Trademark Overview
On Sunday, December 10, 2006, a trademark application was filed for WHO'S IN YOUR WALLET with the United States Patent and Trademark Office. The USPTO has given the WHO'S IN YOUR WALLET trademark a serial number of 77060865. The federal status of this trademark filing is ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE as of Tuesday, November 13, 2007. This trademark is owned by natalie petouhoff. The WHO'S IN YOUR WALLET trademark is filed in the Paper & Printed Material Products and Education & Entertainment Services categories with the following description:
Educational books featuring identity theft, cyber theft, phishing, pharming, evil twins, man-in-the-middle attacks, spyware, firewalls, identity monitoring, viruses, WiFi, background checks, identity monitoring and protections, password encryption, financial terrorism, cybershopping, online shopping safety, secruity software, key stroke logging, Recovery agents, credit card fraud, trojan horses, screen scrapping, zombie computers, worms, Botnets, SSL website encryption, emotional impact of identity theft, length of time and allocation of resources to correct financial records, including credit reports, banks relationships, lack of access to apply for loans, jobs, identity cloning, criminal identity theft, sale of children's social security numbers, URL obfuscation, DNS cache Poisoning, cybermobsters, hackers, faliacy of Secure Socket Layer safety, corporate database break-ins, lack of corporate compliance, variations in state laws for reporting consumer data that is compromised, lack o...
Educational services,namely, conducting classes, TV and radio segments, podcasts, website content, printed articles, conferences, workshops, blogs in the field of pharming, evil twins, man-in-the-middle attacks, spyware, firewalls, identity monitoring, viruses, WiFi, background checks, identity monitoring and protections, password encryption, financial terrorism, cybershopping, online shopping safety, secruity software, key stroke logging, Recovery agents, credit card fraud, trojan horses, screen scrapping, zombie computers, worms, Botnets, SSL website encryption, emotional impact of identity theft, length of time and allocation of resources to correct financial records, including credit reports, banks relationships, lack of access to apply for loans, jobs, identity cloning, criminal identity theft, sale of children's social security numbers, URL obfuscation, DNS cache Poisoning, cybermobsters, hackers, faliacy of Secure Socket Layer safety, corporate database break-ins, lack of corpor...