Trademark/Service Mark Application, Principal Register
PTO- 1478
Approved for use through 10/31/2024. OMB 0651-0009
U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number
Trademark/Service Mark Application, Principal Register
The mark consists of standard characters, without claim to any particular font style, size, or color.
REGISTER
Principal
APPLICANT INFORMATION
*OWNER OF MARK
Quorum Cyber Security Limited
INTERNAL ADDRESS
First Floor Suite (West Wing) Verdant
*MAILING ADDRESS
2 Redheughs Rigg, South Gyle
*CITY
Edinburgh EH12 9DQ
*COUNTRY/REGION/JURISDICTION/U.S. TERRITORY
United Kingdom
*ZIP/POSTAL CODE
(Required for U.S. and certain international addresses)
0
*EMAIL ADDRESS
XXXX
LEGAL ENTITY INFORMATION
TYPE
limited company (ltd.)
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY WHERE LEGALLY ORGANIZED
United Kingdom
GOODS AND/OR SERVICES AND BASIS INFORMATION
INTERNATIONAL CLASS
042
*IDENTIFICATION
Cyber security risk management services; software as a service (SAAS) relating to computer, Internet and cyber security; software as a service
(SAAS) in the field of software for monitoring, identifying and reporting on computer network issues and security threats, breaches, incidents and attacks; software as a service (SAAS) in the field
of software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; software as a service (SAAS) in the field of software for allowing users to
monitor operation of cyber security systems and receive system analysis and feedback; software as a service (SAAS) in the field of software for allowing users to view and to manage in real time any
cyber security threats, breaches, incidents and attacks; software as a service (SAAS) in the field of software for responding to cyber security alerts and incidents, and nullifying potential security
threats; software as a service (SAAS) featuring software for cyber and web security, for the protection of web applications, mobile applications and application programming interfaces (APIs) from
cyber attack and fraud; software as a service (SAAS) featuring computer software for detection, blocking and handling removal and remedying of computer viruses, rootkits, advanced persistent threats,
malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices and mobile digital devices; platform as a service (PaaS) relating to computer,
Internet and cyber security; platform as a service (PaaS) featuring computer software platforms for alerting, tracking, detection, blocking and monitoring of security threats, and for preparing
reports thereon; platform as a service (PaaS) relating to software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; information security and
data protection services in systems, networks and networked infrastructures, namely detection, blocking, monitoring and inspecting to detect attacks, unauthorised/intrusive access/actions and
violations to data protection and/or information security; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming,
maintenance, monitoring, repair and engineering of computer programs and software for use in and with secure operation centres (SOC), cyber defence centres (CDC) and information sharing and analysis
centres (ISAC); design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and
engineering of computer programs and software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; provision of computer security risk
management software and programs; computer security system monitoring services; computer security threat analysis for protecting data; computer programming services for electronic data security;
design and development of electronic data security systems; computer security services for protection against unauthorised network access; installation, repair and maintenance of computer software
relating to computer security and prevention of computer risks; data security services; authentication services for computer security; IT security, protection and restoration; advisory services
relating to handling cyber security threats, breaches and attacks; cloud security services, namely protection of cloud technologies and systems against cyber security threats, breaches and attacks;
computer security testing to locate and address potential security weaknesses; IT services for data management and protection; IT services for data management and protection to mitigate risk of data
loss, theft and exfiltration; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and
engineering of computer programs and software for security services relating to cyber risks and compliance requirements; design, development, programming, implementation, installation, updating,
modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computerised incident response security solutions; design, development, programming,
implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for cyber security
portals; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer
programs and software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; advisory services relating to strategic and technical measures to
improve cyber security; integration and configuration of computer hardware, firmware, software, apparatus and instruments in the fields of computer and network security; design, research,
development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and
software for use in providing security for computer networks, including virtual private networks; design, research, development, programming, implementation, installation, updating, modification,
customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in providing firewall filters, network security functionality,
data encryption and interoperability with network security protocols; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration,
programming, maintenance, monitoring, repair and engineering of computer programs and software for use in protecting against network intrusions and viruses; design, research, development,
programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use
in monitoring, analysing and assessing security vulnerabilities in computer networks; design, research, development, programming, implementation, installation, updating, modification, customisation,
configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in running security tests and network performance tests; design, research,
development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and
software for collection, analysis and monitoring of network traffic and security breach incidents; design, research, development, programming, implementation, installation, updating, modification,
customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in the fields of cybersecurity, computer analytics, computer
forensics, forensic data investigation, electronic evidence discovery and business loss valuation; design, research, development, programming, implementation, installation, updating, modification,
customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in fields of malware, unauthorised software, network security
threats, breaches and attacks; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring,
repair and engineering of computer software for use in the fields of responding to and mitigating cyber incidents, incident response, ransomware and hacking; computer, network, infrastructure and
data security services; provision of data security services for computer and communication networks; data security services in the nature of remote or on-site monitoring of computers, networks,
infrastructure; provision of technical audit services to assess security of computers, networks and infrastructure; technical and technical consultancy services for the administration and
troubleshooting of computer network hardware and software; cloud computing featuring software for secure authentication of network devices; collection and reporting of network security data;
information, advisory and consultancy services relating to all the aforesaid services
At this time, the applicant intends to rely on Section 44(e) as a basis for registration. If ultimately the applicant does not rely on Section 44(e) as a
basis for registration, a valid claim of priority may be retained.
ADDITIONAL STATEMENTS SECTION
MISCELLANEOUS STATEMENT
Applicant's zip code is " EH12 9DQ." Due to system limitations, it is Applicant's understanding that the space between "EH12" and
"9DQ" will be deleted if the zip code field is used. Accordingly, Applicant placed the zip code in the city line, and entered a "0" in the zip code field. Applicant respectfully requests that the "0"
be manually deleted by USPTO staff. Applicant expresses thanks to USPTO personnel for their efforts involving this application.
ATTORNEY INFORMATION
NAME
M. Scott Alprin
ATTORNEY DOCKET NUMBER
0265037
ATTORNEY BAR MEMBERSHIP NUMBER
XXX
YEAR OF ADMISSION
XXXX
U.S. STATE/ COMMONWEALTH/ TERRITORY
XX
FIRM NAME
Alprin Law Offices, P.C.
STREET
5 Pinehurst Circle, N.W.
CITY
Washington
STATE
District of Columbia
COUNTRY/REGION/JURISDICTION/U.S. TERRITORY
United States
ZIP/POSTAL CODE
20015
PHONE
202-659-8225
FAX
202-659-0441
EMAIL ADDRESS
trademarks@alprinlaw.com
OTHER APPOINTED ATTORNEY
Yuka Kobayashi
DOMESTIC REPRESENTATIVE INFORMATION
NAME
M. Scott Alprin
FIRM NAME
Alprin Law Offices, P.C.
STREET
5 Pinehurst Circle, N.W.
CITY
Washington
STATE
District of Columbia
COUNTRY/REGION/JURISDICTION/U.S. TERRITORY
United States
ZIP CODE
20015
PHONE
202-659-8225
FAX
202-659-0441
EMAIL ADDRESS
trademarks@alprinlaw.com
CORRESPONDENCE INFORMATION
NAME
M. Scott Alprin
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE
trademarks@alprinlaw.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES)
NOT PROVIDED
FEE INFORMATION
APPLICATION FILING OPTION
TEAS Standard
NUMBER OF CLASSES
1
APPLICATION FOR REGISTRATION PER CLASS
350
*TOTAL FEES DUE
350
*TOTAL FEES PAID
350
SIGNATURE INFORMATION
SIGNATURE
/Yuka Kobayashi/
SIGNATORY'S NAME
Yuka Kobayashi
SIGNATORY'S POSITION
Attorney of record, Virginia Bar member
SIGNATORY'S PHONE NUMBER
202-659-8225
DATE SIGNED
11/08/2023
SIGNATURE METHOD
Signed directly within the form
PTO- 1478
Approved for use through 10/31/2024. OMB 0651-0009
U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number
Trademark/Service Mark Application, Principal Register
Serial Number:98260471
Filing Date:11/08/2023
To the Commissioner for Trademarks:
MARK: CLARITY (Standard Characters, see mark)
The literal element of the mark consists of CLARITY. The mark consists of standard characters, without claim to any particular font style, size, or color.
The applicant, Quorum Cyber Security Limited, a limited company (ltd.) legally organized under the laws of United Kingdom, having an address of
First Floor Suite (West Wing) Verdant
2 Redheughs Rigg, South Gyle
Edinburgh EH12 9DQ 0
United Kingdom
XXXX
requests registration of the trademark/service mark identified above in the United States Patent and Trademark Office on the Principal Register established by the Act of July 5, 1946 (15 U.S.C.
Section 1051 et seq.), as amended, for the following:
International Class 042: Cyber security risk management services; software as a service (SAAS) relating to computer, Internet and cyber security; software as a service (SAAS) in the field of
software for monitoring, identifying and reporting on computer network issues and security threats, breaches, incidents and attacks; software as a service (SAAS) in the field of software for
responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; software as a service (SAAS) in the field of software for allowing users to monitor operation
of cyber security systems and receive system analysis and feedback; software as a service (SAAS) in the field of software for allowing users to view and to manage in real time any cyber security
threats, breaches, incidents and attacks; software as a service (SAAS) in the field of software for responding to cyber security alerts and incidents, and nullifying potential security threats;
software as a service (SAAS) featuring software for cyber and web security, for the protection of web applications, mobile applications and application programming interfaces (APIs) from cyber attack
and fraud; software as a service (SAAS) featuring computer software for detection, blocking and handling removal and remedying of computer viruses, rootkits, advanced persistent threats, malware and
malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices and mobile digital devices; platform as a service (PaaS) relating to computer, Internet
and cyber security; platform as a service (PaaS) featuring computer software platforms for alerting, tracking, detection, blocking and monitoring of security threats, and for preparing reports
thereon; platform as a service (PaaS) relating to software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; information security and data
protection services in systems, networks and networked infrastructures, namely detection, blocking, monitoring and inspecting to detect attacks, unauthorised/intrusive access/actions and violations
to data protection and/or information security; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming,
maintenance, monitoring, repair and engineering of computer programs and software for use in and with secure operation centres (SOC), cyber defence centres (CDC) and information sharing and analysis
centres (ISAC); design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and
engineering of computer programs and software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; provision of computer security risk
management software and programs; computer security system monitoring services; computer security threat analysis for protecting data; computer programming services for electronic data security;
design and development of electronic data security systems; computer security services for protection against unauthorised network access; installation, repair and maintenance of computer software
relating to computer security and prevention of computer risks; data security services; authentication services for computer security; IT security, protection and restoration; advisory services
relating to handling cyber security threats, breaches and attacks; cloud security services, namely protection of cloud technologies and systems against cyber security threats, breaches and attacks;
computer security testing to locate and address potential security weaknesses; IT services for data management and protection; IT services for data management and protection to mitigate risk of data
loss, theft and exfiltration; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and
engineering of computer programs and software for security services relating to cyber risks and compliance requirements; design, development, programming, implementation, installation, updating,
modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computerised incident response security solutions; design, development, programming,
implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for cyber security
portals; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer
programs and software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; advisory services relating to strategic and technical measures to
improve cyber security; integration and configuration of computer hardware, firmware, software, apparatus and instruments in the fields of computer and network security; design, research,
development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and
software for use in providing security for computer networks, including virtual private networks; design, research, development, programming, implementation, installation, updating, modification,
customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in providing firewall filters, network security functionality,
data encryption and interoperability with network security protocols; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration,
programming, maintenance, monitoring, repair and engineering of computer programs and software for use in protecting against network intrusions and viruses; design, research, development,
programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use
in monitoring, analysing and assessing security vulnerabilities in computer networks; design, research, development, programming, implementation, installation, updating, modification, customisation,
configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in running security tests and network performance tests; design, research,
development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and
software for collection, analysis and monitoring of network traffic and security breach incidents; design, research, development, programming, implementation, installation, updating, modification,
customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in the fields of cybersecurity, computer analytics, computer
forensics, forensic data investigation, electronic evidence discovery and business loss valuation; design, research, development, programming, implementation, installation, updating, modification,
customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in fields of malware, unauthorised software, network security
threats, breaches and attacks; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring,
repair and engineering of computer software for use in the fields of responding to and mitigating cyber incidents, incident response, ransomware and hacking; computer, network, infrastructure and
data security services; provision of data security services for computer and communication networks; data security services in the nature of remote or on-site monitoring of computers, networks,
infrastructure; provision of technical audit services to assess security of computers, networks and infrastructure; technical and technical consultancy services for the administration and
troubleshooting of computer network hardware and software; cloud computing featuring software for secure authentication of network devices; collection and reporting of network security data;
information, advisory and consultancy services relating to all the aforesaid services
Priority based on foreign filing: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services and asserts a claim of
priority based on United Kingdom application number UK00003954860, filed 09/08/2023.
INTENT TO PERFECT 44(d) : At this time, the applicant intends to rely on Section 44(e) as a basis for registration. If ultimately the applicant does not rely on Section 44(e) as a basis for
registration, a valid claim of priority may be retained.
Miscellaneous Statement
Applicant's zip code is " EH12 9DQ." Due to system limitations, it is Applicant's understanding that the space between "EH12" and "9DQ" will be deleted if the zip code field is used. Accordingly,
Applicant placed the zip code in the city line, and entered a "0" in the zip code field. Applicant respectfully requests that the "0" be manually deleted by USPTO staff. Applicant expresses thanks to
USPTO personnel for their efforts involving this application.
The owner's/holder's proposed attorney information: M. Scott Alprin. Other appointed attorneys are Yuka Kobayashi. M. Scott Alprin of Alprin Law Offices, P.C., is a member of the XX bar,
admitted to the bar in XXXX, bar membership no. XXX, and the attorney(s) is located at
5 Pinehurst Circle, N.W.
Washington, District of Columbia 20015
United States
202-659-8225(phone)
202-659-0441(fax)
trademarks@alprinlaw.com
The docket/reference number is 0265037.
M. Scott Alprin submitted the following statement: The attorney of record is an active member in good standing of the bar of the highest court of a U.S. state, the District of Columbia, or any U.S.
Commonwealth or territory.
The applicant hereby appoints M. Scott Alprin of Alprin Law Offices, P.C.
5 Pinehurst Circle, N.W.
Washington District of Columbia 20015
United States
202-659-8225(phone)
202-659-0441(fax)
trademarks@alprinlaw.com
as applicant's representative upon whom notice or process in the proceedings affecting the mark may be served.
The applicant's current Correspondence Information:
M. Scott Alprin
PRIMARY EMAIL FOR CORRESPONDENCE: trademarks@alprinlaw.com SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): NOT PROVIDED
Requirement for Email and Electronic Filing: I understand that a valid email address must be maintained by the applicant owner/holder and the applicant owner's/holder's attorney, if appointed,
and that all official trademark correspondence must be submitted via the Trademark Electronic Application System (TEAS).
A fee payment in the amount of $350 has been submitted with the application, representing payment for 1 class(es).
Declaration
Declaration Signature
Signature: /Yuka Kobayashi/ Date: 11/08/2023
Signatory's Name: Yuka Kobayashi
Signatory's Position: Attorney of record, Virginia Bar member
Signatory's Phone Number: 202-659-8225
Signature method: Signed directly within the form
Payment Sale Number: 98260471
Payment Accounting Date: 11/08/2023
Serial Number: 98260471
Internet Transmission Date: Wed Nov 08 12:42:34 ET 2023
TEAS Stamp: USPTO/BAS-XX.XXX.XXX.XXX-202311081242359
03425-98260471-860e9ed9d1bb6d8d2aefedded
1c6f723e8a7105f20e19ce6e81311f57c41a2263
8-CC-42347952-20231108123259079912