CLARITY Trademark

Trademark Overview


On Wednesday, November 8, 2023, a trademark application was filed for CLARITY with the United States Patent and Trademark Office. The USPTO has given the CLARITY trademark a serial number of 98260471. The federal status of this trademark filing is RESPONSE AFTER NON-FINAL ACTION - ENTERED as of Tuesday, February 11, 2025. This trademark is owned by Quorum Cyber Security Limited. The CLARITY trademark is filed in the Computer & Software Services & Scientific Services category with the following description:

Cyber security risk management services, namely, technology consulting in the field of cyber security; software as a service (SAAS) services featuring software for collection, analysis and monitoring of security breach data relating to computer, Internet and cyber security; software as a service (SAAS) services featuring software for monitoring, identifying and reporting on computer network issues and security threats, breaches, incidents and attacks; software as a service (SAAS) services featuring software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; software as a service (SAAS) services featuring software for allowing users to monitor operation of cyber security systems and receive system analysis and feedback; software as a service (SAAS) services featuring software for allowing users to view and to manage in real time any cyber security threats, breaches, incidents and attacks; software as a service (SAAS) services feat...
clarity

General Information


Serial Number98260471
Word MarkCLARITY
Filing DateWednesday, November 8, 2023
Status661 - RESPONSE AFTER NON-FINAL ACTION - ENTERED
Status DateTuesday, February 11, 2025
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesCyber security risk management services, namely, technology consulting in the field of cyber security; software as a service (SAAS) services featuring software for collection, analysis and monitoring of security breach data relating to computer, Internet and cyber security; software as a service (SAAS) services featuring software for monitoring, identifying and reporting on computer network issues and security threats, breaches, incidents and attacks; software as a service (SAAS) services featuring software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; software as a service (SAAS) services featuring software for allowing users to monitor operation of cyber security systems and receive system analysis and feedback; software as a service (SAAS) services featuring software for allowing users to view and to manage in real time any cyber security threats, breaches, incidents and attacks; software as a service (SAAS) services featuring software for responding to cyber security alerts and incidents, and nullifying potential security threats; software as a service (SAAS) services featuring software for cyber and web security, for the protection of web applications, mobile applications and application programming interfaces (APIs) from cyber attack and fraud; software as a service (SAAS) services featuring computer software for detection, blocking and handling removal and remedying of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices and mobile digital devices; platform as a service (PaaS) featuring computer software platforms for collection, analysis and monitoring of security breach data relating to computer, Internet and cyber security; platform as a service (PaaS) featuring computer software platforms for alerting, tracking, detection, blocking and monitoring of security threats, and for preparing reports thereon; platform as a service (PaaS) featuring computer software platforms for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; information security and data protection services in computer systems, networks and networked infrastructures, namely, detection, blocking, monitoring and inspecting to detect attacks, unauthorised and intrusive access and actions, and violations to data protection and information security; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in and with secure operation centres (SOC), cyber defence centres (CDC) and information sharing and analysis centres (ISAC); design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; providing temporary use of online non-downloadable computer security risk management software and programs; computer security system monitoring services, namely, monitoring of computer systems for detecting unauthorized access or data breach; computer security threat analysis for protecting data; computer programming services for electronic data security; design and development of electronic data security systems; computer security services for protection against unauthorised network access; installation, repair and maintenance of computer software relating to computer security and prevention of computer risks; data security services in the nature of data encryption services; authentication services for computer security, namely, user authentication services using using single sign-on technology for online software; Computer security consultancy in the field of IT security, protection and restoration; Computer security advisory services relating to handling cyber security threats, breaches and attacks; cloud security services, namely, protection of cloud technologies and systems against cyber security threats, breaches and attacks by means of computer programs and software for providing firewall filters, network security functionality, data encryption and interoperability with network security protocols; computer security testing to locate and address potential security weaknesses; IT services for data management and protection, namely, computer security consultancy; IT services for data management and protection to mitigate risk of data loss, theft and exfiltration, namely, computer security consultancy; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for security services relating to cyber risks and compliance requirements; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer software for providing computerised incident response security solutions; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for cyber security portals; design, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for responding to, monitoring, mitigating, investigating and providing reports on cyber security incidents; advisory services relating to strategic and technical measures to improve cyber security, namely, computer security consultancy; integration and configuration of computer hardware, firmware and software, apparatus and instruments in the fields of computer and network security; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in providing security for computer networks, including virtual private networks; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in providing firewall filters, network security functionality, data encryption and interoperability with network security protocols; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in protecting against network intrusions and viruses; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in monitoring, analysing and assessing security vulnerabilities in computer networks; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in running security tests and network performance tests; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for collection, analysis and monitoring of network traffic and security breach incidents; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in the fields of cybersecurity, computer analytics, computer forensics, forensic data investigation, electronic evidence discovery and business loss valuation; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer programs and software for use in fields of malware, unauthorised software, network security threats, breaches and attacks; design, research, development, programming, implementation, installation, updating, modification, customisation, configuration, programming, maintenance, monitoring, repair and engineering of computer software for use in the fields of responding to and mitigating cyber incidents, incident response, ransomware and hacking; computer, network, infrastructure and data security services; provision of data security services for computer and communication networks; data security services in the nature of remote and on-site monitoring of computers, networks, infrastructure for protecting data and information from unauthorized access; provision of technical audit services to assess security of computers, networks and infrastructure; technical and technical consultancy services for the administration and troubleshooting of computer network hardware and software; cloud computing featuring software for secure authentication of network devices; collection and reporting of network security data electronic monitoring and reporting of computer data for computer network security; information, advisory and consultancy services relating to all the aforesaid services

Classification Information


International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateWednesday, December 6, 2023
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameQuorum Cyber Security Limited
Party Type10 - Original Applicant
Legal Entity Type99 - Other
AddressEdinburgh EH129DQ
GB

Trademark Events


Event DateEvent Description
Saturday, November 11, 2023NEW APPLICATION ENTERED
Wednesday, December 6, 2023NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Monday, June 17, 2024ASSIGNED TO EXAMINER
Saturday, August 10, 2024NON-FINAL ACTION WRITTEN
Saturday, August 10, 2024NON-FINAL ACTION E-MAILED
Saturday, August 10, 2024NOTIFICATION OF NON-FINAL ACTION E-MAILED
Wednesday, November 6, 2024APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED
Wednesday, November 6, 2024APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED
Monday, February 10, 2025CORRESPONDENCE RECEIVED IN LAW OFFICE
Monday, February 10, 2025TEAS RESPONSE TO OFFICE ACTION RECEIVED
Tuesday, February 11, 2025TEAS/EMAIL CORRESPONDENCE ENTERED