Goods and Services | [ Application software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; computer software programs for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; recorded computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; downloadable computer software controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security for business purposes; ] computer software for authorising access to data bases; [ computer software products, for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; ] computer software programs for email management; interactive computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; [ computer software downloaded from the internet for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; ] active electronic labels containing coded information; apparatus for electronic digital processing, namely, data processors and digital signal processors; computer software for data security; computer software for protection of data; computer software for secure communication; computer software for internet security |
Goods and Services | online retail store services featuring computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security; online wholesale store services featuring computer software for controlling information flow, for controlling information access, for integration of business systems with email flow, for authorising access to information systems, for extending third party systems, namely, email systems and document management systems for controlling information access, for email management, for use in data privacy, for use in protection of data, for use in secure communication, for use in management of internet security, for classifying data, for enforcing security classification policy to files and email, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems for automatically classifying data, for limiting the distribution of sensitive information, for use in data security |
Goods and Services | Computer security services, namely, design and development of security computer software and systems; computer security services, namely, computer programming and software installation, repair and maintenance services; authentication services for electronic documents; authentication services for email; digitization of documents; [ computer software advisory services; computer software development; computer software engineering; computer software programming; computer software consultancy; computer support services, namely, computer software design and development advisory and information services; computer support services, namely, computer programming and software installation, repair and maintenance services; ] computerised business information storage, namely, electronic storage of files and documents; computerised data storage services including online, namely, electronic data storage; [ hosting of software as a service in the nature of software as a service (SAAS) services, namely, hosting software for use by others for use in security services, for controlling information flow, for controlling information access, for integration of business systems with email flow, for automatically classifying data, for limiting the distribution of sensitive information, for extending third party systems, namely, email, word processing, spreadsheet, presentation applications, file systems and document management systems to enforce security classification policy; information technology consulting services; data security consultancy; ] data security services, namely, design and development of electronic data security systems; internet security consultancy; network security services in the nature of test and risk assessment of electronic networks, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; security assessment services for computer networks, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability and in the field of data security and privacy |