DIGITAL HANDS Trademark

Trademark Overview


On Monday, April 25, 2022, a trademark application was filed for DIGITAL HANDS with the United States Patent and Trademark Office. The USPTO has given the DIGITAL HANDS trademark a serial number of 97379903. The federal status of this trademark filing is REGISTERED as of Tuesday, March 26, 2024. This trademark is owned by Digital Hands, LLC. The DIGITAL HANDS trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:

Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security; providing online non-downloadable videos and electronic whitepapers and checklists featuring information in the fields of cybersecurity managed services and Information Technology (IT) and Internet of Things (IOT) security services

Computer security equipment, namely, computer hardware, and recorded and downloadable computer software for use in virtual environments and on premises for security protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; downloadable video recordings and electronic whitepapers and checklists featuring information in the fields of cybersecurity managed services and Information Technology (IT) and Internet of Things (IOT) security services

Providing managed security services, namely, the 24/7 monitoring, for protection and defense against cyber threats, malicious code, and malfunctioning hardware and software, of network systems, servers, web and database users and applications, and endpoint devices, monitoring, detection, and incident response for security breaches, and receiving, analyzing and providing notification of related events and alerts; providing cybersecurity services, namely, providing online non-downloadable computer software programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; providing cybersecurity services, namely, services related to ensuring the secure access to data and all the cybersecurity measures and controls in place to prevent unauthorized access, namely, providing cybersecurity protection from intrusion and data exfi...
digital hands

General Information


Serial Number97379903
Word MarkDIGITAL HANDS
Filing DateMonday, April 25, 2022
Status700 - REGISTERED
Status DateTuesday, March 26, 2024
Registration Number7334651
Registration DateTuesday, March 26, 2024
Mark Drawing3000 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s)
Published for Opposition DateTuesday, January 9, 2024

Trademark Statements


Goods and ServicesEducational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security; providing online non-downloadable videos and electronic whitepapers and checklists featuring information in the fields of cybersecurity managed services and Information Technology (IT) and Internet of Things (IOT) security services
Description of MarkThe mark consists of a stylized hand design, made up of three concentric curved lines, with the inner line forming a u shape, the middle line forming a j shape and the outer line forming a flattened j shape, shown above the letters "i" and "g" in the word "digital" with the words DIGITAL HANDS underneath the hand design.
Goods and ServicesComputer security equipment, namely, computer hardware, and recorded and downloadable computer software for use in virtual environments and on premises for security protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; downloadable video recordings and electronic whitepapers and checklists featuring information in the fields of cybersecurity managed services and Information Technology (IT) and Internet of Things (IOT) security services
Indication of Colors claimedColor is not claimed as a feature of the mark.
Goods and ServicesProviding managed security services, namely, the 24/7 monitoring, for protection and defense against cyber threats, malicious code, and malfunctioning hardware and software, of network systems, servers, web and database users and applications, and endpoint devices, monitoring, detection, and incident response for security breaches, and receiving, analyzing and providing notification of related events and alerts; providing cybersecurity services, namely, providing online non-downloadable computer software programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; providing cybersecurity services, namely, services related to ensuring the secure access to data and all the cybersecurity measures and controls in place to prevent unauthorized access, namely, providing cybersecurity protection from intrusion and data exfiltration services for IT and Internet of Things (IOT) systems and equipment; providing Information Technology (IT) and Internet of Things (IOT) managed services, namely, remote management of the Information Technology (IT) and Internet of Things (IOT) cloud computing systems of others; providing Information Technology (IT) and Internet of Things (IOT) security and cybersecurity services, namely, computer security and data security consulting; providing customized on-line web pages and data feeds featuring user-defined information, which includes blog posts, new media content, other on-line content, and on-line web links to other websites, all featuring information in the field of cybersecurity managed services and Information Technology (IT) and Internet of Things (IOT) security services; providing threat hunting and remediation services, namely, searching for malicious code and fixing the vulnerabilities; providing ransomware detection and remediation services namely, searching for anomalous activities and malicious operating behaviors and quarantining the damage and preventing spreading; providing endpoint detection and response services, namely, monitoring for malicious code and and halting the damage, repairing the vulnerability and preventing spreading; providing Information Technology (IT) and Internet of Things (IOT) vulnerability and compromise assessments, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; providing data log storage and correlation of cyber indicators of compromise, namely, storing such device and cloud generated logs to secure facilities with retention for searching and trend tracking to discover anomalous behavior; providing alerting of security indicators of compromise, namely, escalating triggered alarms for further action; providing hosting and technical skilled operations services for security and incident event management, namely, hosting a security incident and event monitoring tool that alerts and activates skilled security labor for escalations and remediation of faults; providing data privacy discovery and breach analysis services, namely, discovering where sensitive data resides and protecting it from security breaches; providing threat intelligence services, namely, computer security threat intelligence consulting; providing automation services for cyber security operations, namely, automating workflow to discover, triage, and repair breaches; providing proactive threat blocking to Information Technology (IT) and Internet of Things (IOT) devices, namely, preventing malicious activity from invading the perimeter at the edge of the network or the internet entry point; providing comprehensive realtime security visibility through portal and application access, namely, allowing end users to see into the ticketing systems and applications portals any of the pertinent protective security operations activities; providing cloud computing and premise anti-phishing and malware protection, namely, protecting resources from being exploited through email scams and malware insertion into the endpoint, device, or application; providing security administration and device and platform management, namely, maintaining and managing the uptime and availability of infrastructure; providing dark web monitoring and advisory services, namely, detecting and reporting hidden data about companies and users on the internet; providing cyber risk analysis, namely, identifying risks of potential data breaches and potential theft of sensitive data; providing security software and hardware configuration and deployment; providing identity management, namely, assuring end user access is authentic and verified.; providing patch management for critical Information Technology (IT) and Internet of Things (IOT) systems, namely, patching operating systems and applications for known vulnerabilities; providing secure edge access services, namely, providing secure access for users and applications to and from cloud resources; providing cloud computing security monitoring and managed services, namely, looking for malicious activities in cloud resources such as hosted email or financial systems access; providing workflow orchestration and automation services, namely, correlation of events from many devices and applications spanning network, cloud, and supply chain; providing secure network administration and management services, namely, expertly operating security controls and conducting adds, moves, and changes to those controls; providing security network traffic analysis services, namely, identifying and analyzing anomalous activities in the traffic traversing the network; proving security user and entity behavioral analytics, namely, identifying deviations of normal enterprise and user behavior in order to predict vulnerabilities and isolate areas of compromise; providing security data analytics, namely, computer security threat analysis for protecting data; providing cybersecurity protection from intrusion and data exfiltration services for Information Technology (IT) and Internet of Things (IOT) systems and equipment, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; software-as-a service (SAAS) services, namely, hosting software for use by others that integrates all security technology into one definition to allow automation and orchestration of security data in one source; software-as-a-service (SAAS) services featuring security orchestration, automation and response (SOAR) software solutions that combine incident response, orchestration and automation, and threat intelligence (TI) management capabilities in a single platform; software-as-a service (SAAS) services featuring SOAR software to document and implement playbooks, workflows and processes, support security incident management, and apply machine-based assistance to human security analysts and operators; software-as-a- service (SAAS) services featuring (SOAR) software that integrates workflows with other technologies to achieve desired outcomes, namely, incident triage, incident response, TI curation and management, and compliance monitoring and management

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 038, 026, 023, 036
Class Status Code6 - Active
Class Status DateSaturday, April 30, 2022
Primary Code009
First Use Anywhere DateMonday, November 14, 2011
First Use In Commerce DateMonday, November 14, 2011

International Class041 - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes107, 100, 101
Class Status Code6 - Active
Class Status DateSaturday, April 30, 2022
Primary Code041
First Use Anywhere DateMonday, November 14, 2011
First Use In Commerce DateMonday, November 14, 2011

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateSaturday, April 30, 2022
Primary Code042
First Use Anywhere DateMonday, November 14, 2011
First Use In Commerce DateMonday, November 14, 2011

Trademark Owner History


Party NameDigital Hands, LLC
Party Type30 - Original Registrant
Legal Entity Type16 - Limited Liability Company
AddressTampa, FL 33607

Party NameDigital Hands, LLC
Party Type20 - Owner at Publication
Legal Entity Type16 - Limited Liability Company
AddressTampa, FL 33607

Party NameDigital Hands, LLC
Party Type10 - Original Applicant
Legal Entity Type16 - Limited Liability Company
AddressTampa, FL 33607

Trademark Events


Event DateEvent Description
Tuesday, March 26, 2024NOTICE OF REGISTRATION CONFIRMATION EMAILED
Tuesday, March 26, 2024REGISTERED-PRINCIPAL REGISTER
Tuesday, January 9, 2024OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, January 9, 2024PUBLISHED FOR OPPOSITION
Wednesday, December 20, 2023NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Wednesday, November 29, 2023APPROVED FOR PUB - PRINCIPAL REGISTER
Wednesday, November 29, 2023EXAMINER'S AMENDMENT ENTERED
Wednesday, November 29, 2023NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
Wednesday, November 29, 2023EXAMINERS AMENDMENT E-MAILED
Wednesday, November 29, 2023EXAMINERS AMENDMENT -WRITTEN
Saturday, August 19, 2023TEAS/EMAIL CORRESPONDENCE ENTERED
Friday, August 18, 2023CORRESPONDENCE RECEIVED IN LAW OFFICE
Friday, August 18, 2023TEAS RESPONSE TO OFFICE ACTION RECEIVED
Thursday, May 18, 2023APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED
Thursday, May 18, 2023APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED
Saturday, February 18, 2023NOTIFICATION OF NON-FINAL ACTION E-MAILED
Saturday, February 18, 2023NON-FINAL ACTION E-MAILED
Saturday, February 18, 2023NON-FINAL ACTION WRITTEN
Friday, February 10, 2023ASSIGNED TO EXAMINER
Tuesday, May 3, 2022NOTICE OF DESIGN SEARCH CODE E-MAILED
Saturday, April 30, 2022NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Thursday, April 28, 2022NEW APPLICATION ENTERED