9
Computer software for providing network, Internet, and computer security; computer software used for Internet content filtering, web security and parental control; computer software for controlling access to websites, files, media, individuals and facilities; computer software for providing online identity protection and parental control; computer software for providing intrusion detection and prevention; Internet security software, including computer software for use in the monitoring, controlling, scanning and tracking of computer and online activity; computer software for providing online transaction security; fraud protection software; computer optimization software; content filtering software; fire wall software; privacy control software; computer software for detecting, filtering, monitoring, reporting, blocking, removing, and preventing unsolicited, unwanted or content-inappropriate electronic mail, data, sounds and images
42
Computer services, namely, computer programming and design and development of computer hardware and software; Internet security services, namely, development of software for Internet security; providing temporary use of on-line non-downloadable software applications, namely, monitoring social networking sites, providing a filtering mechanism on internet searches separating desired results from unwanted and inappropriate websites, providing a parental control function on obscene and inappropriate websites; computer services, namely, downloading, installation and running of security software applications, screening and blocking unwanted e-mail, and parental controls of Internet activities provided by communication devices, e-mail, and on-line via the Internet; computer services, namely monitoring, regulating, and analyzing computer and internet usage for others, and generating reports regarding same; computer consultation in the field of computer security; computer services, namely providing information concerning the encryption and authentication of electronic data, namely, authentication of email and documents; encryption and decryption of data and communications; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of computer Internet security, prevention of computer threats, and information about computer hardware and software applications in security, namely, information about assessing computer security and threats, and design and development of computer security hardware and software applications
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen