tm logo
ZEGURO CYBER SAFETY
Live/Registered
REGISTERED

on 02 Mar 2021

Last Applicant/ Owned by

101A Clay St #280

San Francisco

CA

94111

Serial Number

88183271 filed on 06th Nov 2018

Registration Number

6283668 registered on 02th Mar 2021

in the Principal Register

Correspondent Address

Beth M. Goldman

ORRICK, HERRINGTON & SUTCLIFFE LLP

2050 Main Street, Suite 1100

IP Prosecution Department

IRVINE, CA 92614-8255

Filing Basis

1. intent to use

2. use application currently

Disclaimer

"CYBER SAFETY"

ZEGURO CYBER SAFETY

"CYBER SAFETY" Computer security consultancy; information technology consultation; computer security consultation in the field of assessing, correcting, defending and managing cyber security; information technology consulting in the field of cyber security solutions; information technology consulting in the field of compliance with data privacy and data security regulations; technology consultatiRead More

Classification Information


Class [042]
Computer & Software Services & Scientific Services


Computer security consultancy; information technology consultation; computer security consultation in the field of assessing, correcting, defending and managing cyber security; information technology consulting in the field of cyber security solutions; information technology consulting in the field of compliance with data privacy and data security regulations; technology consultation in the field of cyber security and cyber risk assessment; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess security vulnerabilities; cybersecurity assessment services, namely, computer security threat analysis for protecting data security, data privacy and managing cybersecurity regulations and standards; providing temporary use of non-downloadable cyber security software to reduce risk of cyber threats; providing temporary use of non-downloadable software for cyber security and cyber risk assessment; providing temporary use of non-downloadable cyber security software to detect and mitigate against cyber risks, threats and vulnerabilities; providing temporary use of non-downloadable cyber security software for preventing penetration by unauthorized computers and networks; providing temporary use of non-downloadable software for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; providing temporary use of non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing customizable training modules to software users who demonstrate susceptibility to malicious electronic mail; providing temporary use of non-downloadable software for cybersecurity training and reporting purposes that replicates real-world cyber-attacks to enable employees and others how to identify, report, and avoid cybersecurity threats; providing temporary use of non-downloadable software for use in analyzing and measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; providing temporary use of non-downloadable software for use in monitoring and tracking compliance with laws and regulations in the fields of data privacy and data security; providing temporary use of non-downloadable software for cybersecurity training; design, development, and implementation of software in the fields of cyber security and information assurance; software development and product development consulting in the field of cyber security and cyber risk assessment; design, development and implementation of strategies to address cyber risk exposure, namely, continuous cyber risk monitoring, targeted employee training, automated web vulnerability testing, cybersecurity regulation and standards tracking and management, cybersecurity compliance and control tracking, application security management and monitoring, and cloud application security monitoring; conducting computer security threat assessments of information technology IT security policies and procedures for protecting data; providing a website featuring information on cyber risk management and computer security


First Use Date in General

03rd Sep 2019

First Use Date in Commerce

03rd Sep 2019

Mark Details


Serial Number

No 88183271

Mark Type

No Service Mark

Attorney Docket Number

No 34976-6001

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Show more

Status DateAction Taken
02th Mar 2021REGISTERED-PRINCIPAL REGISTER
26th Jan 2021NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
26th Jan 2021NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED
25th Jan 2021ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED
25th Jan 2021STATEMENT OF USE PROCESSING COMPLETE
25th Jan 2021CASE ASSIGNED TO INTENT TO USE PARALEGAL
25th Jan 2021EXTENSION 3 GRANTED
07th Jan 2021USE AMENDMENT FILED
07th Jan 2021EXTENSION 3 FILED
07th Jan 2021TEAS STATEMENT OF USE RECEIVED