9
Computer hardware; wireless access points; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; downloadable electronic publications and data in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; mouse pads, webcam covers, USB hardware, mobile phone battery chargers, mobile phone cases
16
Paper and cardboard; printed matter; stationery; office requisites (except furniture); instructional and teaching material (except apparatus); plastic materials for packaging
21
Household containers; drinking vessels and containers; water bottles; lunch boxes; food storage containers
25
Clothing, footwear, headgear
28
Games and playthings; gymnastic and sporting articles; surfboards; skateboards; flying discs
35
Business services; administration of a program for enabling participants to receive expedited sales support services in the field of data security, computer security, and network security; business administration services; customer service management for others; promoting the use of the security assurance best practices of others in the field of cloud computing; value-added reseller services connected with the resale of computer hardware and computer software; distributorship services of computer hardware and computer software; database management; on-line commercial ordering services, provided via a website, in the field of computer hardware and computer software; wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software; providing information to businesses regarding privacy, data security, and computer security
37
Installation, maintenance and repair of computer hardware; technical advice related to installation and repair of computer hardware
41
Education; providing of training; educational services; conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the fields of information technology, computers, data security, computer security, and network security and distribution of training materials in connection therewith
42
Computer programming services for the protection of software; data security services; computer software technical support services; installation, maintenance and repair of computer software; computer security consultancy; computer consulting services; computer software, hardware, firmware, network, and computer security consulting services; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer development services; computer programming services; computer virus protection services; computer security services by way of notification of unauthorized electronic messages and related computer attacks; computer security services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing information on data security, and computer security; troubleshooting of computer software problems; technical advice related to computer and computer network security; monitoring of computer systems for security purposes; technical support services; troubleshooting in the nature of the repair of computer hardware
45
Providing online information in the field of development of privacy, security and data governance law; providing information in the field of security via a website; security consultancy services in the nature of providing information on privacy of business information and of individuals