PEOPLE-DEFINED SECURITY Trademark

Trademark Overview


On Tuesday, March 1, 2022, a trademark application was filed for PEOPLE-DEFINED SECURITY with the United States Patent and Trademark Office. The USPTO has given the PEOPLE-DEFINED SECURITY trademark a serial number of 97289139. The federal status of this trademark filing is REGISTERED as of Tuesday, May 2, 2023. This trademark is owned by Appgate Cybersecurity, Inc.. The PEOPLE-DEFINED SECURITY trademark is filed in the Education & Entertainment Services and Computer & Software Services & Scientific Services categories with the following description:

educational services, namely, providing training in the use of software in the field of data security

software as a service (saas) featuring software in the fields of data security for secure network access, data and software security, encryption, and content compliance and governance; providing temporary use of an online non-downloadable software application featuring enterprise test management software that enables companies to create and manage organizational standards and policies for web site quality, accessibility, privacy, usability, searchability and custom quality factors and to verify compliance with such organizational standards and policies; providing temporary use of online non-downloadable software for securing documents, data, and information, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information; software as a service (saas) services, namely, hosting software for use by others for use securing documents, data and information, protection of documents, dat...
people-defined security

General Information


Serial Number97289139
Word MarkPEOPLE-DEFINED SECURITY
Filing DateTuesday, March 1, 2022
Status700 - REGISTERED
Status DateTuesday, May 2, 2023
Registration Number7040737
Registration DateTuesday, May 2, 2023
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, February 14, 2023

Trademark Statements


Goods and Serviceseducational services, namely, providing training in the use of software in the field of data security
Disclaimer with Predetermined Text"SECURITY"
Goods and Servicessoftware as a service (saas) featuring software in the fields of data security for secure network access, data and software security, encryption, and content compliance and governance; providing temporary use of an online non-downloadable software application featuring enterprise test management software that enables companies to create and manage organizational standards and policies for web site quality, accessibility, privacy, usability, searchability and custom quality factors and to verify compliance with such organizational standards and policies; providing temporary use of online non-downloadable software for securing documents, data, and information, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information; software as a service (saas) services, namely, hosting software for use by others for use securing documents, data and information, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information; evaluation of computer systems, namely, analysis of internal computer systems, extranet computer systems and global computer network systems, for others; implementing computer software systems for others; designing, developing, implementing and monitoring computer networks and computer systems for others; computer and network monitoring services, namely, monitoring technological functions of websites and computer network systems for others, load balancing of servers, and computer network security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, scanning and penetration testing of computers and networks to assess information security vulnerability, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; providing temporary use of online, non-downloadable software for accessing and using a cloud computing network; software as a service (saas), namely, hosting software applications for others in the fields of information technology (it) systems and information security management; application service provider (asp) services, namely, hosting computer software applications of others; consulting services in the field of software as a service (saas); technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and internet services; providing temporary use of online, non-downloadable computer software for compliance management and risk analysis in the fields of computer and network security; providing temporary use of online non-downloadable network security software; providing temporary use of online nondownloadable identity verification software; providing temporary use of online nondownloadable network auditing software in the fields of secure communications and data networks; computer consultation in the nature of consultation about the maintenance and updating of computer software and computer technology consultancy and providing technical consulting information in the field of internet and network security and secure transmission of data and information; technical consulting services in the field of electronic storage and archiving of data for others; infrastructure as a service (iaas), namely, providing remotely accessible storage capacity in the nature of electronic storage of data; technical support services, namely, remote administration and management of virtual infrastructure storage; storage services for archiving of electronic data; providing a website featuring information in the field of electronic data storage products and services; computer security services, namely, monitoring of computers, websites, computer networks and communications network systems for security purposes; computer networks and communications network security services in the nature of intrusion protection via firewall software, computer security threat analysis for protecting data, managed IT system security services in the nature of computer security consultancy to assess information security vulnerability; computer security incident response services in the nature of software as a service services (SaaS) featuring software for computer security incident mitigation and resolution, computer forensic services, and penetration testing of computers and networks to assess information security vulnerability; providing electronic user authentication services using software technology for e-commerce transactions and online software applications to others in the field of voice and data communication services via computer networks; computer security services in the nature of the issuance and validation of digital certificates and other electronic security credentials in the nature of electronic access codes for others; identity as a service (idaas), namely, providing cloud-based computer network identification verification and authentication services via software technology for security purposes; computer security services, namely, secure hosted electronic storage of passwords, digital credentials and electronic identity information relating to persons, accounts and devices for security purposes; providing temporary use of online, nondownloadable software for fraud prevention and access authorization for verifying a user's true identity, both on-line and on-site, in the fields of controlling access to information, medical records, computer systems, websites, online services, e-commerce and financial transactions; consulting services in the field of computer security and communications network security; providing a website featuring information in the fields of internet, network, computer and data security, as well as online fraud and identity theft protection; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer services, namely, providing search engines for obtaining data and information on a global computer network; computer services, namely, providing a website featuring a media aggregator and search engine for internet content; providing a search engine on the Internet for information; provision of internet search engines; providing a website featuring on-line non-downloadable software that enables users to scan websites and identify malicious code injections, providing an assessment of the type and risk level of malware attacks, theft of credentials, and theft of other forms of personal data; providing a website featuring on-line non-downloadable software that enables users to obtain malware injection attack visibility by taking a screenshot of a malware-injected web page, enhancing attack detection accuracy and assisting in forensic investigations; providing temporary use of non-downloadable electronic fraud, identity theft and cyberattack protection and monitoring software; software as a service (saas) services featuring software for reporting, policy analytics and data visualization relating to domain-based message authentication, reporting, conference, and compliance with applicable standards for the same; providing temporary use of non-downloadable electronic fraud and identity theft protection software; providing online non-downloadable secure software for providing safe browsing to users in e-commerce transactions, online financial transactions and online communications; electronic information security consulting, namely, penetration testing of computers and networks to assess information security vulnerability, analysis of software application code, and computer security threat analysis of software applications for protecting data; computer security services for protecting data and information from unauthorized access, in the nature of electronic monitoring of computer networks for cyber attack incidents and providing information regarding such incidents; online fraud protection services, namely, electronic monitoring of personally identifying information and electronic transaction activity to detect fraud and identity theft via the internet; computer security services for protecting data and information from unauthorized access, in the nature of electronic monitoring of credit reports, Internet traffic and public records to facilitate the prevention of identity theft and fraud; electronic fraud protection services, namely, design and implementation of software and technology solutions for the purpose of electronic brand monitoring, to protect against counterfeiting, tampering, and diversion; electronic identification services, namely, providing user authentication services using technology for e-commerce transactions, online financial transactions, and online communications; providing on-line non-downloadable software for integrating and allowing for communication between electronic fraud, identify theft protection, unauthorized access detection, and policy and decision-making software systems; Software as a service (SAAS) services, namely, hosting software for use by others for integrating and allowing for communication between electronic fraud, identify theft protection, unauthorized access detection, and policy and decision-making software systems; providing online, nondownloadable computer software for data analytics, comprehensive data processing, visual analytics, machine learning and document production for use in digital investigations, e-discovery, intelligence mining and corporate communication compliance; consulting services in connection with enterprise test management software that enables companies to create and manage organizational standards and policies for web site quality, accessibility, privacy, usability, searchability and custom quality factors and to verify compliance with such organizational standards and policies

Classification Information


International Class041 - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes100, 101, 107
Class Status Code6 - Active
Class Status DateFriday, March 4, 2022
Primary Code041
First Use Anywhere DateMonday, September 20, 2021
First Use In Commerce DateMonday, September 20, 2021

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateFriday, March 4, 2022
Primary Code042
First Use Anywhere DateMonday, September 20, 2021
First Use In Commerce DateMonday, September 20, 2021

Trademark Owner History


Party NameAppgate Cybersecurity, Inc.
Party Type30 - Original Registrant
Legal Entity Type03 - Corporation
AddressCoral Gables, FL 33134

Party NameAppgate Cybersecurity, Inc.
Party Type20 - Owner at Publication
Legal Entity Type03 - Corporation
AddressCoral Gables, FL 33134

Party NameAppgate Cybersecurity, Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressCoral Gables, FL 33134

Trademark Events


Event DateEvent Description
Tuesday, May 2, 2023NOTICE OF REGISTRATION CONFIRMATION EMAILED
Tuesday, May 2, 2023REGISTERED-PRINCIPAL REGISTER
Tuesday, February 14, 2023OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, February 14, 2023PUBLISHED FOR OPPOSITION
Wednesday, January 25, 2023NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Thursday, January 12, 2023APPROVED FOR PUB - PRINCIPAL REGISTER
Wednesday, January 11, 2023TEAS/EMAIL CORRESPONDENCE ENTERED
Tuesday, January 10, 2023CORRESPONDENCE RECEIVED IN LAW OFFICE
Tuesday, January 10, 2023TEAS RESPONSE TO OFFICE ACTION RECEIVED
Tuesday, December 13, 2022NOTIFICATION OF NON-FINAL ACTION E-MAILED
Tuesday, December 13, 2022NON-FINAL ACTION E-MAILED
Tuesday, December 13, 2022NON-FINAL ACTION WRITTEN
Tuesday, December 13, 2022ASSIGNED TO EXAMINER
Friday, March 4, 2022NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Friday, March 4, 2022NEW APPLICATION ENTERED