Publication Registration: |
Wednesday, April 9, 2003 |
Design Feature:
|
(1) Punctuation marks
(2) Curved lines or bands (except a 26.11.13)
(3) Two lines or bands
(4) Thick lines, bands
(5) Vertical lines or bands
|
Goods and Services Information
|
Description:
|
(1) - Business management services, namely, electronic data retention policy services, namely, defining, establishing, changing and managing corporate document and digital data retention policies; installation, maintenance and repair services in the fields of computers, computer systems, computer software, electronic data security and electronic communications networks; providing access to and transmission of data security applications which secure, protect, encrypt, decrypt, authenticate, monitor, track and transmit electronic data, e-mail, communications, copyrighted material in electronic form and other electronic data; education and training services, namely, conducting classes and seminars in the fields of computers, computer systems, computer software, electronic data security systems, electronic communications networks with respect to digital rights management, policy management and e-asset policy management; computer services, namely digital data encryption and decryption services, records management, namely digital document security, authentication and control of access; consulting and technical support services in the fields of computers, computer systems, computer software, electronic data security, and electronic communications networks; design services in the fields of computers, computer systems, computer software, electronic data security, and electronic communications networks; electronic data management services, namely, providing control of access, distribution and retention of electronic data; digital data and rights management services; document management services; computer consulting services; electronic data security and privacy services, namely encoding identification information on valuable documents and products
(2) - Computer hardware; computer software, namely, data security applications which secure, protect, encrypt, decrypt, authenticate, monitor, track and transmit electronic data, digital information, e-mail; computer software for digital rights management, data archiving and detection and removal of computer viruses; computer software providing the filtering, scanning, retention, deletion and auditing of secure communications for voice, data and image transmissions; software to enable secure data transmission via computer networks; computer software for compression and expansion of computer files and recovery of deleted computer files; manuals provided together with each of the foregoing goods.
|