9
Software for use in computer, data, network, Internet and mobile device security and privacy, namely, digital security software, digital privacy protection software and data masking, anonymization and obfuscation software; computer software for protecting the privacy, identity and location of users and content of data on the Internet, networks, mobile devices and other electronic and wireless communications; computer software for encrypting data on the Internet, networks, mobile devices and other electronic and wireless communications; computer software for securing the integrity of data, computer networks, mobile devices, electronic and wireless communications; downloadable mobile applications for protecting digital privacy and security; computer software for preventing unauthorized access to and use of computer networks and systems; computer software for providing security for Internet, network, mobile device and other electronic communications; downloadable computer software for operational technology and internet of things; downloadable computer software for use in computer, data, email, network and mobile device security, namely, digital security software and computer utility software; computer software for establishing, managing, and sustaining software-defined wide area networks and moving target defense-based software-defined wide area networks; computer software for establishing, managing, and sustaining virtual desktops
25
Clothing, namely, shirts, sweatshirts, jackets; socks
38
Telecommunication services, namely, providing transmission of data by electronic means; providing private digital networking services, private and secure electronic communications over a private or public computer network; providing private electronic messaging; providing secure electronic and wireless communications over telecommunications networks; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks; providing moving target defense-based software-defined wide area networks; providing software-defined wide area networks; providing on-demand machine-to-machine and human-to-machine communications platforms
42
Providing anonymization services in the nature of on-line security services, namely, providing security and anonymity for users of computer networks; researching, designing, implementing and updating software for use in digital privacy and digital security; providing software as a service (SAAS) services featuring software to allow users to transmit and share data and content privately, anonymously and securely online; cloud hosting provider services; providing digital services in the nature of providing online non-downloadable software for protecting the privacy, identity and location of users and content of data in email, Internet, network, mobile device and other electronic and wireless communications; computer services, namely, hosting an interactive website featuring technology that allows users to protect their privacy, identity and location and content of data in email, Internet, network, mobile device and other electronic and wireless communications; providing temporary use of online non-downloadable computer software for encrypting data in email, Internet, network, mobile device and other electronic and wireless communications; providing temporary use of online non-downloadable computer software for securing the integrity of data, computer networks, mobile devices, electronic and wireless communications; providing online non-downloadable mobile applications for protecting digital privacy and security; providing temporary use of online non-downloadable computer software for preventing unauthorized access to and use of computer networks and systems; providing temporary use of online non-downloadable computer software for protecting security in email, Internet, network, mobile device and other electronic communications; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing temporary use of online non-downloadable software for operational technology and internet of things; providing online non-downloadable computer software for use in computer, data, email, network and mobile device security, namely, digital security software and computer utility software; providing online non-downloadable software for establishing, managing, and sustaining software-defined wide area networks and moving target defense-based software-defined wide area networks; providing online non-downloadable software for establishing, managing, and sustaining virtual desktops