tm logo
PHISHINSIGHT
Live/Registered
SECTION 8 & 15-ACCEPTED AND ACKNOWLEDGED

accepted and acknowledged

on 09 Apr 2024

Last Applicant/ Owned by

JR Shinjuku Miraina Tower 20F

Tokyo

JP

160-0022

Serial Number

87418315 filed on 20th Apr 2017

Registration Number

5318847 registered on 24th Oct 2017

in the Principal Register

Correspondent Address

Joi A. White

Joi A. White

411 Borel Avenue, Suite 603

San Mateo,CA 94402

Filing Basis

1. intent to use

2. use application currently

Disclaimer

NO DATA

PHISHINSIGHT

Software as a service (SAAS) services featuring software and applications for computer, data and network security; providing temporary use of online non-downloadable computer software and applications for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, computer training software, anti-malware software and Read More

Classification Information


Class [042]
Computer & Software Services & Scientific Services


Software as a service (SAAS) services featuring software and applications for computer, data and network security; providing temporary use of online non-downloadable computer software and applications for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; providing temporary use of online non-downloadable computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; software as a service (SAAS) services featuring computer software and applications for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for educating, training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for educating training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; software as a service (SAAS) services featuring computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; providing temporary use of online non-downloadable computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; software as a service (SAAS) services featuring computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities


First Use Date in General

03rd May 2017

First Use Date in Commerce

03rd May 2017

Mark Details


Serial Number

No 87418315

Mark Type

No Service Mark

Attorney Docket Number

No T-4088 US

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Design Code(s)

24.15.03 -

Arrows formed by words, letters, numbers or punctuation

26.17.01 -

Straight line(s), band(s) or bar(s)

26.17.05 -

Horizontal line(s), band(s) or bar(s)

Legal History


Show more

Status DateAction Taken
09th Apr 2024CASE ASSIGNED TO POST REGISTRATION PARALEGAL
09th Apr 2024REGISTERED - SEC. 8 (6-YR) ACCEPTED & SEC. 15 ACK.
09th Apr 2024NOTICE OF ACCEPTANCE OF SEC. 8 & 15 - E-MAILED
02th Feb 2024TEAS CHANGE OF OWNER ADDRESS RECEIVED
02th Feb 2024APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED
02th Feb 2024TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
02th Feb 2024ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
02th Feb 2024TEAS CHANGE OF CORRESPONDENCE RECEIVED
12th Oct 2023TEAS SECTION 8 & 15 RECEIVED
24th Oct 2022COURTESY REMINDER - SEC. 8 (6-YR) E-MAILED