DETICA

DETICA Canadian Trademark Information

Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial cri...
Classification Information
Class Code: 016 - Paper Goods and Printed Material
Description: Paper and printed goods
Class Code: 035 - Advertising, Business & Retail Services
Description: Advertising, marketing, promotional, business administration, office functions
Class Code: 036 - Insurance & Financial Services
Description: Insurance; financial affairs; monetary affairs; real estate affairs
Class Code: 037 - Construction and Repair Services
Description: Building construction; repair; installation services
Class Code: 041 - Education and Entertainment Services
Description: Education; providing of training; entertainment, sporting and cultural activities
Class Code: 042 - Computer & Software Services & Scientific Services
Description: Computer and scientific
Class Code: 045 - Personal & Legal & Social Services
Description: Legal services; security; personal and social services
Class Code: 009 - Computer & Software Products & Electrical & Scientific Products
Description: Electrical and scientific apparatus
Matter History Events
Status Date Record Status Description
2015-08-11 National prosecution history entry - abandoned - Section 36
2015-05-20 National prosecution history entry - default notice sent
2014-10-31 National prosecution history entry - correspondence created
2014-01-14 National prosecution history entry - extension of time
2013-07-09 Filing date accorded - Search Recorded
2013-07-09 National prosecution history entry - Examiner's First Report
2012-12-13 Filing date accorded - formalized
2012-12-12 National prosecution history entry - created
2012-12-11 Application filed - filed
Word Mark: DETICA
Current Status:
Interruption of proceeding
DEAD Mark!
8/11/2015
Application Number: 1606146
Filing Date: Tuesday, December 11, 2012
Filing Place: Canada
Registration Date: Monday, January 1, 1900
Register Type: Primary
Type Of Mark: Trademark
Mark Feature: Word
Use In Commerce: Yes
Last Applicant/Owner: *********
**********
***** ****
Correspondent:
*********
**********
***** ****
Goods and Services Information
Description:
(1) - Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, adv
(2) - Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for ide
(3) - Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for ide
(4) - Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, adv
(5) - Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, adv
(6) - Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for ide
Trademarkia is the largest search engine for U.S., China, European Union, Canada, and Australia Trademarks. Each month hundreds of trademarks around the world are filed by licensed attorneys in the Trademarkia network law firms! You can register your trademark in 180+ countries in the world through Trademarkia Network. Trademarkia.com is a free search engine of publicly available government records. Trademarkia.com is not a law firm and does not represent owners & correspondents listed on this page.
What You Can Do:

This mark may be available for re-registration. You can apply for it through Trademarkia at a low cost of $449!

Trademarkia.com will perform a final search in order to verify that this mark is available for Canada Trademark re-registration. All Trademarkia services are backed by a 100% satisfaction guarantee.

Trademarkia lets you see how your personal name, product name, trademark name or username is being used on any of 530+ new and popular social networks. Be the first to reserve your name and get help stopping others from using it - all in one place!
As seen on