Design Feature:
|
(1) Electrical equipment
(2) Switches
(3) Circles
(4) Circles or ellipses containing one or more other geometrical figures -- Note: Including circles or ellipses containing bent or straight lines (except 26.1.10).
(5) One circle or ellipse
(6) One line or one band
(7) Straight lines or bands
(8) Vertical lines or bands
(9) Circles or ellipses with lines (except 26.7.3)
(10) Letters or numerals forming geometrical figures, written or typographical matter in perspective
(11) Letters or numerals forming a circle or a circumference
(12) Letters or numerals representing a human being or a part of the human body, an animal or a part of an animal's body, a plant, a heavenly body, a natural phenomenon or an object
(13) Letters or numerals representing an object
(14) Letters presenting a special form of writing
(15) Letters linked to or containing a figurative element -- Note: Letters representing a human being or a part of the human body, an animal or a part of an animal's body, a plant, a heavenly body, a natural phenomenon or an object are classified in division 27.3.
|
Goods and Services Information
|
Description:
|
(1) - Application service provider, namely, hosting, managing, developing, and maintaining applications, software, and websites in the fields of device and data-content security for the defense, prevention, detection, monitoring, and quarantining of unauthorized and/or malicious content or activity to prevent data loss and/or threats to a network's security.
(2) - Electronic devices for computer network and data security, namely, computer servers, for the defense, prevention, detection, monitoring, and quarantining of unauthorized and/or malicious content or activity to prevent data loss and/or threats to a network's security; computer network and data security software for the defense, prevention, detection, monitoring, and quarantining of unauthorized and/or malicious content or activity to prevent data loss and/or threats to a network's security; computer, laptop, and mobile electronic device security software for the defense, prevention, detection, monitoring, and quarantining of unauthorized and/or malicious content or activity to prevent data loss and/or threats to a network's security; data-content security software for the defense, prevention, detection, monitoring, and quarantining of unauthorized and/or malicious content or activity to prevent data loss and/or threats to a network's security.
(3) - Electronic devices for computer network and data security, namely, computer servers, for the defense, prevention, detection, monitoring, and quarantining of unauthorized and/or malicious content or activity to prevent data loss and/or threats to a network's security; computer network and data security software for the defense, prevention, detection, monitoring, and quarantining of unauthorized and/or malicious content or activity to prevent data loss and/or threats to a network's security; computer, laptop, and mobile electronic device security software for the defense, prevention, detection, monitoring, and quarantining of unauthorized and/or malicious content or activity to prevent data loss and/or threats to a network's security; data-content security software for the defense, prevention, detection, monitoring, and quarantining of unauthorized and/or malicious content or activity to prevent data loss and/or threats to a network's security.
(4) - Application service provider, namely, hosting, managing, developing, and maintaining applications, software, and websites in the fields of device and data-content security for the defense, prevention, detection, monitoring, and quarantining of unauthorized and/or malicious content or activity to prevent data loss and/or threats to a network's security.
|