9
Utility, security and cryptography software; Software for network and device security; Software development tools; Security software; Network access server hardware; Downloadable mobile applications for the management of information; Internet access software; Downloadable computer software for the management of information; Computer software for biometric systems for the identification and authentication of persons
42
Updating of computer software relating to computer security and prevention of computer risks; Software development, programming and implementation; Software design and development; Rental of Internet security programs; Provision of security services for computer networks, computer access and computerised transactions; Provision of computer security risk management programs; Providing information in the field of information technology; IT security, protection and restoration; Providing information in the field of computer software design; Programming of Internet security programs; Monitoring of computer systems for security purposes; Maintenance of computer software relating to computer security and prevention of computer risks; IT consultancy, advisory and information services; Internet security consultancy; Digital asset management; Electronic monitoring of personally identifying information to detect identity theft via the internet; Development of software for secure network operations; Design and development of virtual private network (VPN) operating software; Development of computer hardware and software; Design and development of Internet security programs; Design and development of electronic data security systems; Data security services; Consultancy services for analysing information systems; Consultancy in the field of security software; Consultancy in the field of data security; Consultancy and information services relating to information technology architecture and infrastructure; Consultancy in the field of computer security; Consultancy and information services relating to computer system integration; Computer security threat analysis for protecting data; Computer security services in the nature of administering digital certificates; Computer programming services for electronic data security; Computer and information technology consultancy services; Authentication services for computer security; Advisory services relating to computer based information systems
45
Consultancy in the field of data theft and identity theft; Identity validation services