tm logo
FULL STACK SECURITY
Dead/Abandoned
ABANDONED - NO STATEMENT OF USE FILED

no statement of use filed

on 23 Jan 2017

Last Applicant/ Owned by

Serial Number

86661180 filed on 12th Jun 2015

Registration Number

N/A

Correspondent Address

Ira Heffan

Ira Heffan

3 Van De Graaff Drive

Burlington MA 01803

Filing Basis

1. intent to use

2. intent to use current

Disclaimer

NO DATA

FULL STACK SECURITY

Software as a service (SAAS) featuring cyber security software; software as a service (SAAS) featuring software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for prevention of cyber securi Read More

Classification Information


Class [042]
Computer & Software Services & Scientific Services


Software as a service (SAAS) featuring cyber security software; software as a service (SAAS) featuring software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of IT systems and infrastructures; software as a service (SAAS) featuring software for server security; software as a service (SAAS) featuring software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; software as a service (SAAS) featuring software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; software as a service (SAAS) featuring software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; software as a service (SAAS) featuring software for monitoring IT system and infrastructure security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; technology consultation in the field of cyber security, computer software security, computer hardware security, computer network security, and IT systems and infrastructure security; cyber risks and security consultancy services

Class [009]
Computer & Software Products & Electrical & Scientific Products


Cyber security software; computer software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber risks, threats, events, intrusions, breaches and attacks; computer software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; computer software for ensuring the security of computer software, computer hardware, and computer networks; computer software for ensuring the security of IT systems and infrastructure; computer software for ensuring the security of servers; computer software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; computer software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; computer software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; computer software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; computer software for monitoring IT systems and infrastructure to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks

Mark Details


Serial Number

No 86661180

Mark Type

No Service Mark

Attorney Docket Number

No TM-071-US1

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Show more

Status DateAction Taken
23rd Jan 2017ABANDONMENT NOTICE MAILED - NO USE STATEMENT FILED
23rd Jan 2017ABANDONMENT - NO USE STATEMENT FILED
21st Dec 2016AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
19th Dec 2016ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
19th Dec 2016TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
21st Jun 2016NOA E-MAILED - SOU REQUIRED FROM APPLICANT
26th Apr 2016OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
26th Apr 2016PUBLISHED FOR OPPOSITION
06th Apr 2016NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
24th Mar 2016LAW OFFICE PUBLICATION REVIEW COMPLETED