9
Computer Security Software; Computers and computer hardware; Calculators; Data processing apparatus; Computers; Computer antivirus software; Electric Junction boxes; Aerials; plasma display panels; Frequency meters; Electronic paper displays; Electric installations for the remote control of industrial operations; Musical sound recordings; Television decoders; Battery boxes; Accounting machines; Magnetic encoders; Computer operating systems; Computer hardware; Computer software for the remote control of security apparatus; Peripherals adapted for use with computers; Computer keyboards; Privacy software for data protection and the prevention of cybersecurity breaches; Data processing equipment, namely, sensors that detect network vulnerabilities; Computer programmes for data processing; Electromagnetic coils; Electronic notice boards; Electronic pens for visual display units; Audio receivers; Radio receiving tuners; Computer firewall software; Wrist rests for use with computers; Computer networking hardware; Peripheral devices for data reproduction; Downloadable software for information security for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; Downloadable computer software for remote monitoring and analysis; Interfaces for computers; Mobile High-Definition Link cables; USB cables; Wireless controllers to remotely monitor and control the function and status of security systems; Cable detectors; Cable connectors; electronic touch sensitive switches; Optical couplers; Acoustic couplers; Laptop computers; Lasers not for medical use; magnetic tape drives; DVD drives; Loudspeakers; Card reading equipment; Microfilm readers; blank magnetic tapes; Computer mouses; Mouse pads; LED computer monitors; Modems; Notebook computers; Picture projectors; optical scanners; Security software; Computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; Mobile security software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; Software for online messaging; Predictive maintenance software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks in the field of network security; Software for network and device security; Software for computer diagnostics and troubleshooting; Privacy protection software for business and consumer use; Software for ensuring the security of electronic mail; Software for the analysis of business data; Cloud network monitoring software; Computer software to maintain and operate computer system; Software for searching and retrieving information across a computer network; Electronic device software drivers that allow computer hardware and electronic devices to communicate with each other; Keyboards; Sound locating instruments; Sound recording carriers; USB hardware; Voltage surge protectors; Time switches, automatic; computer central processing units
35
Business management services; Business administration services; Clerical services; Providing Business assistance, business management and business administrative services; Administrative data processing; Updating of advertising material; Market analysis; Cost price analysis services; Personnel recruitment; Provision of information relating to advertising; Provision of information relating to marketing; Provision of information relating to accounts, namely, accountancy; Arranging and conducting of fairs and exhibitions for business and advertising purposes; Book-keeping; Computerized file management; Systemization of information into computer databases; Provision of business data and information; Compilation of information into computer databases; Document reproduction; Business management of retail outlets for others; Business information and inquiries; Business acquisitions consulting; Business investigations; Compilation of statistics; Consumer research; Business Efficiency experts; Business efficiency expert services; Marketing services; Organization of trade fairs for commercial or advertising purposes; Online advertising for others; Radio advertising; Word processing; Secretarial services; message transcription; Transcription of messages
38
Communication by computer terminals providing Internet access; Providing user access to global computer networks; Providing telecommunications connections to a global computer network; Communications by fibre optic networks; Communications by computer terminals; Telecommunications routing and junction services; Electronic Message sending; Electronic Data transmission; Satellite transmission; Information about telecommunication; Rental of modems; Rental of telecommunication equipment; Rental of access time to global computer networks; Providing access to databases
41
Training, namely, conducting conferences, seminars and workshops in the fields of internal auditing, data privacy and data security, cybersecurity, data privacy and security regulations and compliance, information technology governance and management, and data privacy and security risk management; Computer training, namely conducting conferences, seminars and workshops in the field of information security; Provision of instruction relating to computer programming; Organisation of computer related training courses; Arranging and conducting of seminars in the field of information security; Arranging and conducting of training workshops raining in the field of information security; Provision of education courses relating to computers
42
IT consulting services; IT security, protection and restoration services; Industrial research in the field of information technology; Computer aided industrial analysis services for industrial control systems; Design and development of computer hardware; Computer Firewall Services, namely, the design and implementation of computer firewall software; Rental of computer software; Hosting services and software as a service and rental of software for use by others in the field of information security; Software development, programming and implementation services; consulting services in the field of design and development of computer hardware architecture for others; Updating computer software; Analytical services relating to computer programmes in the field of information security; Analytical services relating to computer systems in the field of information security; Consulting services in the field of computer security; Data security consulting services; Computer hardware and software consulting services; Consulting services in the field of security software; Consulting services in the field of computer system analysis; Providing search engines for the internet; Provision of security services for computer networks, computer access and computerised transactions; Computer programming services for electronic data security; Recovery of computer data; Development of hardware for data and multimedia content conversion from and to different protocols; Design of computer hardware; Installation of computer software; Duplication of computer programs; Design and development of electronic data computer security systems; Software customisation services; Computer software design; Software creation; Software development; Installation, repair and maintenance of computer software; Computer software consultancy; Computer system analysis; Computer aided design services; Computer virus protection services; design and implementation of Data security services; Design and development of Internet security programs; Development of interactive multimedia software; Preparation of data processing programmes; Computer rental; Development of data processing hardware; Technical research in the field of information security; Creating and maintaining web sites for others; Conversion of computer programs and data, other than physical conversion; Conversion of data or documents from physical to electronic media; Surveying; Software Programming of Internet security programs; Software programming of computer software for evaluation and calculation of data; computer system safety testing services; computer security consulting services; Computer software technical support services, namely, troubleshooting of computer software problems; Rental of web servers; Encryption, decryption and authentication of information, messages and data; Maintenance and updating of computer software
45
Providing reconnaissance and surveillance services; Closed-circuit surveillance services; Security assessment of risk to individuals or property; Safety evaluation; Physical security consultancy; Surveillance services; Monitoring of security systems; Security services for the protection of individuals; Security services for the protection of property and individuals; Rental of safety equipment; Rental of security surveillance apparatus