HUMAN-CENTRIC CYBERSECURITY Trademark

Trademark Overview


On Monday, March 11, 2019, a trademark application was filed for HUMAN-CENTRIC CYBERSECURITY with the United States Patent and Trademark Office. The USPTO has given the HUMAN-CENTRIC CYBERSECURITY trademark a serial number of 88333592. The federal status of this trademark filing is ABANDONED - NO STATEMENT OF USE FILED as of Monday, September 13, 2021. This trademark is owned by Forcepoint LLC. The HUMAN-CENTRIC CYBERSECURITY trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:

Computer hardware; downloadable computer software, namely, downloadable software for the creation of firewalls, downloadable software for security analytics, downloadable software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, downloadable software for network security, load balancing, and routing, downloadable software for web, hardware, network, computer and internet security, downloadable software for monitoring and/or controlling access to sites and locations on a global computer network, downloadable software that enables safe, secure and simultaneous data movement within and between computer networks, downloadable software that enables, controls and audits sharing of information across computer networks, downloadable software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and downloadabl...

Providing computer software services, namely, web, hardware, network, computer and internet security services by restricting and monitoring access to unauthorized areas in a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security; providing temporary use of non-downloadable computer software, namely, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and/or controlling access to sites and locations on a global computer network, software that enables safe, secure and simulta...
human-centric cybersecurity

General Information


Serial Number88333592
Word MarkHUMAN-CENTRIC CYBERSECURITY
Filing DateMonday, March 11, 2019
Status606 - ABANDONED - NO STATEMENT OF USE FILED
Status DateMonday, September 13, 2021
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, December 17, 2019

Trademark Statements


Disclaimer with Predetermined Text"CYBERSECURITY"
Goods and ServicesComputer hardware; downloadable computer software, namely, downloadable software for the creation of firewalls, downloadable software for security analytics, downloadable software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, downloadable software for network security, load balancing, and routing, downloadable software for web, hardware, network, computer and internet security, downloadable software for monitoring and/or controlling access to sites and locations on a global computer network, downloadable software that enables safe, secure and simultaneous data movement within and between computer networks, downloadable software that enables, controls and audits sharing of information across computer networks, downloadable software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and downloadable software that provides users with simultaneous access to multiple computer networks; recorded computer software, namely, recorded software for the creation of firewalls, recorded software for security analytics, recorded software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, recorded software for network security, load balancing, and routing, recorded software for web, hardware, network, computer and internet security, recorded software for monitoring and/or controlling access to sites and locations on a global computer network, recorded software that enables safe, secure and simultaneous data movement within and between computer networks, recorded software that enables, controls and audits sharing of information across computer networks, recorded software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and recorded software that provides users with simultaneous access to multiple computer networks; downloadable computer software for security and protection, namely, downloadable software for providing web security and protection, providing e-mail messaging security and protection, and for data loss prevention; recorded computer software for security and protection, namely, recorded software for providing web security and protection, providing e-mail messaging security and protection, and for data loss prevention; downloadable computer software for the security and protection of data, networks and communications; recorded computer software for the security and protection of data, networks and communications
Goods and ServicesProviding computer software services, namely, web, hardware, network, computer and internet security services by restricting and monitoring access to unauthorized areas in a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security; providing temporary use of non-downloadable computer software, namely, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and/or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of non-downloadable computer software for security and protection, namely, software for use in maintaining and monitoring web security, data security and e-mail security; Software as a Service (SaaS) services, namely, hosting cloud and datacenter infrastructure software for use in computer security and restricting access to computers and web sites; cloud computing services featuring computer software for use in security and protection, namely, software for restricting and monitoring access to a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and/or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of online non-downloadable computer software for the security and protection of data, networks, and communications
Pseudo MarkHUMAN-CENTRIC CYBER SECURITY

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateThursday, March 28, 2019
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, March 28, 2019
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameFORCEPOINT FEDERAL HOLDINGS LLC
Party Type21 - New Owner After Publication
Legal Entity Type16 - Limited Liability Company
AddressAUSTIN, TX 78759

Party NameForcepoint LLC
Party Type20 - Owner at Publication
Legal Entity Type16 - Limited Liability Company
AddressAustin, TX 78759

Party NameForcepoint LLC
Party Type10 - Original Applicant
Legal Entity Type16 - Limited Liability Company
AddressAustin, TX 78759

Trademark Events


Event DateEvent Description
Monday, September 13, 2021ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED
Monday, September 13, 2021ABANDONMENT - NO USE STATEMENT FILED
Wednesday, September 8, 2021ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY
Wednesday, June 30, 2021ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY
Wednesday, May 19, 2021AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
Thursday, February 11, 2021NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Tuesday, February 9, 2021EXTENSION 2 GRANTED
Tuesday, February 9, 2021EXTENSION 2 FILED
Tuesday, February 9, 2021TEAS EXTENSION RECEIVED
Wednesday, February 3, 2021ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY
Friday, July 10, 2020NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Wednesday, July 8, 2020EXTENSION 1 GRANTED
Wednesday, July 8, 2020EXTENSION 1 FILED
Wednesday, July 8, 2020TEAS EXTENSION RECEIVED
Tuesday, February 11, 2020NOA E-MAILED - SOU REQUIRED FROM APPLICANT
Tuesday, December 17, 2019OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, December 17, 2019PUBLISHED FOR OPPOSITION
Wednesday, November 27, 2019NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Thursday, November 14, 2019ASSIGNED TO LIE
Monday, November 11, 2019APPROVED FOR PUB - PRINCIPAL REGISTER
Monday, October 21, 2019TEAS/EMAIL CORRESPONDENCE ENTERED
Monday, October 21, 2019CORRESPONDENCE RECEIVED IN LAW OFFICE
Monday, October 21, 2019TEAS RESPONSE TO OFFICE ACTION RECEIVED
Thursday, April 25, 2019NOTIFICATION OF NON-FINAL ACTION E-MAILED
Thursday, April 25, 2019NON-FINAL ACTION E-MAILED
Thursday, April 25, 2019NON-FINAL ACTION WRITTEN
Wednesday, April 24, 2019ASSIGNED TO EXAMINER
Thursday, March 28, 2019NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
Wednesday, March 20, 2019ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY
Thursday, March 14, 2019NEW APPLICATION ENTERED IN TRAM