|
NOTICE OF ALLOWANCE (NOA)
ISSUE DATE: Nov 29, 2022 |
U.S. Serial Number: 90801520
Mark: SWELL
Docket/Reference Number: 83882-342966
|
No opposition was filed for this published application. The issue date of this NOA establishes the due date for the filing of
a Statement of Use (SOU) or a Request for Extension of Time to file a Statement of Use (Extension Request). WARNING: An SOU that meets all legal requirements must be filed before a registration
certificate can issue. Please read below for important information regarding the applicant's pending six (6) month deadline. |
SIX (6)-MONTH DEADLINE: Applicant has six (6) MONTHS from the NOA issue date to file either: |
- |
An SOU, if the applicant is using the mark in commerce (required even if the applicant was using the mark at the time of filing the
application, if use basis was not specified originally); OR |
- |
An Extension Request, if the applicant is not yet using the mark in commerce. If an Extension Request is filed, a new request must
be filed every six (6) months until the SOU is filed. The applicant may file a total of five (5) extension requests. WARNING: An SOU may not be filed more than thirty-six
(36) months from when the NOA issued. The deadline for filing is always calculated from the issue date of the NOA. |
How to file SOU and/or Extension Request:
Use the Trademark Electronic Application System (TEAS). Do NOT reply to this e-mail, as e-mailed filings will NOT be processed. Both the SOU and Extension Request have many
legal requirements, including fees and verified statements; therefore, please use the USPTO forms available online at http://www.gov.uspto.report/trademarks-application-process/filing-online (under the "INTENT-TO-USE (ITU) FORMS" category) to avoid the possible omission of required information.
If you have questions about this notice, please contact the Trademark Assistance Center at 1-800-786-9199. |
FAILURE TO FILE A REQUIRED DOCUMENT OUTLINED ABOVE DURING THE APPROPRIATE TIME PERIOD WILL RESULT IN THE ABANDONMENT OF THIS
APPLICATION. |
REVIEW APPLICATION INFORMATION FOR ACCURACY |
Serial Number: |
90801520
|
Mark: |
SWELL
|
Docket/Reference Number: |
83882-342966
|
Owner: |
Stairwell, Inc.
C200
883 N. Shoreline Blvd
Mountain View , CALIFORNIA 94043
|
Correspondence Address: |
David A.W. Wong
Barnes & Thornburg LLP
11 S. Meridian St
Barnes & Thornburg LLP
Indianapolis, IN 46077
|
This application has the following bases, but not necessarily for all listed goods/services: |
|
Section 1(a): NO |
Section 1(b): YES |
Section 44(e): NO |
GOODS/SERVICES BY INTERNATIONAL CLASS |
009 - |
Downloadable and recorded computer software for providing computer security; downloadable and recorded computer software for computer security risk and threat
analysis, assessment, management, remediation, and elimination; downloadable and recorded computer anti-virus software; downloadable and recorded computer software for providing anti-virus scanning,
detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers, and
electronic devices; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware,
systems, servers, data, and electronic devices; downloadable and recorded computer software in the nature of cybersecurity software tools for assessing the vulnerability of computer networks and for
constant cybersecurity monitoring; downloadable and recorded computer software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; downloadable and
recorded computer software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; downloadable and recorded
computer software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; downloadable and recorded computer software restricting unauthorized access to computer
systems as part of information security management downloadable and recorded computer software for cybersecurity and computer security; downloadable and recorded computer software for use in
preventing unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email
messages, and identifying malicious websites; downloadable and recorded computer security software, namely, software for cybersecurity monitoring and control of network activities on a computer;
downloadable and recorded computer security software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; downloadable and
recorded computer software, namely, software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of
security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security; downloadable and recorded computer software for automated cybersecurity,
digital forensics, cyber threat intelligence, and incident response; downloadable and recorded computer software for managing security strategy and resources relating to the security risk industry;
downloadable and recorded computer programs for managing security strategy and resources for use in the security risk industry; downloadable and recorded computer software for assessing
vulnerability, preventing and addressing cybersecurity threats and attacks; downloadable and recorded computer software for monitoring of computer systems for detecting unauthorized access or data
breach; downloadable and recorded computer anti-virus and anti-malware software; downloadable and recorded internet security software; downloadable and recorded computer software for detection and
prevention of viruses and malware; downloadable and recorded computer software for computer, data and network security; downloadable and recorded computer security software for automatically
identifying and sharing computer and network threat intelligence across computer and network security layers; downloadable and recorded computer software for comprehensive network security, intrusion
prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management -- FIRST USE DATE: NONE; -- USE IN COMMERCE
DATE: NONE |
ALL OF THE GOODS/SERVICES IN EACH CLASS ARE LISTED.
|
Appropriate Specimens for Goods and/or Services: A trademark specimen should be a label, tag, or container for the goods, or a
display associated with the goods. See TMEP §§904.03 et seq. A service mark specimen should be an advertisement, sign, brochure, website printout or other image that shows the mark used in the actual
sale or advertising of the services. See TMEP §§1301.04 et seq. For an instructional video on what is an appropriate trademark or service mark specimen for a good and/or service, click here. |
Fraudulent statements may result in registration being cancelled: Applicants must ensure that statements made in filings to the
USPTO are accurate, as inaccuracies may result in the cancellation of any issued trademark registration. The lack of a bona fide intention to use the mark with ALL goods and/or services listed
in an application or the lack of actual use on all goods and/or services for which use is claimed could jeopardize the validity of the registration, possibly resulting in its
cancellation. |
Additional information: For information on filing and maintenance requirements for U.S. trademark applications and registrations
and required fees, please consult the USPTO website at http://www.uspto.gov or call the Trademark Assistance Center at 1-800-786-9199. |
|