SYMANTEC

EUIPO EUIPO 2011 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark SYMANTEC was filed as Word mark on 06/15/2011 at the European Union Intellectual Property Office.
It was registered as a trademark on 01/03/2012. The current status of the mark is "Trademark registered".

Trademark Details Last update: March 19, 2024

Trademark form Word mark
File reference 010048072
Application date June 15, 2011
Publication date September 23, 2011
Entry date January 3, 2012
Expiration date June 15, 2031

Trademark owner

1320 Ridder Park Drive
95131 San Jose
US

Trademark representatives

Plaza de los Luceros, 17 8º Oficinas 03004 Alicante ES

goods and services

9 Computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer software for providing online transaction security; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer maintenance software; computer software for the back-up, storage, restoration and recovery of data, folders, and files; computer software, hardware, firmware and peripherals for network and Internet security data and system protection, and storage, server, client, and application performance management; downloadable software; computer hardware appliances that provide file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for use in disaster recovery; computer software for use in removable storage media management; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for use in the field of enterprise information management; computer software for use in the field of online analytical processing (OLAP); computer software for generating reports from databases; computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network; computer software for replicating and archiving files from one data store to another; computer software for metering the use of the other computer software; computer software for use in developing data analysis applications and other computer software; computer programs for data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; computer programs for use in teaching and training users in the use of computer software and/or computer hardware; computer programs for remotely monitoring, evaluating, demonstrating and controlling other computer programs or computer processes; computer programs for locking-down one or more computers on a computer network; computer hardware and software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; embedded software for network monitoring and security; embedded software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; computer software, namely, content management software which filters, monitors, reports on and controls use of and access to locations on computer systems and networks and on global communication networks; electronic mail and news group filtering software which prevents or shunts delivery of defined categories or origins of electronic mail messages and news postings; protection software which detects electronic inquiries for information from computer systems or of users of computer systems and organizes, monitors, controls and prevents provision of such information; privacy management software which prevents, monitors, certifies, aggregates and reports on the distribution and use of personal identification information on computer systems and networks and on global communications networks; file transfer filtering software which prevents, monitors, reports on or shunts delivery of defined categories, origins, volumes, or timeframes of electronic files; and chat filtering software which prevents, monitors, reports on, analyzes, or shunts delivery of defined categories, senders, recipients, origins, volumes or timeframes of conversations transmitted or stored electronically; computer software; computer software in the field of cryptographic network security and data security functions; computer software for integration of information logic and data between computer networks; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; computer software for identity security; computer software for authentication and identity management information security; computer software for digital information and data access; computer software for detecting identity fraud; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in networking computers; computer software for use in computer emulation; computer software for use in operating electronic mail; computer software for use in operating voice mail and voice messaging; computer software for use in database management; computer software for use in monitoring computers for security purposes; computer software for use with computer servers for controlling and managing server applications; computer telephony software; computer software for use in accessing databases; downloadable electronic publications in the nature of reference, user, technical and instructional manuals and data sheets for use with computer software, hardware, peripherals and firmware and downloadable electronic publications in the nature of manuals, white papers, articles, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books, pamphlets in the fields of computer software and computer and on-line security, and technical documentation manuals in the fields of computer hardware and software, digital telecommunications, consumer electronics, and information technologies; all the aforementioned goods excluding IP management software
16 Computer user manuals in the field of computers, computer hardware, computer software, computer peripherals, computer security, computer services, and computer networks; printed matter and publications, namely, books, magazines, newsletters, work books, quick reference guides, technical reference manuals and conference materials in the field of computers, computer hardware, computer software, computer peripherals, and computer networks; labels and holographic labels
35 Electronic storage of data files for clients to store and retrieve data via a global computer network; electronic document and email archiving services; providing data collection, storage, and retrieval services; computerized data verification; providing data collection, storage and retrieval services
38 Transmittal of anti-virus scanning and other network security software via a global computer network and electronic transmission of electronic mail communications and data featuring encryption and decryption through the management and filtering of mail sent via global computer network; information and consultancy with regard to aforementioned services; providing on-line forums for transmission of messages among computer users concerning computers, computer hardware, computer software, computer peripherals, computer systems, computer networks, computer-related equipment, computer security, information technology, electronic commerce technology and global computer network technology, mobile computing, communications networks and devices, and telecommunications equipment and devices; providing on-line chat rooms for transmission of messages among computer users concerning computers, computer hardware, computer software, computer peripherals, computer systems, computer networks, computer-related equipment, computer security, information technology, electronic commerce technology and global computer network technology, mobile computing, communications networks and devices, and telecommunications equipment and devices; providing data access and delivery services
42 Computer services; network and Internet security services; computer consultation; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; technical support services, namely, troubleshooting of computer hardware and software problems; technical support services, namely, providing back-up computer programs and facilities; computer virus protection services; computer software installation services; computer programming; computer software design for others; technical consultation in the field of computer software installation and maintenance; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; development, updating and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; application service provider services; notification and delivery of software updates; providing information and online database regarding computers, computer hardware, computer software, computer networks, computer-related services, data storage management, enterprise information management, and online analytical processing (OLAP); remote or on-site monitoring of computer systems; monitoring the computer systems of others and providing back-up computer programs and facilities; integration of computer systems and networks; computer services, namely providing information concerning the encryption and authentication of electronic data; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; web content categorization and filtering services; providing authentication of identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization of Internet and network firewall software for others; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; computer software consultation services for the development of software applications; designing and programming computer controlled communications systems; providing data conversion services; provision of security services for virtual private computer networks (VPNs); application hosting; computer services, namely, providing a computer software platform that bridges Internet and telephony services and enables users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; providing a computer software platform that provides faster Internet connections, web site resolution, and email delivery; services that support the on-boarding, formatting, distribution, translation, and mediation of digital content for distribution via networks; directory, discovery, and information services associated with Radio Frequency ID (RFID) and the Electronic Product Code (EPC) network; application service provider (ASP) featuring billing and customer relationship management software for wireless service providers; data automation and collection service using proprietary software to evaluate, analyze, and collect service data from communications carriers; data conversion of computer program data or information from communication carriers; application service provider (ASP), namely, hosting computer software applications for others; cross-platform conversion of digital content into other forms of digital content for distribution via networks; providing temporary use of on-line, non-downloadable software for storing, managing, tracking and analyzing data in the field of Radio Frequency ID (RFID) and the Electronic Product Code (EPC); designing, creating or maintaining of computer programs for computer networks using Radio Frequency ID (RFID) and the Electronic Product Code (EPC); hosting of digital content over the Internet for use in wireless communications and with wireless communication equipment and apparatus; research services relating to computer hardware and computer software; computer support services, namely, technical support and software update services; computer consulting services related to computer products and services; providing information in the field of new computer software applications, using computers at remote locations, and other computer and technology related issues; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; scientific and technological services, namely, technology consultation in the fields of computers, computer hardware, computer software, computer peripherals, computer systems, computer networks, computer security, information technology, electronic commerce technology and global computer network technology, communications networks and devices, consumer electronics, mobile computing, and telecommunications equipment and devices; providing consultants to help deploy, supervise and manage information technology projects; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; providing hosted electronic mail and instant messaging services; monitoring of computer systems for security purposes; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; business services in the nature of managed public key infrastructure (PKI) services, namely, application and network infrastructure security services; providing user authentication services in e-commerce transactions; business management, namely, issuance of digital certificates for authentication; providing information in the fields of global computer network and local area network security, preventing computer viruses and threats, computer hardware and software applications in security
45 Identity verification; security consultancy; licensing of technology, source code, computer software and other intellectual property; licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data; provision of information, and advisory and consultancy services, all relating to the aforesaid including such services provided on-line or via the Internet

Trademark history

Date Document number Area Entry
March 18, 2024 Change Representative, Published
March 7, 2022 Transfer / Change of address, Published
June 17, 2021 Extension, Trade mark renewed
April 2, 2020 Transfer / Change of address, Published
March 31, 2020 Change Representative, Published
March 2, 2020 Transfer / Change of address, Published
May 24, 2019 Change Representative, Published
April 12, 2016 RAW: Seniority - Claims of seniority, Published
June 23, 2015 Change Representative, Published
April 24, 2015 Change Representative, Published

ID: 11010048072