Application

CLARITY

Quorum Cyber Security Limited

Trademark/Service Mark Application, Principal Register

PTO- 1478
Approved for use through 10/31/2024. OMB 0651-0009
U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number

Trademark/Service Mark Application, Principal Register

Serial Number: 98260471
Filing Date: 11/08/2023

The table below presents the data as entered.

Input Field
Entered
SERIAL NUMBER 98260471
MARK INFORMATION
*MARK CLARITY
STANDARD CHARACTERS YES
USPTO-GENERATED IMAGE YES
LITERAL ELEMENT CLARITY
MARK STATEMENT The mark consists of standard characters, without claim to any particular font style, size, or color.
REGISTER Principal
APPLICANT INFORMATION
*OWNER OF MARK Quorum Cyber Security Limited
INTERNAL ADDRESS First Floor Suite (West Wing) Verdant
*MAILING ADDRESS 2 Redheughs Rigg, South Gyle
*CITY Edinburgh EH12 9DQ
*COUNTRY/REGION/JURISDICTION/U.S. TERRITORY United Kingdom
*ZIP/POSTAL CODE
(Required for U.S. and certain international addresses)
0
*EMAIL ADDRESS XXXX
LEGAL ENTITY INFORMATION
TYPE limited company (ltd.)
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY WHERE LEGALLY ORGANIZED United Kingdom
GOODS AND/OR SERVICES AND BASIS INFORMATION
INTERNATIONAL CLASS 042 
*IDENTIFICATION Cyber security risk management services; software as a service (SAAS) relating to computer, Internet and cyber security; software as a service (SAAS) in the field of software for monitoring, identifying and reporting on computer network issues and security threats, breaches, incidents and attacks; software as a service (SAAS) in the field of software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; software as a service (SAAS) in the field of software for allowing users to monitor operation of cyber security systems and receive system analysis and feedback; software as a service (SAAS) in the field of software for allowing users to view and to manage in real time any cyber security threats, breaches, incidents and attacks; software as a service (SAAS) in the field of software for responding to cyber security alerts and incidents, and nullifying potential security threats; software as a service (SAAS) featuring software for cyber and web security, for the protection of web applications, mobile applications and application programming interfaces (APIs) from cyber attack and fraud; software as a service (SAAS) featuring computer software for detection, blocking and handling removal and remedying of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices and mobile digital devices; platform as a service (PaaS) relating to computer, Internet and cyber security; platform as a service (PaaS) featuring computer software platforms for alerting, tracking, detection, blocking and monitoring of security threats, and for preparing reports thereon; platform as a service (PaaS) relating to software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; information security and data protection services in systems, networks and networked infrastructures, namely detection, blocking, monitoring and inspecting to detect attacks, unauthorised/intrusive access/actions and violations to data protection and/or information security; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in and with secure operation centres (SOC), cyber defence centres (CDC) and information sharing and analysis centres (ISAC); design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; provision of computer security risk management software and programs; computer security system monitoring services; computer security threat analysis for protecting data; computer programming services for electronic data security; design and development of electronic data security systems; computer security services for protection against unauthorised network access; installation, repair and maintenance of computer software relating to computer security and prevention of computer risks; data security services; authentication services for computer security; IT security, protection and restoration; advisory services relating to handling cyber security threats, breaches and attacks; cloud security services, namely protection of cloud technologies and systems against cyber security threats, breaches and attacks; computer security testing to locate and address potential security weaknesses; IT services for data management and protection; IT services for data management and protection to mitigate risk of data loss, theft and exfiltration; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for security services relating to cyber risks and compliance requirements; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computerised incident response security solutions; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for cyber security portals; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; advisory services relating to strategic and technical measures to improve cyber security; integration and configuration of computer hardware, firmware, software, apparatus and instruments in the fields of computer and network security; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in providing security for computer networks, including virtual private networks; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in providing firewall filters, network security functionality, data encryption and interoperability with network security protocols; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in protecting against network intrusions and viruses; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in monitoring, analysing and assessing security vulnerabilities in computer networks; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in running security tests and network performance tests; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for collection, analysis and monitoring of network traffic and security breach incidents; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in the fields of cybersecurity, computer analytics, computer forensics, forensic data investigation, electronic evidence discovery and business loss valuation; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in fields of malware, unauthorised software, network security threats, breaches and attacks; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer software for use in the fields of responding to and mitigating cyber incidents, incident response, ransomware and hacking; computer, network, infrastructure and data security services; provision of data security services for computer and communication networks; data security services in the nature of remote or on-site monitoring of computers, networks, infrastructure; provision of technical audit services to assess security of computers, networks and infrastructure; technical and technical consultancy services for the administration and troubleshooting of computer network hardware and software; cloud computing featuring software for secure authentication of network devices; collection and reporting of network security data; information, advisory and consultancy services relating to all the aforesaid services
FILING BASIS SECTION 44(d)
       FOREIGN APPLICATION NUMBER UK00003954860
       FOREIGN APPLICATION
       COUNTRY/REGION/JURISDICTION/U.S. TERRITORY
United Kingdom
       FOREIGN FILING DATE 09/08/2023
       INTENT TO
       PERFECT 44(d)
At this time, the applicant intends to rely on Section 44(e) as a basis for registration. If ultimately the applicant does not rely on Section 44(e) as a basis for registration, a valid claim of priority may be retained.
ADDITIONAL STATEMENTS SECTION
MISCELLANEOUS STATEMENT Applicant's zip code is " EH12 9DQ." Due to system limitations, it is Applicant's understanding that the space between "EH12" and "9DQ" will be deleted if the zip code field is used. Accordingly, Applicant placed the zip code in the city line, and entered a "0" in the zip code field. Applicant respectfully requests that the "0" be manually deleted by USPTO staff. Applicant expresses thanks to USPTO personnel for their efforts involving this application.
ATTORNEY INFORMATION
NAME M. Scott Alprin
ATTORNEY DOCKET NUMBER 0265037
ATTORNEY BAR MEMBERSHIP NUMBER XXX
YEAR OF ADMISSION XXXX
U.S. STATE/ COMMONWEALTH/ TERRITORY XX
FIRM NAME Alprin Law Offices, P.C.
STREET 5 Pinehurst Circle, N.W.
CITY Washington
STATE District of Columbia
COUNTRY/REGION/JURISDICTION/U.S. TERRITORY United States
ZIP/POSTAL CODE 20015
PHONE 202-659-8225
FAX 202-659-0441
EMAIL ADDRESS trademarks@alprinlaw.com
OTHER APPOINTED ATTORNEY Yuka Kobayashi
DOMESTIC REPRESENTATIVE INFORMATION
NAME M. Scott Alprin
FIRM NAME Alprin Law Offices, P.C.
STREET 5 Pinehurst Circle, N.W.
CITY Washington
STATE District of Columbia
COUNTRY/REGION/JURISDICTION/U.S. TERRITORY United States
ZIP CODE 20015
PHONE 202-659-8225
FAX 202-659-0441
EMAIL ADDRESS trademarks@alprinlaw.com
CORRESPONDENCE INFORMATION
NAME M. Scott Alprin
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE trademarks@alprinlaw.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) NOT PROVIDED
FEE INFORMATION
APPLICATION FILING OPTION TEAS Standard
NUMBER OF CLASSES 1
APPLICATION FOR REGISTRATION PER CLASS 350
*TOTAL FEES DUE 350
*TOTAL FEES PAID 350
SIGNATURE INFORMATION
SIGNATURE /Yuka Kobayashi/
SIGNATORY'S NAME Yuka Kobayashi
SIGNATORY'S POSITION Attorney of record, Virginia Bar member
SIGNATORY'S PHONE NUMBER 202-659-8225
DATE SIGNED 11/08/2023
SIGNATURE METHOD Signed directly within the form



PTO- 1478
Approved for use through 10/31/2024. OMB 0651-0009
U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number


Trademark/Service Mark Application, Principal Register

Serial Number: 98260471
Filing Date: 11/08/2023

To the Commissioner for Trademarks:

MARK: CLARITY (Standard Characters, see mark)
The literal element of the mark consists of CLARITY. The mark consists of standard characters, without claim to any particular font style, size, or color.
The applicant, Quorum Cyber Security Limited, a limited company (ltd.) legally organized under the laws of United Kingdom, having an address of
      First Floor Suite (West Wing) Verdant
      2 Redheughs Rigg, South Gyle
      Edinburgh EH12 9DQ 0
      United Kingdom
      XXXX

requests registration of the trademark/service mark identified above in the United States Patent and Trademark Office on the Principal Register established by the Act of July 5, 1946 (15 U.S.C. Section 1051 et seq.), as amended, for the following:

International Class 042:  Cyber security risk management services; software as a service (SAAS) relating to computer, Internet and cyber security; software as a service (SAAS) in the field of software for monitoring, identifying and reporting on computer network issues and security threats, breaches, incidents and attacks; software as a service (SAAS) in the field of software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; software as a service (SAAS) in the field of software for allowing users to monitor operation of cyber security systems and receive system analysis and feedback; software as a service (SAAS) in the field of software for allowing users to view and to manage in real time any cyber security threats, breaches, incidents and attacks; software as a service (SAAS) in the field of software for responding to cyber security alerts and incidents, and nullifying potential security threats; software as a service (SAAS) featuring software for cyber and web security, for the protection of web applications, mobile applications and application programming interfaces (APIs) from cyber attack and fraud; software as a service (SAAS) featuring computer software for detection, blocking and handling removal and remedying of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices and mobile digital devices; platform as a service (PaaS) relating to computer, Internet and cyber security; platform as a service (PaaS) featuring computer software platforms for alerting, tracking, detection, blocking and monitoring of security threats, and for preparing reports thereon; platform as a service (PaaS) relating to software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; information security and data protection services in systems, networks and networked infrastructures, namely detection, blocking, monitoring and inspecting to detect attacks, unauthorised/intrusive access/actions and violations to data protection and/or information security; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in and with secure operation centres (SOC), cyber defence centres (CDC) and information sharing and analysis centres (ISAC); design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; provision of computer security risk management software and programs; computer security system monitoring services; computer security threat analysis for protecting data; computer programming services for electronic data security; design and development of electronic data security systems; computer security services for protection against unauthorised network access; installation, repair and maintenance of computer software relating to computer security and prevention of computer risks; data security services; authentication services for computer security; IT security, protection and restoration; advisory services relating to handling cyber security threats, breaches and attacks; cloud security services, namely protection of cloud technologies and systems against cyber security threats, breaches and attacks; computer security testing to locate and address potential security weaknesses; IT services for data management and protection; IT services for data management and protection to mitigate risk of data loss, theft and exfiltration; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for security services relating to cyber risks and compliance requirements; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computerised incident response security solutions; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for cyber security portals; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; advisory services relating to strategic and technical measures to improve cyber security; integration and configuration of computer hardware, firmware, software, apparatus and instruments in the fields of computer and network security; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in providing security for computer networks, including virtual private networks; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in providing firewall filters, network security functionality, data encryption and interoperability with network security protocols; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in protecting against network intrusions and viruses; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in monitoring, analysing and assessing security vulnerabilities in computer networks; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in running security tests and network performance tests; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for collection, analysis and monitoring of network traffic and security breach incidents; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in the fields of cybersecurity, computer analytics, computer forensics, forensic data investigation, electronic evidence discovery and business loss valuation; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in fields of malware, unauthorised software, network security threats, breaches and attacks; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer software for use in the fields of responding to and mitigating cyber incidents, incident response, ransomware and hacking; computer, network, infrastructure and data security services; provision of data security services for computer and communication networks; data security services in the nature of remote or on-site monitoring of computers, networks, infrastructure; provision of technical audit services to assess security of computers, networks and infrastructure; technical and technical consultancy services for the administration and troubleshooting of computer network hardware and software; cloud computing featuring software for secure authentication of network devices; collection and reporting of network security data; information, advisory and consultancy services relating to all the aforesaid services

Priority based on foreign filing: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services and asserts a claim of priority based on United Kingdom application number UK00003954860, filed 09/08/2023.
INTENT TO PERFECT 44(d) : At this time, the applicant intends to rely on Section 44(e) as a basis for registration. If ultimately the applicant does not rely on Section 44(e) as a basis for registration, a valid claim of priority may be retained.



Miscellaneous Statement
Applicant's zip code is " EH12 9DQ." Due to system limitations, it is Applicant's understanding that the space between "EH12" and "9DQ" will be deleted if the zip code field is used. Accordingly, Applicant placed the zip code in the city line, and entered a "0" in the zip code field. Applicant respectfully requests that the "0" be manually deleted by USPTO staff. Applicant expresses thanks to USPTO personnel for their efforts involving this application.


The owner's/holder's proposed attorney information: M. Scott Alprin. Other appointed attorneys are Yuka Kobayashi. M. Scott Alprin of Alprin Law Offices, P.C., is a member of the XX bar, admitted to the bar in XXXX, bar membership no. XXX, and the attorney(s) is located at
      5 Pinehurst Circle, N.W.
      Washington, District of Columbia 20015
      United States
      202-659-8225(phone)
      202-659-0441(fax)
      trademarks@alprinlaw.com
The docket/reference number is 0265037.
M. Scott Alprin submitted the following statement: The attorney of record is an active member in good standing of the bar of the highest court of a U.S. state, the District of Columbia, or any U.S. Commonwealth or territory.

The applicant hereby appoints M. Scott Alprin of Alprin Law Offices, P.C.
      5 Pinehurst Circle, N.W.
      Washington District of Columbia 20015
      United States
      202-659-8225(phone)
      202-659-0441(fax)
      trademarks@alprinlaw.com
as applicant's representative upon whom notice or process in the proceedings affecting the mark may be served.


The applicant's current Correspondence Information:
      M. Scott Alprin
       PRIMARY EMAIL FOR CORRESPONDENCE: trademarks@alprinlaw.com       SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): NOT PROVIDED


Requirement for Email and Electronic Filing: I understand that a valid email address must be maintained by the applicant owner/holder and the applicant owner's/holder's attorney, if appointed, and that all official trademark correspondence must be submitted via the Trademark Electronic Application System (TEAS).
A fee payment in the amount of $350 has been submitted with the application, representing payment for 1 class(es).

Declaration

Declaration Signature

Signature: /Yuka Kobayashi/   Date: 11/08/2023
Signatory's Name: Yuka Kobayashi
Signatory's Position: Attorney of record, Virginia Bar member
Signatory's Phone Number: 202-659-8225
Signature method: Signed directly within the form
Payment Sale Number: 98260471
Payment Accounting Date: 11/08/2023

Serial Number: 98260471
Internet Transmission Date: Wed Nov 08 12:42:34 ET 2023
TEAS Stamp: USPTO/BAS-XX.XXX.XXX.XXX-202311081242359
03425-98260471-860e9ed9d1bb6d8d2aefedded
1c6f723e8a7105f20e19ce6e81311f57c41a2263
8-CC-42347952-20231108123259079912

Application [image/jpeg]


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed