational topics and subjects for network-based delivery of content to global computing, mobile electronic and optical devices; consulting services in the field of infrastructure as a service (IAAS); infrastructure as a service (IAAS) featuring computer software platforms for cybersecurity; infrastructure as a service (IAAS) featuring computer software platforms for network, computer systems, and security monitoring; infrastructure as a service (IAAS) featuring computer software platforms for network, computer systems and security management; consulting services in the field of platform as a service (PAAS); platform as a service (PAAS) featuring computer software platforms for cybersecurity; platform as a service (PAAS) featuring computer software platforms for network computer systems, and security monitoring; platform as a service (PAAS) featuring computer software platforms for network, computer systems and security management; software as a service (SAAS) services featuring software for cybersecurity; consulting services in the field of software as a service (SAAS); software as a service (SAAS) services featuring software for network computer systems, and security monitoring; software as a service (SAAS) services featuring software for network, computer systems and security management; technology consultation in the fields of networks, computer systems and cybersecurity; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; testing, analysis, and evaluation of the software of others to assure compliance with information; development of customized software for others for use in risk assessment and information security; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; customer support services in the fields of computer, data, application, and network security; technical support services in the fields of computer, data, application, and network security
FILING BASIS Section 1(b)
GOODS AND/OR SERVICES SECTION (042) (proposed)
INTERNATIONAL CLASS 042
TRACKED TEXT DESCRIPTION
Application service provider, namely, hosting, managing, developing and maintaining applications, software and a web site featuring a wide variety of educational topics and subjects for network-based delivery of content to global computing, mobile electronic and optical devices; Application service provider, namely, hosting, managing, developing and maintaining applications, software and websites of others featuring a wide variety of educational topics and subjects for network-based delivery of content to global computing, mobile electronic and optical devices; consulting services in the field of infrastructure as a service (IAAS); infrastructure as a service (IAAS) featuring computer software platforms for cybersecurity; infrastructure as a service (IAAS) services, namely, hosting computer software platforms for operating virtual servers and providing services in the field of cybersecurity and networking for use by others; infrastructure as a service (IAAS) featuring computer software platforms for network, computer systems, and security monitoring; infrastructure as a service (IAAS) services, namely, hosting computer software platforms for monitoring networks, computer systems and security, for use by others; infrastructure as a service (IAAS) featuring computer software platforms for network, computer systems and security management; infrastructure as a service (IAAS) services, namely, hosting computer software platforms for network, computer systems and security management for use by others; consulting services in the field of platform as a service (PAAS); platform as a service (PAAS) featuring computer software platforms for cybersecurity; platform as a service (PAAS) featuring computer software platforms for operating virtual servers and providing services in the field of cybersecurity and networking; platform as a service (PAAS) featuring computer software platforms for network computer systems, and security monitoring; platform as a service (PAAS) featuring computer software platforms for monitoring network computer systems and security; platform as a service (PAAS) featuring computer software platforms for network, computer systems and security management; software as a service (SAAS) services featuring software for cybersecurity; software as a service (SAAS) services featuring software for operating virtual servers and providing services in the field of cybersecurity and networking; consulting services in the field of software as a service (SAAS); software as a service (SAAS) services featuring software for network computer systems, and security monitoring; software as a service (SAAS) services featuring software for monitoring network computer systems and security; software as a service (SAAS) services featuring software for network, computer systems and security management; technology consultation in the fields of networks, computer systems and cybersecurity; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; testing, analysis, and evaluation of the software of others to assure compliance with information; development of customized software for others for use in risk assessment and information security; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; customer support services in the fields of computer, data, application, and network security; customer support services, namely, troubleshooting of computer software problems in the fields of computer, data, application, and network security; technical support services in the fields of computer, data, application, and network security; technical support services, namely, providing backup computer programs and facilities in the fields of computer, data, application, and network security; technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts in the fields of computer, data, application, and network security; technical support services, namely, monitoring technological functions of computer network systems in the fields of computer, data, application, and network security
FINAL DESCRIPTION
Application service provider, namely, hosting, managing, developing and maintaining applications, software and websites of others featuring a wide variety of educational topics and subjects for network-based delivery of content to global computing, mobile electronic and optical devices; consulting services in the field of infrastructure as a service (IAAS); infrastructure as a service (IAAS) services, namely, hosting computer software platforms for operating virtual servers and providing services in the field of cybersecurity and networking for use by others; infrastructure as a service (IAAS) services, namely, hosting computer software platforms for monitoring networks, computer systems and security, for use by others; infrastructure as a service (IAAS) services, namely, hosting computer software platforms for network, computer systems and security management for use by others; consulting services in the field of platform as a service (PAAS); platform as a service (PAAS) featuring computer software platforms for operating virtual servers and providing services in the field of cybersecurity and networking; platform as a service (PAAS) featuring computer software platforms for monitoring network computer systems and security; platform as a service (PAAS) featuring computer software platforms for network, computer systems and security management; software as a service (SAAS) services featuring software for operating virtual servers and providing services in the field of cybersecurity and networking; consulting services in the field of software as a service (SAAS); software as a service (SAAS) services featuring software for monitoring network computer systems and security; software as a service (SAAS) services featuring software for network, computer systems and security management; technology consultation in the fields of networks, computer systems and cybersecurity; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; testing, analysis, and evaluation of the software of others to assure compliance with information; development of customized software for others for use in risk assessment and information security; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; customer support services, namely, troubleshooting of computer software problems in the fields of computer, data, application, and network security; technical support services, namely, providing backup computer programs and facilities in the fields of computer, data, application, and network security; technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts in the fields of computer, data, application, and network security; technical support services, namely, monitoring technological functions of computer network systems in the fields of computer, data, application, and network security
        WEBPAGE URL None Provided
        WEBPAGE DATE OF ACCESS None Provided
FILING BASIS Section 1(b)
GOODS AND/OR SERVICES SECTION (035)(class added)
INTERNATIONAL CLASS 035
DESCRIPTION
Organizing business events and business conferences in the fields of networking, computing systems, cybersecurity, information security, and risk assessment
        WEBPAGE URL None Provided
        WEBPAGE DATE OF ACCESS None Provided
FILING BASIS Section 1(b)
ADDITIONAL STATEMENTS SECTION
SIGNIFICANCE OF MARK AMYNA appearing in the mark has no significance nor is it a term of art in the relevant trade or industry or as used in connection with the goods/services/collective membership organization listed in the application, or any geographical significance.
CORRESPONDENCE INFORMATION (current)
NAME AMY B. GOLDSMITH
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE tmdocket@tarterkrinsky.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) agoldsmith@tarterkrinsky.com
DOCKET/REFERENCE NUMBER 85850-4
CORRESPONDENCE INFORMATION (proposed)
NAME Amy B. Goldsmith
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE tmdocket@tarterkrinsky.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) agoldsmith@tarterkrinsky.com
DOCKET/REFERENCE NUMBER 85850-4
PAYMENT SECTION
APPLICATION FOR REGISTRATION PER CLASS 350
NUMBER OF CLASSES 1
TOTAL FEES DUE 350
SIGNATURE SECTION
DECLARATION SIGNATURE /Amy B Goldsmith/
SIGNATORY'S NAME Amy B. Goldsmith
SIGNATORY'S POSITION Attorney of Record, New York Bar Member
SIGNATORY'S PHONE NUMBER 2122168000
DATE SIGNED 01/11/2021
SIGNATURE METHOD Sent to third party for signature
RESPONSE SIGNATURE /Amy B Goldsmith/
SIGNATORY'S NAME Amy B. Goldsmith
SIGNATORY'S POSITION Attorney of Record, New York Bar member
SIGNATORY'S PHONE NUMBER 2122168000
DATE SIGNED 01/11/2021
ROLE OF AUTHORIZED SIGNATORY Authorized U.S.-Licensed Attorney
SIGNATURE METHOD Signed directly within the form
FILING INFORMATION SECTION
SUBMIT DATE Mon Jan 11 13:38:06 ET 2021
TEAS STAMP USPTO/ROA-XXX.XXX.XXX.XXX
-20210111133806904585-900
67385-76053b32f8988a84124
8d157d0298726e7a1e88efeab
a479d7f13f1f42712d3cd-DA-
38067521-2021011113085543
1080



PTO- 1957
Approved for use through 11/30/2023. OMB 0651-0050
Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.

Response to Office Action


To the Commissioner for Trademarks:

Application serial no. 90067385 AMYNA(Standard Characters, see http://uspto.report/TM/90067385/mark.png) has been amended as follows:

CLASSIFICATION AND LISTING OF GOODS/SERVICES

Applicant proposes to amend the following:

Current:
Class 009 for Hubs; modems; network switches; repeaters; routers, switches; wireless access points; embedded and standalone network devices and infrastructure; computer hardware; computer network interface cards; computer network adapters; computer servers; communications servers; computer hardware including network and computer security functionality, including firewalls; data encryption, and interoperability with network security protocols; downloadable cloud-computing software for deploying virtual machines to a cloud computing platform, managing virtual machines on a cloud computing platform; downloadable software for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable software for use in data centers for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable podcasts in the fields of cybersecurity, information security and risk assessment
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.


Proposed:

Tracked Text Description: Hubs; Communication and computer network hubs; modems; network switches; computer network switches; repeaters; Ethernet repeaters; routers, switches; wireless network repeaters; wireless access points; network, wireless, and computer network routers; embedded and standalone network devices and infrastructure; ethernet and telecommunication switches; wireless access point devices; embedded and standalone computer network interface devices; computer hardware; computer network interface cards; computer network adapters; computer hardware including network and computer security functionality, including firewalls; computer servers; data encryption, and interoperability with network security protocols; communications servers; downloadable cloud-computing software for deploying virtual machines to a cloud computing platform, managing virtual machines on a cloud computing platform; computer hardware for network and computer security functionality, namely, for firewalls, data encryption, and interoperability with network security protocols; downloadable cloud-computing software for deploying virtual machines to a cloud computing platform and for managing virtual machines on a cloud computing platform; downloadable software for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable software for use in data centers for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable podcasts in the fields of cybersecurity, information security and risk assessmentClass 009 for Communication and computer network hubs; modems; computer network switches; Ethernet repeaters; wireless network repeaters; network, wireless, and computer network routers; ethernet and telecommunication switches; wireless access point devices; embedded and standalone computer network interface devices; computer hardware; computer network interface cards; computer network adapters; computer servers; communications servers; computer hardware for network and computer security functionality, namely, for firewalls, data encryption, and interoperability with network security protocols; downloadable cloud-computing software for deploying virtual machines to a cloud computing platform and for managing virtual machines on a cloud computing platform; downloadable software for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable software for use in data centers for administration of computer networks, network automation, network optimization, network management, network configuration, and deployment of software applications over networks; downloadable podcasts in the fields of cybersecurity, information security and risk assessment
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.

Webpage URL: None Provided
Webpage Date of Access: None Provided


Applicant proposes to amend the following:

Current:
Class 041 for Continuing education services, namely, providing live and on-line continuing professional education seminars in the fields of networking, computing systems, cybersecurity, risk assessment, and information security; providing online publications in the fields of networking, computing systems, cybersecurity, risk assessment, information security; organizing events and conferences in the fields of networking, computing systems, cybersecurity, information security, and risk assessment; online journals, namely, blogs in the fields of networking, computing systems, cybersecurity, information security and risk assessment; entertainment services, namely, providing audio material, video material, and podcasts in the fields of networking, computing systems, cybersecurity, information security and risk assessment
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.


Proposed:

Tracked Text Description: Continuing education services, namely, providing live and on-line continuing professional education seminars in the fields of networking, computing systems, cybersecurity, risk assessment, and information security; providing online publications in the fields of networking, computing systems, cybersecurity, risk assessment, information security; providing online non-downloadable electronic publications in the nature of educational blogs, podcasts ,instructional materials, online books and magazines, and brochures presented in typographical, audio or video formats in the fields of networking, computing systems, cybersecurity, risk assessment, information security; organizing events and conferences in the fields of networking, computing systems, cybersecurity, information security, and risk assessment; Educational services, namely, organizing events and conferences in the fields of networking, computing systems, cybersecurity, information security, and risk assessment; online journals, namely, blogs in the fields of networking, computing systems, cybersecurity, information security and risk assessment; entertainment services, namely, providing audio material, video material, and podcasts in the fields of networking, computing systems, cybersecurity, information security and risk assessment; entertainment services, namely, providing online non-downloadable audio material, video material, and podcasts in the fields of networking, computing systems, cybersecurity, information security and risk assessmentClass 041 for Continuing education services, namely, providing live and on-line continuing professional education seminars in the fields of networking, computing systems, cybersecurity, risk assessment, and information security; providing online non-downloadable electronic publications in the nature of educational blogs, podcasts ,instructional materials, online books and magazines, and brochures presented in typographical, audio or video formats in the fields of networking, computing systems, cybersecurity, risk assessment, information security; Educational services, namely, organizing events and conferences in the fields of networking, computing systems, cybersecurity, information security, and risk assessment; online journals, namely, blogs in the fields of networking, computing systems, cybersecurity, information security and risk assessment; entertainment services, namely, providing online non-downloadable audio material, video material, and podcasts in the fields of networking, computing systems, cybersecurity, information security and risk assessment
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.

Webpage URL: None Provided
Webpage Date of Access: None Provided


Applicant proposes to amend the following:

Current:
Class 042 for Application service provider, namely, hosting, managing, developing and maintaining applications, software and a web site featuring a wide variety of educational topics and subjects for network-based delivery of content to global computing, mobile electronic and optical devices; consulting services in the field of infrastructure as a service (IAAS); infrastructure as a service (IAAS) featuring computer software platforms for cybersecurity; infrastructure as a service (IAAS) featuring computer software platforms for network, computer systems, and security monitoring; infrastructure as a service (IAAS) featuring computer software platforms for network, computer systems and security management; consulting services in the field of platform as a service (PAAS); platform as a service (PAAS) featuring computer software platforms for cybersecurity; platform as a service (PAAS) featuring computer software platforms for network computer systems, and security monitoring; platform as a service (PAAS) featuring computer software platforms for network, computer systems and security management; software as a service (SAAS) services featuring software for cybersecurity; consulting services in the field of software as a service (SAAS); software as a service (SAAS) services featuring software for network computer systems, and security monitoring; software as a service (SAAS) services featuring software for network, computer systems and security management; technology consultation in the fields of networks, computer systems and cybersecurity; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; testing, analysis, and evaluation of the software of others to assure compliance with information; development of customized software for others for use in risk assessment and information security; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; customer support services in the fields of computer, data, application, and network security; technical support services in the fields of computer, data, application, and network security
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.


Proposed:

Tracked Text Description: Application service provider, namely, hosting, managing, developing and maintaining applications, software and a web site featuring a wide variety of educational topics and subjects for network-based delivery of content to global computing, mobile electronic and optical devices; Application service provider, namely, hosting, managing, developing and maintaining applications, software and websites of others featuring a wide variety of educational topics and subjects for network-based delivery of content to global computing, mobile electronic and optical devices; consulting services in the field of infrastructure as a service (IAAS); infrastructure as a service (IAAS) featuring computer software platforms for cybersecurity; infrastructure as a service (IAAS) services, namely, hosting computer software platforms for operating virtual servers and providing services in the field of cybersecurity and networking for use by others; infrastructure as a service (IAAS) featuring computer software platforms for network, computer systems, and security monitoring; infrastructure as a service (IAAS) services, namely, hosting computer software platforms for monitoring networks, computer systems and security, for use by others; infrastructure as a service (IAAS) featuring computer software platforms for network, computer systems and security management; infrastructure as a service (IAAS) services, namely, hosting computer software platforms for network, computer systems and security management for use by others; consulting services in the field of platform as a service (PAAS); platform as a service (PAAS) featuring computer software platforms for cybersecurity; platform as a service (PAAS) featuring computer software platforms for operating virtual servers and providing services in the field of cybersecurity and networking; platform as a service (PAAS) featuring computer software platforms for network computer systems, and security monitoring; platform as a service (PAAS) featuring computer software platforms for monitoring network computer systems and security; platform as a service (PAAS) featuring computer software platforms for network, computer systems and security management; software as a service (SAAS) services featuring software for cybersecurity; software as a service (SAAS) services featuring software for operating virtual servers and providing services in the field of cybersecurity and networking; consulting services in the field of software as a service (SAAS); software as a service (SAAS) services featuring software for network computer systems, and security monitoring; software as a service (SAAS) services featuring software for monitoring network computer systems and security; software as a service (SAAS) services featuring software for network, computer systems and security management; technology consultation in the fields of networks, computer systems and cybersecurity; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; testing, analysis, and evaluation of the software of others to assure compliance with information; development of customized software for others for use in risk assessment and information security; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; customer support services in the fields of computer, data, application, and network security; customer support services, namely, troubleshooting of computer software problems in the fields of computer, data, application, and network security; technical support services in the fields of computer, data, application, and network security; technical support services, namely, providing backup computer programs and facilities in the fields of computer, data, application, and network security; technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts in the fields of computer, data, application, and network security; technical support services, namely, monitoring technological functions of computer network systems in the fields of computer, data, application, and network securityClass 042 for Application service provider, namely, hosting, managing, developing and maintaining applications, software and websites of others featuring a wide variety of educational topics and subjects for network-based delivery of content to global computing, mobile electronic and optical devices; consulting services in the field of infrastructure as a service (IAAS); infrastructure as a service (IAAS) services, namely, hosting computer software platforms for operating virtual servers and providing services in the field of cybersecurity and networking for use by others; infrastructure as a service (IAAS) services, namely, hosting computer software platforms for monitoring networks, computer systems and security, for use by others; infrastructure as a service (IAAS) services, namely, hosting computer software platforms for network, computer systems and security management for use by others; consulting services in the field of platform as a service (PAAS); platform as a service (PAAS) featuring computer software platforms for operating virtual servers and providing services in the field of cybersecurity and networking; platform as a service (PAAS) featuring computer software platforms for monitoring network computer systems and security; platform as a service (PAAS) featuring computer software platforms for network, computer systems and security management; software as a service (SAAS) services featuring software for operating virtual servers and providing services in the field of cybersecurity and networking; consulting services in the field of software as a service (SAAS); software as a service (SAAS) services featuring software for monitoring network computer systems and security; software as a service (SAAS) services featuring software for network, computer systems and security management; technology consultation in the fields of networks, computer systems and cybersecurity; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; testing, analysis, and evaluation of the software of others to assure compliance with information; development of customized software for others for use in risk assessment and information security; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; customer support services, namely, troubleshooting of computer software problems in the fields of computer, data, application, and network security; technical support services, namely, providing backup computer programs and facilities in the fields of computer, data, application, and network security; technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts in the fields of computer, data, application, and network security; technical support services, namely, monitoring technological functions of computer network systems in the fields of computer, data, application, and network security
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.

Webpage URL: None Provided
Webpage Date of Access: None Provided


Applicant hereby adds the following class of goods/services to the application:
New: Class 035 for Organizing business events and business conferences in the fields of networking, computing systems, cybersecurity, information security, and risk assessment
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.

Webpage URL: None Provided
Webpage Date of Access: None Provided


ADDITIONAL STATEMENTS
Significance of wording, letter(s), or numeral(s)
AMYNA appearing in the mark has no significance nor is it a term of art in the relevant trade or industry or as used in connection with the goods/services/collective membership organization listed in the application, or any geographical significance.

Correspondence Information (current):
      AMY B. GOLDSMITH
      PRIMARY EMAIL FOR CORRESPONDENCE: tmdocket@tarterkrinsky.com
      SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): agoldsmith@tarterkrinsky.com

The docket/reference number is 85850-4.
Correspondence Information (proposed):
      Amy B. Goldsmith
      PRIMARY EMAIL FOR CORRESPONDENCE: tmdocket@tarterkrinsky.com
      SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): agoldsmith@tarterkrinsky.com

The docket/reference number is 85850-4.

Requirement for Email and Electronic Filing: I understand that a valid email address must be maintained by the owner/holder and the owner's/holder's attorney, if appointed, and that all official trademark correspondence must be submitted via the Trademark Electronic Application System (TEAS).

FEE(S)
Fee(s) in the amount of $350 is being submitted.

SIGNATURE(S)
Declaration Signature

DECLARATION: The signatory being warned that willful false statements and the like are punishable by fine or imprisonment, or both, under 18 U.S.C. § 1001, and that such willful false statements and the like may jeopardize the validity of the application or submission or any registration resulting therefrom, declares that, if the applicant submitted the application or allegation of use (AOU) unsigned, all statements in the application or AOU and this submission based on the signatory's own knowledge are true, and all statements in the application or AOU and this submission made on information and belief are believed to be true.

STATEMENTS FOR UNSIGNED SECTION 1(a) APPLICATION/AOU: If the applicant filed an unsigned application under 15 U.S.C. §1051(a) or AOU under 15 U.S.C. §1051(c), the signatory additionally believes that: the applicant is the owner of the mark sought to be registered; the mark is in use in commerce and was in use in commerce as of the filing date of the application or AOU on or in connection with the goods/services/collective membership organization in the application or AOU; the original specimen(s), if applicable, shows the mark in use in commerce as of the filing date of the application or AOU on or in connection with the goods/services/collective membership organization in the application or AOU; for a collective trademark, collective service mark, collective membership mark application, or certification mark application, the applicant is exercising legitimate control over the use of the mark in commerce and was exercising legitimate control over the use of the mark in commerce as of the filing date of the application or AOU; for a certification mark application, the applicant is not engaged in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant. To the best of the signatory's knowledge and belief, no other persons, except, if applicable, authorized users, members, and/or concurrent users, have the right to use the mark in commerce, either in the identical form or in such near resemblance as to be likely, when used on or in connection with the goods/services/collective membership organization of such other persons, to cause confusion or mistake, or to deceive.

STATEMENTS FOR UNSIGNED SECTION 1(b)/SECTION 44 APPLICATION AND FOR SECTION 66(a) COLLECTIVE/CERTIFICATION MARK APPLICATION: If the applicant filed an unsigned application under 15 U.S.C. §§ 1051(b), 1126(d), and/or 1126(e), or filed a collective/certification mark application under 15 U.S.C. §1141f(a), the signatory additionally believes that: for a trademark or service mark application, the applicant is entitled to use the mark in commerce on or in connection with the goods/services specified in the application; the applicant has a bona fide intention to use the mark in commerce and had a bona fide intention to use the mark in commerce as of the application filing date; for a collective trademark, collective service mark, collective membership mark, or certification mark application, the applicant has a bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce and had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce as of the application filing date; the signatory is properly authorized to execute the declaration on behalf of the applicant; for a certification mark application, the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant. To the best of the signatory's knowledge and belief, no other persons, except, if applicable, authorized users, members, and/or concurrent users, have the right to use the mark in commerce, either in the identical form or in such near resemblance as to be likely, when used on or in connection with the goods/services/collective membership organization of such other persons, to cause confusion or mistake, or to deceive.



Signature: /Amy B Goldsmith/      Date: 01/11/2021
Signatory's Name: Amy B. Goldsmith
Signatory's Position: Attorney of Record, New York Bar Member
Signatory's Phone Number: 2122168000

Signature method: Sent to third party for signature

Response Signature
Signature: /Amy B Goldsmith/     Date: 01/11/2021
Signatory's Name: Amy B. Goldsmith
Signatory's Position: Attorney of Record, New York Bar member

Signatory's Phone Number: 2122168000 Signature method: Signed directly within the form

The signatory has confirmed that he/she is a U.S.-licensed attorney who is an active member in good standing of the bar of the highest court of a U.S. state (including the District of Columbia and any U.S. Commonwealth or territory); and he/she is currently the owner's/holder's attorney or an associate thereof; and to the best of his/her knowledge, if prior to his/her appointment another U.S.-licensed attorney not currently associated with his/her company/firm previously represented the owner/holder in this matter: the owner/holder has revoked their power of attorney by a signed revocation or substitute power of attorney with the USPTO; the USPTO has granted that attorney's withdrawal request; the owner/holder has filed a power of attorney appointing him/her in this matter; or the owner's/holder's appointed U.S.-licensed attorney has filed a power of attorney appointing him/her as an associate attorney in this matter.

Mailing Address:    AMY B. GOLDSMITH
   TARTER KRINSKY & DROGIN LLP
   
   1350 BROADWAY, 11TH FLOOR
   NEW YORK, New York 10018
Mailing Address:    Amy B. Goldsmith
   TARTER KRINSKY & DROGIN LLP
   1350 BROADWAY, 11TH FLOOR
   NEW YORK, New York 10018
        
PAYMENT: 90067385
PAYMENT DATE: 01/11/2021
        
Serial Number: 90067385
Internet Transmission Date: Mon Jan 11 13:38:06 ET 2021
TEAS Stamp: USPTO/ROA-XXX.XXX.XXX.XXX-20210111133806
904585-90067385-76053b32f8988a841248d157
d0298726e7a1e88efeaba479d7f13f1f42712d3c
d-DA-38067521-20210111130855431080


Response to Office Action [image/jpeg]


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed