35
Advertising; business management; business consultancy;
business administration; business management in the field of
computer networks, computer security, information security,
electronic security, cyber security and data security;
business administration in the field of computer networks,
computer security, information security, electronic
security, cyber security and data security; business
consultancy in the field of computer networks, computer
security, information security, electronic security, cyber
security and data security; office functions; data
collection; updating and maintenance of data in computer
databases; file management by means of computers;
systematisation of data in computer databases;
administration and compilation of data in computer
databases; consultancy with respect to the compilation and
systematisation of data in computer databases; analysis and
optimisation of business structures within the scope of
business planning and business strategy services [business
consultancy]; analysis and optimisation of business
processes within the scope of business planning and business
strategy services [business consultancy]; strategy and
process consultancy [business consultancy]; organisational
project coordination; organisational project planning,
commercial project management and business management
project controlling; business consultancy including
preparation of operational concepts; EDP consultancy
38
Telecommunications; electronic messaging; Internet services,
namely the provision of access to data and information on
the Internet concerning the development, creation,
programming, execution, operation, production, distribution,
marketing, application, use, functioning, handling,
modification, sale, maintenance, rental, updating, design
and outsourcing of computer programs and computer software;
Internet services, namely the provision of access to data
and information on the Internet in relation to the creation,
development and design of computer programs and software for
data management, analysis and direct data processing
application and equipment therefor and for the creation,
development and design of databases; provision of
interactive telecommunication services by means of Internet
or online connections
42
Scientific and technological services and research and
design relating thereto; industrial analysis and research
services; design and development of computer hardware and
software; IT security services in the nature of protection
and recovery of computer data; development, implementation
and integration of computer software relating to identity
and access management strategies; updating of computer
software; technical concept development for software and
hardware systems to ensure security in information and
communication technology; IT security services for the
protection of electronic communication processes; computer
security services relating to distribution of digital keys,
certificates and user data required for user identification,
user authentication and/or device authentication;
installation, maintenance and updating of computer software;
system integration and implementation in the field of data
processing as far as included in this class; cloud
computing; software as a service; software as a service and
cloud computing in relation to identity and access
management software; consultancy on cloud services; design,
development and/or implementation of software for automation
and optimisation of account and authorisation processes;
implementation of software; consultancy on IT security;
provision [rollout] of software; authentication services for
computer security; authentication services [monitoring] of
data transmitted by telecommunications; authentication
services [monitoring] of messages transmitted by
telecommunications; encryption, decryption and
authentication of information, messages and data; technical
support in the software field; provision of online support
services for users of computer programs; online provision of
non-downloadable operating software for accessing and using
a cloud computer network; provision of non-downloadable
online cloud computing software for temporary use and for
use in database management and electronic data storage;
consulting in the field of computer security with regard to
operational and legal security standards; technology
consulting; conducting technical feasibility studies